Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 09:38
Static task
static1
Behavioral task
behavioral1
Sample
3a6433a0ac5db18a54c9b40a75981a6bf2c72343c7b82202afe5561ecafcc50d.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3a6433a0ac5db18a54c9b40a75981a6bf2c72343c7b82202afe5561ecafcc50d.exe
Resource
win10v2004-20240802-en
General
-
Target
3a6433a0ac5db18a54c9b40a75981a6bf2c72343c7b82202afe5561ecafcc50d.exe
-
Size
1.8MB
-
MD5
fb3d62b3c36fc0b603ce2accc9890f6d
-
SHA1
c72bcf7e3b3e16d25489e5cca7a7758dd4ac3e40
-
SHA256
3a6433a0ac5db18a54c9b40a75981a6bf2c72343c7b82202afe5561ecafcc50d
-
SHA512
a599b7ff1cde3a20b952e5534a34a0f0d4ef84d87439c5fb72239a299a44b5c26d22f43866b6a029977c070b962f064b1c0b1dcbfdee3471beb670307c46bf54
-
SSDEEP
49152:91/zoFDkcrRFgUNLOhdYQ8N1gnzqWjBx4XDATJHIQFahwVl/e:9pcBaUpOTYLunz7jb8cTJIh8l/
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Signatures
-
PureLog Stealer
PureLog Stealer is an infostealer written in C#.
-
PureLog Stealer payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000177001\Mswgoudnv.exe family_purelog_stealer behavioral2/memory/1448-41-0x0000000000DB0000-0x0000000000E9E000-memory.dmp family_purelog_stealer -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
Processes:
Mswgoudnv.exeiwocw.exedescription pid process target process PID 1448 created 3256 1448 Mswgoudnv.exe Explorer.EXE PID 4400 created 3256 4400 iwocw.exe Explorer.EXE -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
Processes:
axplong.exeaxplong.exe3a6433a0ac5db18a54c9b40a75981a6bf2c72343c7b82202afe5561ecafcc50d.exeaxplong.exeaxplong.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3a6433a0ac5db18a54c9b40a75981a6bf2c72343c7b82202afe5561ecafcc50d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
3a6433a0ac5db18a54c9b40a75981a6bf2c72343c7b82202afe5561ecafcc50d.exeaxplong.exeaxplong.exeaxplong.exeaxplong.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3a6433a0ac5db18a54c9b40a75981a6bf2c72343c7b82202afe5561ecafcc50d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3a6433a0ac5db18a54c9b40a75981a6bf2c72343c7b82202afe5561ecafcc50d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
3a6433a0ac5db18a54c9b40a75981a6bf2c72343c7b82202afe5561ecafcc50d.exeaxplong.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation 3a6433a0ac5db18a54c9b40a75981a6bf2c72343c7b82202afe5561ecafcc50d.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation axplong.exe -
Executes dropped EXE 9 IoCs
Processes:
axplong.exeMswgoudnv.exeaxplong.exeMswgoudnv.exeaxplong.exeiwocw.exeiwocw.exeaxplong.exeiwocw.exepid process 4836 axplong.exe 1448 Mswgoudnv.exe 6112 axplong.exe 2632 Mswgoudnv.exe 5036 axplong.exe 4400 iwocw.exe 5408 iwocw.exe 4340 axplong.exe 3120 iwocw.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
3a6433a0ac5db18a54c9b40a75981a6bf2c72343c7b82202afe5561ecafcc50d.exeaxplong.exeaxplong.exeaxplong.exeaxplong.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Wine 3a6433a0ac5db18a54c9b40a75981a6bf2c72343c7b82202afe5561ecafcc50d.exe Key opened \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Wine axplong.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Mswgoudnv.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\afasdfga = "C:\\Users\\Admin\\AppData\\Roaming\\afasdfga.exe" Mswgoudnv.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
3a6433a0ac5db18a54c9b40a75981a6bf2c72343c7b82202afe5561ecafcc50d.exeaxplong.exeaxplong.exeaxplong.exeaxplong.exepid process 3608 3a6433a0ac5db18a54c9b40a75981a6bf2c72343c7b82202afe5561ecafcc50d.exe 4836 axplong.exe 6112 axplong.exe 5036 axplong.exe 4340 axplong.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Mswgoudnv.exeiwocw.exedescription pid process target process PID 1448 set thread context of 2632 1448 Mswgoudnv.exe Mswgoudnv.exe PID 4400 set thread context of 5408 4400 iwocw.exe iwocw.exe -
Drops file in Windows directory 2 IoCs
Processes:
3a6433a0ac5db18a54c9b40a75981a6bf2c72343c7b82202afe5561ecafcc50d.exeMswgoudnv.exedescription ioc process File created C:\Windows\Tasks\axplong.job 3a6433a0ac5db18a54c9b40a75981a6bf2c72343c7b82202afe5561ecafcc50d.exe File created C:\Windows\Tasks\Test Task17.job Mswgoudnv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
iwocw.exe3a6433a0ac5db18a54c9b40a75981a6bf2c72343c7b82202afe5561ecafcc50d.exeaxplong.exeMswgoudnv.exeMswgoudnv.exeiwocw.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iwocw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a6433a0ac5db18a54c9b40a75981a6bf2c72343c7b82202afe5561ecafcc50d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mswgoudnv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mswgoudnv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iwocw.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
