Analysis
-
max time kernel
294s -
max time network
267s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 22:32
Static task
static1
Behavioral task
behavioral1
Sample
16c41bc0596a6f48a9f1720b2db60cc8d6c3fa2d8b3649f2ea0247cd4f4c4f7b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
16c41bc0596a6f48a9f1720b2db60cc8d6c3fa2d8b3649f2ea0247cd4f4c4f7b.exe
Resource
win10-20240404-en
General
-
Target
16c41bc0596a6f48a9f1720b2db60cc8d6c3fa2d8b3649f2ea0247cd4f4c4f7b.exe
-
Size
1.8MB
-
MD5
fbcaa3cac043ad80f0502ea00d364bcf
-
SHA1
b5cd5bab9ece35631fb3233960d24519d458ce89
-
SHA256
16c41bc0596a6f48a9f1720b2db60cc8d6c3fa2d8b3649f2ea0247cd4f4c4f7b
-
SHA512
8f2a03757fe95a4de74632b3406cfb446ae9b47ddcf55dfa335555bcb18f5906c9f057d90363479c0a45c93c186cb192320ce654ac9cb0d5862930ca0c8468b7
-
SSDEEP
49152:gm74u9Qd6cQ8SmuJsXhuhum5ryXYK/x0cpn/z7c:gG4AQqziXhKu2rs///
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 16c41bc0596a6f48a9f1720b2db60cc8d6c3fa2d8b3649f2ea0247cd4f4c4f7b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 16c41bc0596a6f48a9f1720b2db60cc8d6c3fa2d8b3649f2ea0247cd4f4c4f7b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 16c41bc0596a6f48a9f1720b2db60cc8d6c3fa2d8b3649f2ea0247cd4f4c4f7b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe -
Executes dropped EXE 4 IoCs
pid Process 2560 axplong.exe 2900 neon.exe 2416 neon.exe 1480 neon.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 16c41bc0596a6f48a9f1720b2db60cc8d6c3fa2d8b3649f2ea0247cd4f4c4f7b.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine axplong.exe -
Loads dropped DLL 4 IoCs
pid Process 2728 16c41bc0596a6f48a9f1720b2db60cc8d6c3fa2d8b3649f2ea0247cd4f4c4f7b.exe 2560 axplong.exe 2560 axplong.exe 2416 neon.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\neon = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\neon.exe" reg.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2728 16c41bc0596a6f48a9f1720b2db60cc8d6c3fa2d8b3649f2ea0247cd4f4c4f7b.exe 2560 axplong.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job 16c41bc0596a6f48a9f1720b2db60cc8d6c3fa2d8b3649f2ea0247cd4f4c4f7b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 16c41bc0596a6f48a9f1720b2db60cc8d6c3fa2d8b3649f2ea0247cd4f4c4f7b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neon.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2948 cmd.exe 1380 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1380 PING.EXE -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2728 16c41bc0596a6f48a9f1720b2db60cc8d6c3fa2d8b3649f2ea0247cd4f4c4f7b.exe 2560 axplong.exe 2900 neon.exe 2900 neon.exe 2900 neon.exe 2900 neon.exe 2900 neon.exe 2900 neon.exe 2900 neon.exe 2900 neon.exe 2900 neon.exe 2900 neon.exe 2900 neon.exe 2900 neon.exe 2900 neon.exe 2416 neon.exe 1480 neon.exe 1480 neon.exe 1480 neon.exe 2900 neon.exe 2900 neon.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2900 neon.exe Token: SeDebugPrivilege 2416 neon.exe Token: SeDebugPrivilege 1480 neon.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2728 16c41bc0596a6f48a9f1720b2db60cc8d6c3fa2d8b3649f2ea0247cd4f4c4f7b.