Analysis
-
max time kernel
149s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 04:10
Static task
static1
Behavioral task
behavioral1
Sample
ff00a64cc199c6658dd5b210a2ee3f35ea9e4f97e63523b714e748909a8bdaed.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
ff00a64cc199c6658dd5b210a2ee3f35ea9e4f97e63523b714e748909a8bdaed.exe
Resource
win11-20240802-en
General
-
Target
ff00a64cc199c6658dd5b210a2ee3f35ea9e4f97e63523b714e748909a8bdaed.exe
-
Size
1.8MB
-
MD5
8c7b87eba28c8a55522c452e46b960b2
-
SHA1
a1a3da6f9e3a1793cb621f5fd2b4096c017c584c
-
SHA256
ff00a64cc199c6658dd5b210a2ee3f35ea9e4f97e63523b714e748909a8bdaed
-
SHA512
68b5eab4766be37a6acf605cd057e8b79e6e5784a867b3dfca7e03fe4e93df3c5614ebf07ee37e381115394ba608fc20749932a433b1879c6b1f3888b0bdf40f
-
SSDEEP
49152:NtUFfMS5knpcSrm2AUVXmeedEGipLZwFZpOy/pVjXd1:/4fMS5cc8m1Qmeklc21p7bd
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Signatures
-
PureLog Stealer
PureLog Stealer is an infostealer written in C#.
-
PureLog Stealer payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000177001\Mswgoudnv.exe family_purelog_stealer behavioral1/memory/4592-42-0x00000000006F0000-0x00000000007DE000-memory.dmp family_purelog_stealer -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
Processes:
Mswgoudnv.exejntduvu.exedescription pid process target process PID 4592 created 3508 4592 Mswgoudnv.exe Explorer.EXE PID 5112 created 3508 5112 jntduvu.exe Explorer.EXE -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
Processes:
axplong.exeaxplong.exeaxplong.exeaxplong.exeff00a64cc199c6658dd5b210a2ee3f35ea9e4f97e63523b714e748909a8bdaed.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ff00a64cc199c6658dd5b210a2ee3f35ea9e4f97e63523b714e748909a8bdaed.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
axplong.exeaxplong.exeaxplong.exeff00a64cc199c6658dd5b210a2ee3f35ea9e4f97e63523b714e748909a8bdaed.exeaxplong.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ff00a64cc199c6658dd5b210a2ee3f35ea9e4f97e63523b714e748909a8bdaed.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ff00a64cc199c6658dd5b210a2ee3f35ea9e4f97e63523b714e748909a8bdaed.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ff00a64cc199c6658dd5b210a2ee3f35ea9e4f97e63523b714e748909a8bdaed.exeaxplong.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation ff00a64cc199c6658dd5b210a2ee3f35ea9e4f97e63523b714e748909a8bdaed.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation axplong.exe -
Executes dropped EXE 9 IoCs
Processes:
axplong.exeMswgoudnv.exeaxplong.exeMswgoudnv.exeaxplong.exejntduvu.exejntduvu.exeaxplong.exejntduvu.exepid process 4620 axplong.exe 4592 Mswgoudnv.exe 5388 axplong.exe 5624 Mswgoudnv.exe 3812 axplong.exe 5112 jntduvu.exe 3688 jntduvu.exe 5816 axplong.exe 976 jntduvu.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
ff00a64cc199c6658dd5b210a2ee3f35ea9e4f97e63523b714e748909a8bdaed.exeaxplong.exeaxplong.exeaxplong.exeaxplong.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Wine ff00a64cc199c6658dd5b210a2ee3f35ea9e4f97e63523b714e748909a8bdaed.exe Key opened \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Wine axplong.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Mswgoudnv.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\afasdfga = "C:\\Users\\Admin\\AppData\\Roaming\\afasdfga.exe" Mswgoudnv.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
