Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-10-2024 23:21
Static task
static1
Behavioral task
behavioral1
Sample
6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe
Resource
win7-20241010-en
General
-
Target
6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe
-
Size
1.8MB
-
MD5
a5a80ebfc812f7f5117e1c290d03c66f
-
SHA1
95adf3f585ff1b332973752f27edeeca5049452a
-
SHA256
6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017
-
SHA512
6308155f9dcd7ae7f15da0fe7a71bbe7aa910b05abbbad036b2c1a6f473dbdc955f4e7d0cdf167206409877d07ce06d655f085ad89a5a17792f0ae3c14f253f6
-
SSDEEP
49152:lZ0tauquw+6eEtsK6OsWVkCv17Uo35biaJT:lZ0Quq6EtUHCvZb3T
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Signatures
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral1/memory/2536-69-0x0000000069CC0000-0x000000006A37B000-memory.dmp family_cryptbot_v3 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe -
Executes dropped EXE 6 IoCs
pid Process 2140 axplong.exe 1708 Newofff.exe 2884 Hkbsse.exe 2536 JavUmar1.exe 1980 service123.exe 1992 service123.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine 6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine axplong.exe -
Loads dropped DLL 9 IoCs
pid Process 272 6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe 2140 axplong.exe 1708 Newofff.exe 2884 Hkbsse.exe 2884 Hkbsse.exe 2536 JavUmar1.exe 2536 JavUmar1.exe 1980 service123.exe 1992 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 272 6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe 2140 axplong.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job 6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe File created C:\Windows\Tasks\Hkbsse.job Newofff.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Newofff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkbsse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JavUmar1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JavUmar1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JavUmar1.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 708 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 272 6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe 2140 axplong.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 272 6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe 1708 Newofff.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 272 wrote to memory of 2140 272 6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe 31 PID 272 wrote to memory of 2140 272 6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe 31 PID 272 wrote to memory of 2140 272 6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe 31 PID 272 wrote to memory of 2140 272 6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe 31 PID 2140 wrote to memory of 1708 2140 axplong.exe 33 PID 2140 wrote to memory of 1708 2140 axplong.exe 33 PID 2140 wrote to memory of 1708 2140 axplong.exe 33 PID 2140 wrote to memory of 1708 2140 axplong.exe 33 PID 1708 wrote to memory of 2884 1708 Newofff.exe 34 PID 1708 wrote to memory of 2884 1708 Newofff.exe 34 PID 1708 wrote to memory of 2884 1708 Newofff.exe 34 PID 1708 wrote to memory of 2884 1708 Newofff.exe 34 PID 2884 wrote to memory of 2536 2884 Hkbsse.exe 36 PID 2884 wrote to memory of 2536 2884 Hkbsse.exe 36 PID 2884 wrote to memory of 2536 2884 Hkbsse.exe 36 PID 2884 wrote to memory of 2536 2884 Hkbsse.exe 36 PID 2536 wrote to memory of 1980 2536 JavUmar1.exe 38 PID 2536 wrote to memory of 1980 2536 JavUmar1.exe 38 PID 2536 wrote to memory of 1980 2536 JavUmar1.exe 38 PID 2536 wrote to memory of 1980 2536 JavUmar1.exe 38 PID 2536 wrote to memory of 708 2536 JavUmar1.exe 39 PID 2536 wrote to memory of 708 2536 JavUmar1.exe 39 PID 2536 wrote to memory of 708 2536 JavUmar1.exe 39 PID 2536 wrote to memory of 708 2536 JavUmar1.exe 39 PID 936 wrote to memory of 1992 936 taskeng.exe 42 PID 936 wrote to memory of 1992 936 taskeng.exe 42 PID 936 wrote to memory of 1992 936 taskeng.exe 42 PID 936 wrote to memory of 1992 936 taskeng.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe"C:\Users\Admin\AppData\Local\Temp\6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:272 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\1000477001\Newofff.exe"C:\Users\Admin\AppData\Local\Temp\1000477001\Newofff.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\1000098001\JavUmar1.exe"C:\Users\Admin\AppData\Local\Temp\1000098001\JavUmar1.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1980
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:708
-
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {9C075855-5D39-4F0C-8967-0A3DE5DAE570} S-1-5-21-2039016743-699959520-214465309-1000:PIDEURYY\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1992
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.9MB
MD50ddaf55ff5b6daf269845dee74b4f24b
SHA19b9363db8deadeee5803ce1751230fb56d776501
SHA2566798b30915ded323d8ca7f310a7d518cfa5de39bcc20ae984c9a3b65ccbeb941
SHA512262dab88704c4aff25f7b802759699ad1c712c227ec8afad5354ed2f37ef8a5510edaf692eb39e95f9dac695990176ad78e1720044343a855069b042dd09d763
-
Filesize
416KB
MD5f5d7b79ee6b6da6b50e536030bcc3b59
SHA1751b555a8eede96d55395290f60adc43b28ba5e2
SHA2562f1aff28961ba0ce85ea0e35b8936bc387f84f459a4a1d63d964ce79e34b8459
SHA512532b17cd2a6ac5172b1ddba1e63edd51ab53a4527204415241e3a78e8ffeb9728071bde5ae1eefabefd2627f00963f8a5458668cd7b8df041c8683252ff56b46
-
Filesize
1.8MB
MD5a5a80ebfc812f7f5117e1c290d03c66f
SHA195adf3f585ff1b332973752f27edeeca5049452a
SHA2566fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017
SHA5126308155f9dcd7ae7f15da0fe7a71bbe7aa910b05abbbad036b2c1a6f473dbdc955f4e7d0cdf167206409877d07ce06d655f085ad89a5a17792f0ae3c14f253f6