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2560 2728 16c41bc0596a6f48a9f1720b2db60cc8d6c3fa2d8b3649f2ea0247cd4f4c4f7b.exe 30 PID 2728 wrote to memory of 2560 2728 16c41bc0596a6f48a9f1720b2db60cc8d6c3fa2d8b3649f2ea0247cd4f4c4f7b.exe 30 PID 2728 wrote to memory of 2560 2728 16c41bc0596a6f48a9f1720b2db60cc8d6c3fa2d8b3649f2ea0247cd4f4c4f7b.exe 30 PID 2728 wrote to memory of 2560 2728 16c41bc0596a6f48a9f1720b2db60cc8d6c3fa2d8b3649f2ea0247cd4f4c4f7b.exe 30 PID 2560 wrote to memory of 2900 2560 axplong.exe 32 PID 2560 wrote to memory of 2900 2560 axplong.exe 32 PID 2560 wrote to memory of 2900 2560 axplong.exe 32 PID 2560 wrote to memory of 2900 2560 axplong.exe 32 PID 2900 wrote to memory of 2948 2900 neon.exe 33 PID 2900 wrote to memory of 2948 2900 neon.exe 33 PID 2900 wrote to memory of 2948 2900 neon.exe 33 PID 2948 wrote to memory of 1380 2948 cmd.exe 35 PID 2948 wrote to memory of 1380 2948 cmd.exe 35 PID 2948 wrote to memory of 1380 2948 cmd.exe 35 PID 2900 wrote to memory of 1932 2900 neon.exe 36 PID 2900 wrote to memory of 1932 2900 neon.exe 36 PID 2900 wrote to memory of 1932 2900 neon.exe 36 PID 2900 wrote to memory of 1932 2900 neon.exe 36 PID 2900 wrote to memory of 1932 2900 neon.exe 36 PID 2900 wrote to memory of 1932 2900 neon.exe 36 PID 2900 wrote to memory of 1932 2900 neon.exe 36 PID 2900 wrote to memory of 1932 2900 neon.exe 36 PID 2900 wrote to memory of 2116 2900 neon.exe 37 PID 2900 wrote to memory of 2116 2900 neon.exe 37 PID 2900 wrote to memory of 2116 2900 neon.exe 37 PID 2900 wrote to memory of 2116 2900 neon.exe 37 PID 2900 wrote to memory of 2116 2900 neon.exe 37 PID 2900 wrote to memory of 2116 2900 neon.exe 37 PID 2900 wrote to memory of 2116 2900 neon.exe 37 PID 2900 wrote to memory of 2116 2900 neon.exe 37 PID 2948 wrote to memory of 2376 2948 cmd.exe 38 PID 2948 wrote to memory of 2376 2948 cmd.exe 38 PID 2948 wrote to memory of 2376 2948 cmd.exe 38 PID 2900 wrote to memory of 2488 2900 neon.exe 39 PID 2900 wrote to memory of 2488 2900 neon.exe 39 PID 2900 wrote to memory of 2488 2900 neon.exe 39 PID 2900 wrote to memory of 2488 2900 neon.exe 39 PID 2900 wrote to memory of 2488 2900 neon.exe 39 PID 2900 wrote to memory of 2488 2900 neon.exe 39 PID 2900 wrote to memory of 2488 2900 neon.exe 39 PID 2900 wrote to memory of 2488 2900 neon.exe 39 PID 2900 wrote to memory of 2420 2900 neon.exe 40 PID 2900 wrote to memory of 2420 2900 neon.exe 40 PID 2900 wrote to memory of 2420 2900 neon.exe 40 PID 2900 wrote to memory of 2420 2900 neon.exe 40 PID 2900 wrote to memory of 2420 2900 neon.exe 40 PID 2900 wrote to memory of 2420 2900 neon.exe 40 PID 2900 wrote to memory of 2420 2900 neon.exe 40 PID 2900 wrote to memory of 2420 2900 neon.exe 40 PID 2900 wrote to memory of 1568 2900 neon.exe 41 PID 2900 wrote to memory of 1568 2900 neon.exe 41 PID 2900 wrote to memory of 1568 2900 neon.exe 41 PID 2900 wrote to memory of 1568 2900 neon.exe 41 PID 2900 wrote to memory of 1568 2900 neon.exe 41 PID 2900 wrote to memory of 1568 2900 neon.exe 41 PID 2900 wrote to memory of 1568 2900 neon.exe 41 PID 2900 wrote to memory of 1568 2900 neon.exe 41 PID 2900 wrote to memory of 2416 2900 neon.exe 43 PID 2900 wrote to memory of 2416 2900 neon.exe 43 PID 2900 wrote to memory of 2416 2900 neon.exe 43 PID 2900 wrote to memory of 2416 2900 neon.exe 43 PID 2416 wrote to memory of 1480 2416 neon.exe 44 PID 2416 wrote to memory of 1480 2416 neon.exe 44 PID 2416 wrote to memory of 1480 2416 neon.