ff00a64cc199c6658dd5b210a2ee3f35ea9e4f97e63523b714e748909a8bdaed.exeaxplong.exeaxplong.exeaxplong.exeaxplong.exepid process 1516 ff00a64cc199c6658dd5b210a2ee3f35ea9e4f97e63523b714e748909a8bdaed.exe 4620 axplong.exe 5388 axplong.exe 3812 axplong.exe 5816 axplong.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Mswgoudnv.exejntduvu.exedescription pid process target process PID 4592 set thread context of 5624 4592 Mswgoudnv.exe Mswgoudnv.exe PID 5112 set thread context of 3688 5112 jntduvu.exe jntduvu.exe -
Drops file in Windows directory 2 IoCs
Processes:
ff00a64cc199c6658dd5b210a2ee3f35ea9e4f97e63523b714e748909a8bdaed.exeMswgoudnv.exedescription ioc process File created C:\Windows\Tasks\axplong.job ff00a64cc199c6658dd5b210a2ee3f35ea9e4f97e63523b714e748909a8bdaed.exe File created C:\Windows\Tasks\Test Task17.job Mswgoudnv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ff00a64cc199c6658dd5b210a2ee3f35ea9e4f97e63523b714e748909a8bdaed.exeaxplong.exeMswgoudnv.exeMswgoudnv.exejntduvu.exejntduvu.exejntduvu.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff00a64cc199c6658dd5b210a2ee3f35ea9e4f97e63523b714e748909a8bdaed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mswgoudnv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mswgoudnv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jntduvu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jntduvu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jntduvu.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
ff00a64cc199c6658dd5b210a2ee3f35ea9e4f97e63523b714e748909a8bdaed.exeaxplong.exeaxplong.exeMswgoudnv.exeaxplong.exejntduvu.exeaxplong.exepid process 1516 ff00a64cc199c6658dd5b210a2ee3f35ea9e4f97e63523b714e748909a8bdaed.exe 1516 ff00a64cc199c6658dd5b210a2ee3f35ea9e4f97e63523b714e748909a8bdaed.exe 4620 axplong.exe 4620 axplong.exe 5388 axplong.exe 5388 axplong.exe 4592 Mswgoudnv.exe 3812 axplong.exe 3812 axplong.exe 5112 jntduvu.exe 5816 axplong.exe 5816 axplong.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
Mswgoudnv.exejntduvu.exejntduvu.exedescription pid process Token: SeDebugPrivilege 4592 Mswgoudnv.exe Token: SeDebugPrivilege 4592 Mswgoudnv.exe Token: SeDebugPrivilege 5112 jntduvu.exe Token: SeDebugPrivilege 5112 jntduvu.exe Token: SeDebugPrivilege 976 jntduvu.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
ff00a64cc199c6658dd5b210a2ee3f35ea9e4f97e63523b714e748909a8bdaed.exeaxplong.exeMswgoudnv.exejntduvu.exedescription pid process target process PID 1516 wrote to memory of 4620 1516 ff00a64cc199c6658dd5b210a2ee3f35ea9e4f97e63523b714e748909a8bdaed.exe axplong.exe PID 1516 wrote to memory of 4620 1516 ff00a64cc199c6658dd5b210a2ee3f35ea9e4f97e63523b714e748909a8bdaed.exe axplong.exe PID 1516 wrote to memory of 4620 1516 ff00a64cc199c6658dd5b210a2ee3f35ea9e4f97e63523b714e748909a8bdaed.exe axplong.exe PID 4620 wrote to memory of 4592 4620 axplong.exe Mswgoudnv.exe PID 4620 wrote to memory of 4592 4620 axplong.exe