Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 02:25
Static task
static1
Behavioral task
behavioral1
Sample
bb9ebd7b003b34e4e1dab658f246bf3921c6598f6af5416735b83bb48395d8c7.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bb9ebd7b003b34e4e1dab658f246bf3921c6598f6af5416735b83bb48395d8c7.exe
Resource
win10v2004-20240910-en
General
-
Target
bb9ebd7b003b34e4e1dab658f246bf3921c6598f6af5416735b83bb48395d8c7.exe
-
Size
1.8MB
-
MD5
c1e46f1401c04757c91547389beeeaf7
-
SHA1
01d473dfb92775647b01d7259bfa946140b7db72
-
SHA256
bb9ebd7b003b34e4e1dab658f246bf3921c6598f6af5416735b83bb48395d8c7
-
SHA512
09b44d3701bff0cf1f3950ab02d56160ac7e3dc60afcc2cdd45d6dfd5ed8776a1650ddaeab4c7a77734387764194dd094bcf878efd682dd277eb0868c3909ea7
-
SSDEEP
49152:lZCx/fLFnGNRednWQ0wOfHbgdwttgmsmhpXoJGxgTrzAQrBmZv:aHnGEW6OfbgWgK1WGyrMQrBmd
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bb9ebd7b003b34e4e1dab658f246bf3921c6598f6af5416735b83bb48395d8c7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bb9ebd7b003b34e4e1dab658f246bf3921c6598f6af5416735b83bb48395d8c7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bb9ebd7b003b34e4e1dab658f246bf3921c6598f6af5416735b83bb48395d8c7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe -
Executes dropped EXE 2 IoCs
pid Process 2488 axplong.exe 1484 rstxdhuj.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine bb9ebd7b003b34e4e1dab658f246bf3921c6598f6af5416735b83bb48395d8c7.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine axplong.exe -
Loads dropped DLL 7 IoCs
pid Process 2564 bb9ebd7b003b34e4e1dab658f246bf3921c6598f6af5416735b83bb48395d8c7.exe 2488 axplong.exe 6132 WerFault.exe 6132 WerFault.exe 6132 WerFault.exe 6132 WerFault.exe 6132 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ylrdnrwcx = "C:\\Users\\Admin\\AppData\\Roaming\\Ylrdnrwcx.exe" rstxdhuj.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2564 bb9ebd7b003b34e4e1dab658f246bf3921c6598f6af5416735b83bb48395d8c7.exe 2488 axplong.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job bb9ebd7b003b34e4e1dab658f246bf3921c6598f6af5416735b83bb48395d8c7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 6132 1484 WerFault.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rstxdhuj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bb9ebd7b003b34e4e1dab658f246bf3921c6598f6af5416735b83bb48395d8c7.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2564 bb9ebd7b003b34e4e1dab658f246bf3921c6598f6af5416735b83bb48395d8c7.exe 2488 axplong.exe 1484 rstxdhuj.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1484 rstxdhuj.exe Token: SeDebugPrivilege 1484 rstxdhuj.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2564 bb9ebd7b003b34e4e1dab658f246bf3921c6598f6af5416735b83bb48395d8c7.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2488 2564 bb9ebd7b003b34e4e1dab658f246bf3921c6598f6af5416735b83bb48395d8c7.exe 30 PID 2564 wrote to memory of 2488 2564 bb9ebd7b003b34e4e1dab658f246bf3921c6598f6af5416735b83bb48395d8c7.exe 30 PID 2564 wrote to memory of 2488 2564 bb9ebd7b003b34e4e1dab658f246bf3921c6598f6af5416735b83bb48395d8c7.exe 30 PID 2564 wrote to memory of 2488 2564 bb9ebd7b003b34e4e1dab658f246bf3921c6598f6af5416735b83bb48395d8c7.exe 30 PID 2488 wrote to memory of 1484 2488 axplong.exe 33 PID 2488 wrote to memory of 1484 2488 axplong.exe 33 PID 2488 wrote to memory of 1484 2488 axplong.exe 33 PID 2488 wrote to memory of 1484 2488 axplong.exe 33 PID 1484 wrote to memory of 6132 1484 rstxdhuj.exe 34 PID 1484 wrote to memory of 6132 1484 rstxdhuj.exe 34 PID 1484 wrote to memory of 6132 1484 rstxdhuj.exe 34 PID 1484 wrote to memory of 6132 1484 rstxdhuj.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb9ebd7b003b34e4e1dab658f246bf3921c6598f6af5416735b83bb48395d8c7.exe"C:\Users\Admin\AppData\Local\Temp\bb9ebd7b003b34e4e1dab658f246bf3921c6598f6af5416735b83bb48395d8c7.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\1000342001\rstxdhuj.exe"C:\Users\Admin\AppData\Local\Temp\1000342001\rstxdhuj.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1484 -s 7844⤵
- Loads dropped DLL
- Program crash
PID:6132
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
963KB
MD51ef39c8bc5799aa381fe093a1f2d532a
SHA157eabb02a7c43c9682988227dd470734cc75edb2
SHA2560cced5b50789fca3ad4b2c151b798363d712da04c377bd704dcef4898e66b2b4
SHA51213a9c267c4ceb2bd176f1339faa035ffeb08936deeeb4e38252ea43cfe487ea1c1876e4cc2a965548e767af02805a1da62885e6538da056be0c6fae33b637682
-
Filesize
1.8MB
MD5c1e46f1401c04757c91547389beeeaf7
SHA101d473dfb92775647b01d7259bfa946140b7db72
SHA256bb9ebd7b003b34e4e1dab658f246bf3921c6598f6af5416735b83bb48395d8c7
SHA51209b44d3701bff0cf1f3950ab02d56160ac7e3dc60afcc2cdd45d6dfd5ed8776a1650ddaeab4c7a77734387764194dd094bcf878efd682dd277eb0868c3909ea7