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\16c41bc0596a6f48a9f1720b2db60cc8d6c3fa2d8b3649f2ea0247cd4f4c4f7b.exe"C:\Users\Admin\AppData\Local\Temp\16c41bc0596a6f48a9f1720b2db60cc8d6c3fa2d8b3649f2ea0247cd4f4c4f7b.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\1000356001\neon.exe"C:\Users\Admin\AppData\Local\Temp\1000356001\neon.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\system32\cmd.exe"cmd" /c ping 127.0.0.1 -n 6 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "neon" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\neon.exe"4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 65⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1380
-
-
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "neon" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\neon.exe"5⤵
- Adds Run key to start application
PID:2376
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"4⤵PID:1932
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"4⤵PID:2116
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"4⤵PID:2488
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"4⤵PID:2420
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"4⤵PID:1568
-
-
C:\Users\Admin\AppData\Local\Temp\neon.exe"C:\Users\Admin\AppData\Local\Temp\neon.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\neon.exe"C:\Users\Admin\AppData\Local\Temp\neon.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1480
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD5b3fd0e1003b1cd38402b6d32829f6135
SHA1c9cedd6322fb83457f56b64b4624b07e2786f702
SHA256e4a36be98f730d706d2ca97a5d687329a1cc7d4848daf698b7e21b6b9b577f31
SHA51204692e0f80a75f78b533677cefe3db6607108abf19963d88e231925cfa13f1ec054811aebe53c82d238e732a999cd8d176107d50cf2ea5694d4177cbfd3b30f1
-
Filesize
1.8MB
MD5fbcaa3cac043ad80f0502ea00d364bcf
SHA1b5cd5bab9ece35631fb3233960d24519d458ce89
SHA25616c41bc0596a6f48a9f1720b2db60cc8d6c3fa2d8b3649f2ea0247cd4f4c4f7b
SHA5128f2a03757fe95a4de74632b3406cfb446ae9b47ddcf55dfa335555bcb18f5906c9f057d90363479c0a45c93c186cb192320ce654ac9cb0d5862930ca0c8468b7
-
Filesize
76KB
MD50e362e7005823d0bec3719b902ed6d62
SHA1590d860b909804349e0cdc2f1662b37bd62f7463
SHA2562d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad
SHA512518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3
-
Filesize
64B
MD516db32ae45196b7f212f09c9e1dd08cf
SHA1467f69438ff171071ef88b26fe9ac7737e82dcae
SHA256cb27eaf349b5e10aa255429ddfc4b5ad375a4ffbeb2ecf2d1cd2155a70620173
SHA512883429fdb0b7468f7133ac83a3a25bdf89ab1ea699e7af8534d2fe7a578cf81a59c8c3ec73bf80028a48219572c075d6575685c75566b52a9087e8ba2970e392
-
Filesize
67B
MD54a8d19f47f0bbddf1c4e000ea872455d
SHA1f5722f0bc47551e7db0d85a7e8fdbe04d8de5a41
SHA25642de143f6e233e5be3efb371a8b5d10f207a57eea12b1379f2f305f69e8fce5c
SHA512790afcec6f0563b4345375d328d7715b7961236a10f9956d523634287f5d53881b6d2e1446e63fcd70d7c564b171429fe84a4d81569dc76ed8ea74d481fdc3a7
-
Filesize
67B
MD5b72fd7678b0caca061726422b3e56db3
SHA133e0042bffa623492082a167b5a65b49fc502eb9
SHA2569abeb505ec134cdabf73cf20804a4c6c967bbc701aafe17274fcfda4d9e686ae
SHA5127e438a49a2940a272ca020da72bb3a123c5e2968a03f537f4bc38a849610f85bd9846639bfee5e6eba88133cf0ffe1b39e03d353a74c4477c1d75f47e9cc7bcc