Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
07-09-2024 14:44
Static task
static1
Behavioral task
behavioral1
Sample
4fe8a0e454dd7503f35f56e022cfef089a4477e906414663da459c27480c5456.exe
Resource
win10v2004-20240802-en
General
-
Target
4fe8a0e454dd7503f35f56e022cfef089a4477e906414663da459c27480c5456.exe
-
Size
1.8MB
-
MD5
59953a2ace8d80a3eac87bb37cf35871
-
SHA1
f22821242ad268998f04a52f46ce23bf1d0bddd3
-
SHA256
4fe8a0e454dd7503f35f56e022cfef089a4477e906414663da459c27480c5456
-
SHA512
87e266458db8c1c39d4f4473b7933c30f60964f2246727c48f44b4bcfa83e3207bc660f887148316c0a09681b9795276fe25acea94b5324e1760d5a1472969f8
-
SSDEEP
49152:15duCNPRyoCxgQKVnJf77oVFF2RXCtGfo:15duCBggQs13oVFF2pCwo
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4fe8a0e454dd7503f35f56e022cfef089a4477e906414663da459c27480c5456.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4fe8a0e454dd7503f35f56e022cfef089a4477e906414663da459c27480c5456.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4fe8a0e454dd7503f35f56e022cfef089a4477e906414663da459c27480c5456.exe -
Executes dropped EXE 3 IoCs
pid Process 1608 axplong.exe 2160 axplong.exe 2404 axplong.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Software\Wine 4fe8a0e454dd7503f35f56e022cfef089a4477e906414663da459c27480c5456.exe Key opened \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000\Software\Wine axplong.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3112 4fe8a0e454dd7503f35f56e022cfef089a4477e906414663da459c27480c5456.exe 1608 axplong.exe 2160 axplong.exe 2404 axplong.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job 4fe8a0e454dd7503f35f56e022cfef089a4477e906414663da459c27480c5456.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4fe8a0e454dd7503f35f56e022cfef089a4477e906414663da459c27480c5456.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3112 4fe8a0e454dd7503f35f56e022cfef089a4477e906414663da459c27480c5456.exe 3112 4fe8a0e454dd7503f35f56e022cfef089a4477e906414663da459c27480c5456.exe 1608 axplong.exe 1608 axplong.exe 2160 axplong.exe 2160 axplong.exe 2404 axplong.exe 2404 axplong.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3112 4fe8a0e454dd7503f35f56e022cfef089a4477e906414663da459c27480c5456.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3112 wrote to memory of 1608 3112 4fe8a0e454dd7503f35f56e022cfef089a4477e906414663da459c27480c5456.exe 78 PID 3112 wrote to memory of 1608 3112 4fe8a0e454dd7503f35f56e022cfef089a4477e906414663da459c27480c5456.exe 78 PID 3112 wrote to memory of 1608 3112 4fe8a0e454dd7503f35f56e022cfef089a4477e906414663da459c27480c5456.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fe8a0e454dd7503f35f56e022cfef089a4477e906414663da459c27480c5456.exe"C:\Users\Admin\AppData\Local\Temp\4fe8a0e454dd7503f35f56e022cfef089a4477e906414663da459c27480c5456.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1608
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2160
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD559953a2ace8d80a3eac87bb37cf35871
SHA1f22821242ad268998f04a52f46ce23bf1d0bddd3
SHA2564fe8a0e454dd7503f35f56e022cfef089a4477e906414663da459c27480c5456
SHA51287e266458db8c1c39d4f4473b7933c30f60964f2246727c48f44b4bcfa83e3207bc660f887148316c0a09681b9795276fe25acea94b5324e1760d5a1472969f8