Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 08:35
Static task
static1
Behavioral task
behavioral1
Sample
a61dc154af80d7c67638c50ca91d567ba0f872562c1b6c616e58abdda3bc3544.exe
Resource
win7-20240704-en
General
-
Target
a61dc154af80d7c67638c50ca91d567ba0f872562c1b6c616e58abdda3bc3544.exe
-
Size
1.8MB
-
MD5
fbb7e8266d0875b81f294136bb93f90a
-
SHA1
88096781cb97d1fb0aab5ea5c59501eeebd06c52
-
SHA256
a61dc154af80d7c67638c50ca91d567ba0f872562c1b6c616e58abdda3bc3544
-
SHA512
1d86f4d357daf13b50c08f111fc58126674fe452ee09be4e7ecec23a65e3576e069929c90605a6abebfbcc3755881b76ae0a6112b9ad66fef3d6c6db3b338e28
-
SSDEEP
49152:6j1W65FNCu4RC+ResbXIYa/FOv/w/uxdvzNdTIss2/6ODKs:6ldCu2rgsbXC/FOgGxH7s21t
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Signatures
-
PureLog Stealer
PureLog Stealer is an infostealer written in C#.
-
PureLog Stealer payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000017562-27.dat family_purelog_stealer behavioral1/memory/2180-37-0x00000000000A0000-0x000000000018E000-memory.dmp family_purelog_stealer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a61dc154af80d7c67638c50ca91d567ba0f872562c1b6c616e58abdda3bc3544.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a61dc154af80d7c67638c50ca91d567ba0f872562c1b6c616e58abdda3bc3544.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a61dc154af80d7c67638c50ca91d567ba0f872562c1b6c616e58abdda3bc3544.exe -
Executes dropped EXE 2 IoCs
pid Process 2584 axplong.exe 2180 Mswgoudnv.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Wine a61dc154af80d7c67638c50ca91d567ba0f872562c1b6c616e58abdda3bc3544.exe -
Loads dropped DLL 7 IoCs
pid Process 1924 a61dc154af80d7c67638c50ca91d567ba0f872562c1b6c616e58abdda3bc3544.exe 2584 axplong.exe 4952 WerFault.exe 4952 WerFault.exe 4952 WerFault.exe 4952 WerFault.exe 4952 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\afasdfga = "C:\\Users\\Admin\\AppData\\Roaming\\afasdfga.exe" Mswgoudnv.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1924 a61dc154af80d7c67638c50ca91d567ba0f872562c1b6c616e58abdda3bc3544.exe 2584 axplong.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job a61dc154af80d7c67638c50ca91d567ba0f872562c1b6c616e58abdda3bc3544.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4952 2180 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a61dc154af80d7c67638c50ca91d567ba0f872562c1b6c616e58abdda3bc3544.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mswgoudnv.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1924 a61dc154af80d7c67638c50ca91d567ba0f872562c1b6c616e58abdda3bc3544.exe 2584 axplong.exe 2180 Mswgoudnv.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2180 Mswgoudnv.exe Token: SeDebugPrivilege 2180 Mswgoudnv.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1924 a61dc154af80d7c67638c50ca91d567ba0f872562c1b6c616e58abdda3bc3544.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2584 1924 a61dc154af80d7c67638c50ca91d567ba0f872562c1b6c616e58abdda3bc3544.exe 31 PID 1924 wrote to memory of 2584 1924 a61dc154af80d7c67638c50ca91d567ba0f872562c1b6c616e58abdda3bc3544.exe 31 PID 1924 wrote to memory of 2584 1924 a61dc154af80d7c67638c50ca91d567ba0f872562c1b6c616e58abdda3bc3544.exe 31 PID 1924 wrote to memory of 2584 1924 a61dc154af80d7c67638c50ca91d567ba0f872562c1b6c616e58abdda3bc3544.exe 31 PID 2584 wrote to memory of 2180 2584 axplong.exe 32 PID 2584 wrote to memory of 2180 2584 axplong.exe 32 PID 2584 wrote to memory of 2180 2584 axplong.exe 32 PID 2584 wrote to memory of 2180 2584 axplong.exe 32 PID 2180 wrote to memory of 4952 2180 Mswgoudnv.exe 34 PID 2180 wrote to memory of 4952 2180 Mswgoudnv.exe 34 PID 2180 wrote to memory of 4952 2180 Mswgoudnv.exe 34 PID 2180 wrote to memory of 4952 2180 Mswgoudnv.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\a61dc154af80d7c67638c50ca91d567ba0f872562c1b6c616e58abdda3bc3544.exe"C:\Users\Admin\AppData\Local\Temp\a61dc154af80d7c67638c50ca91d567ba0f872562c1b6c616e58abdda3bc3544.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\1000177001\Mswgoudnv.exe"C:\Users\Admin\AppData\Local\Temp\1000177001\Mswgoudnv.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2180 -s 6244⤵
- Loads dropped DLL
- Program crash
PID:4952
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
924KB
MD5de64bb0f39113e48a8499d3401461cf8
SHA18d78c2d4701e4596e87e3f09adde214a2a2033e8
SHA25664b58794801f282e92571676e3571afc5c59033c262406bf0d36e1d6ef3cda6a
SHA51235b7cdcfb866dcdc79be34066a9ad5a8058b80e68925aeb23708606149841022de17e9d205389c13803c01e356174a2f657773df7d53f889e4e1fc1d68074179
-
Filesize
1.8MB
MD5fbb7e8266d0875b81f294136bb93f90a
SHA188096781cb97d1fb0aab5ea5c59501eeebd06c52
SHA256a61dc154af80d7c67638c50ca91d567ba0f872562c1b6c616e58abdda3bc3544
SHA5121d86f4d357daf13b50c08f111fc58126674fe452ee09be4e7ecec23a65e3576e069929c90605a6abebfbcc3755881b76ae0a6112b9ad66fef3d6c6db3b338e28