3a6433a0ac5db18a54c9b40a75981a6bf2c72343c7b82202afe5561ecafcc50d.exeaxplong.exeaxplong.exeMswgoudnv.exeaxplong.exeiwocw.exeaxplong.exepid process 3608 3a6433a0ac5db18a54c9b40a75981a6bf2c72343c7b82202afe5561ecafcc50d.exe 3608 3a6433a0ac5db18a54c9b40a75981a6bf2c72343c7b82202afe5561ecafcc50d.exe 4836 axplong.exe 4836 axplong.exe 6112 axplong.exe 6112 axplong.exe 1448 Mswgoudnv.exe 5036 axplong.exe 5036 axplong.exe 4400 iwocw.exe 4340 axplong.exe 4340 axplong.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
Mswgoudnv.exeiwocw.exeiwocw.exedescription pid process Token: SeDebugPrivilege 1448 Mswgoudnv.exe Token: SeDebugPrivilege 1448 Mswgoudnv.exe Token: SeDebugPrivilege 4400 iwocw.exe Token: SeDebugPrivilege 4400 iwocw.exe Token: SeDebugPrivilege 3120 iwocw.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
3a6433a0ac5db18a54c9b40a75981a6bf2c72343c7b82202afe5561ecafcc50d.exeaxplong.exeMswgoudnv.exeiwocw.exedescription pid process target process PID 3608 wrote to memory of 4836 3608 3a6433a0ac5db18a54c9b40a75981a6bf2c72343c7b82202afe5561ecafcc50d.exe axplong.exe PID 3608 wrote to memory of 4836 3608 3a6433a0ac5db18a54c9b40a75981a6bf2c72343c7b82202afe5561ecafcc50d.exe axplong.exe PID 3608 wrote to memory of 4836 3608 3a6433a0ac5db18a54c9b40a75981a6bf2c72343c7b82202afe5561ecafcc50d.exe axplong.exe PID 4836 wrote to memory of 1448 4836 axplong.exe Mswgoudnv.exe PID 4836 wrote to memory of 1448 4836 axplong.exe Mswgoudnv.exe PID 4836 wrote to memory of 1448 4836 axplong.exe Mswgoudnv.exe PID 1448 wrote to memory of 2632 1448 Mswgoudnv.exe Mswgoudnv.exe PID 1448 wrote to memory of 2632 1448 Mswgoudnv.exe Mswgoudnv.exe PID 1448 wrote to memory of 2632 1448 Mswgoudnv.exe Mswgoudnv.exe PID 1448 wrote to memory of 2632 1448 Mswgoudnv.exe Mswgoudnv.exe PID 1448 wrote to memory of 2632 1448 Mswgoudnv.exe Mswgoudnv.exe PID 1448 wrote to memory of 2632 1448 Mswgoudnv.exe Mswgoudnv.exe PID 1448 wrote to memory of 2632 1448 Mswgoudnv.exe Mswgoudnv.exe PID 1448 wrote to memory of 2632 1448 Mswgoudnv.exe Mswgoudnv.exe PID 4400 wrote to memory of 5408 4400 iwocw.exe iwocw.exe PID 4400 wrote to memory of 5408 4400 iwocw.exe iwocw.exe PID 4400 wrote to memory of 5408 4400 iwocw.exe iwocw.exe PID 4400 wrote to memory of 5408 4400 iwocw.exe iwocw.exe PID 4400 wrote to memory of 5408 4400 iwocw.exe iwocw.exe PID 4400 wrote to memory of 5408 4400 iwocw.exe iwocw.exe PID 4400 wrote to memory of 5408 4400 iwocw.exe iwocw.exe PID 4400 wrote to memory of 5408 4400 iwocw.exe iwocw.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3256
-
C:\Users\Admin\AppData\Local\Temp\3a6433a0ac5db18a54c9b40a75981a6bf2c72343c7b82202afe5561ecafcc50d.exe"C:\Users\Admin\AppData\Local\Temp\3a6433a0ac5db18a54c9b40a75981a6bf2c72343c7b82202afe5561ecafcc50d.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\1000177001\Mswgoudnv.exe"C:\Users\Admin\AppData\Local\Temp\1000177001\Mswgoudnv.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1448
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000177001\Mswgoudnv.exe"C:\Users\Admin\AppData\Local\Temp\1000177001\Mswgoudnv.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2632
-
-
C:\ProgramData\bhrrtj\iwocw.exe"C:\ProgramData\bhrrtj\iwocw.exe"2⤵
- Executes dropped EXE
PID:5408
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6112
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5036
-
C:\ProgramData\bhrrtj\iwocw.exeC:\ProgramData\bhrrtj\iwocw.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4400
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4340
-
C:\ProgramData\bhrrtj\iwocw.exeC:\ProgramData\bhrrtj\iwocw.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
924KB
MD5de64bb0f39113e48a8499d3401461cf8
SHA18d78c2d4701e4596e87e3f09adde214a2a2033e8
SHA25664b58794801f282e92571676e3571afc5c59033c262406bf0d36e1d6ef3cda6a
SHA51235b7cdcfb866dcdc79be34066a9ad5a8058b80e68925aeb23708606149841022de17e9d205389c13803c01e356174a2f657773df7d53f889e4e1fc1d68074179
-
Filesize
1.8MB
MD5fb3d62b3c36fc0b603ce2accc9890f6d
SHA1c72bcf7e3b3e16d25489e5cca7a7758dd4ac3e40
SHA2563a6433a0ac5db18a54c9b40a75981a6bf2c72343c7b82202afe5561ecafcc50d
SHA512a599b7ff1cde3a20b952e5534a34a0f0d4ef84d87439c5fb72239a299a44b5c26d22f43866b6a029977c070b962f064b1c0b1dcbfdee3471beb670307c46bf54