Mswgoudnv.exe PID 4620 wrote to memory of 4592 4620 axplong.exe Mswgoudnv.exe PID 4592 wrote to memory of 5624 4592 Mswgoudnv.exe Mswgoudnv.exe PID 4592 wrote to memory of 5624 4592 Mswgoudnv.exe Mswgoudnv.exe PID 4592 wrote to memory of 5624 4592 Mswgoudnv.exe Mswgoudnv.exe PID 4592 wrote to memory of 5624 4592 Mswgoudnv.exe Mswgoudnv.exe PID 4592 wrote to memory of 5624 4592 Mswgoudnv.exe Mswgoudnv.exe PID 4592 wrote to memory of 5624 4592 Mswgoudnv.exe Mswgoudnv.exe PID 4592 wrote to memory of 5624 4592 Mswgoudnv.exe Mswgoudnv.exe PID 4592 wrote to memory of 5624 4592 Mswgoudnv.exe Mswgoudnv.exe PID 5112 wrote to memory of 3688 5112 jntduvu.exe jntduvu.exe PID 5112 wrote to memory of 3688 5112 jntduvu.exe jntduvu.exe PID 5112 wrote to memory of 3688 5112 jntduvu.exe jntduvu.exe PID 5112 wrote to memory of 3688 5112 jntduvu.exe jntduvu.exe PID 5112 wrote to memory of 3688 5112 jntduvu.exe jntduvu.exe PID 5112 wrote to memory of 3688 5112 jntduvu.exe jntduvu.exe PID 5112 wrote to memory of 3688 5112 jntduvu.exe jntduvu.exe PID 5112 wrote to memory of 3688 5112 jntduvu.exe jntduvu.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\ff00a64cc199c6658dd5b210a2ee3f35ea9e4f97e63523b714e748909a8bdaed.exe"C:\Users\Admin\AppData\Local\Temp\ff00a64cc199c6658dd5b210a2ee3f35ea9e4f97e63523b714e748909a8bdaed.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\1000177001\Mswgoudnv.exe"C:\Users\Admin\AppData\Local\Temp\1000177001\Mswgoudnv.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4592
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000177001\Mswgoudnv.exe"C:\Users\Admin\AppData\Local\Temp\1000177001\Mswgoudnv.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5624
-
-
C:\ProgramData\wiujeub\jntduvu.exe"C:\ProgramData\wiujeub\jntduvu.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3688
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5388
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3812
-
C:\ProgramData\wiujeub\jntduvu.exeC:\ProgramData\wiujeub\jntduvu.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5112
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5816
-
C:\ProgramData\wiujeub\jntduvu.exeC:\ProgramData\wiujeub\jntduvu.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
924KB
MD5de64bb0f39113e48a8499d3401461cf8
SHA18d78c2d4701e4596e87e3f09adde214a2a2033e8
SHA25664b58794801f282e92571676e3571afc5c59033c262406bf0d36e1d6ef3cda6a
SHA51235b7cdcfb866dcdc79be34066a9ad5a8058b80e68925aeb23708606149841022de17e9d205389c13803c01e356174a2f657773df7d53f889e4e1fc1d68074179
-
Filesize
1.8MB
MD58c7b87eba28c8a55522c452e46b960b2
SHA1a1a3da6f9e3a1793cb621f5fd2b4096c017c584c
SHA256ff00a64cc199c6658dd5b210a2ee3f35ea9e4f97e63523b714e748909a8bdaed
SHA51268b5eab4766be37a6acf605cd057e8b79e6e5784a867b3dfca7e03fe4e93df3c5614ebf07ee37e381115394ba608fc20749932a433b1879c6b1f3888b0bdf40f
-
Filesize
242B
MD58561384fac609eee31eb1103aa761baf
SHA11fe5b195c2865f13b53004d9c986a0e4fc8b76f8
SHA256938ec4e8787b5a1a0e248f980aa381e332b94773df1a9568ec83ff52bb58ac37
SHA512e98cac3c1e62d0c0661c0d49962e8cb1c24553adf6546d9f9aed3dfb3f3c226c78ce3cb1d69f4a2b2144cdf39c59b893e3064a7eb6fa3602154836dcbaeb68a6