Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2024 23:21
Static task
static1
Behavioral task
behavioral1
Sample
6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe
Resource
win7-20241010-en
General
-
Target
6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe
-
Size
1.8MB
-
MD5
a5a80ebfc812f7f5117e1c290d03c66f
-
SHA1
95adf3f585ff1b332973752f27edeeca5049452a
-
SHA256
6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017
-
SHA512
6308155f9dcd7ae7f15da0fe7a71bbe7aa910b05abbbad036b2c1a6f473dbdc955f4e7d0cdf167206409877d07ce06d655f085ad89a5a17792f0ae3c14f253f6
-
SSDEEP
49152:lZ0tauquw+6eEtsK6OsWVkCv17Uo35biaJT:lZ0Quq6EtUHCvZb3T
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Signatures
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral2/memory/1852-74-0x0000000069CC0000-0x000000006A37B000-memory.dmp family_cryptbot_v3 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Newofff.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Hkbsse.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation JavUmar1.exe -
Executes dropped EXE 11 IoCs
pid Process 2356 axplong.exe 4660 axplong.exe 4436 Newofff.exe 1520 Hkbsse.exe 1852 JavUmar1.exe 1560 axplong.exe 2404 Hkbsse.exe 2024 service123.exe 4880 Hkbsse.exe 1216 axplong.exe 3720 service123.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine axplong.exe -
Loads dropped DLL 2 IoCs
pid Process 2024 service123.exe 3720 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 4640 6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe 2356 axplong.exe 4660 axplong.exe 1560 axplong.exe 1216 axplong.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job 6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe File created C:\Windows\Tasks\Hkbsse.job Newofff.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Newofff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkbsse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JavUmar1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JavUmar1.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JavUmar1.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3596 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4640 6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe 4640 6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe 2356 axplong.exe 2356 axplong.exe 4660 axplong.exe 4660 axplong.exe 1560 axplong.exe 1560 axplong.exe 1216 axplong.exe 1216 axplong.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4640 wrote to memory of 2356 4640 6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe 87 PID 4640 wrote to memory of 2356 4640 6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe 87 PID 4640 wrote to memory of 2356 4640 6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe 87 PID 2356 wrote to memory of 4436 2356 axplong.exe 96 PID 2356 wrote to memory of 4436 2356 axplong.exe 96 PID 2356 wrote to memory of 4436 2356 axplong.exe 96 PID 4436 wrote to memory of 1520 4436 Newofff.exe 97 PID 4436 wrote to memory of 1520 4436 Newofff.exe 97 PID 4436 wrote to memory of 1520 4436 Newofff.exe 97 PID 1520 wrote to memory of 1852 1520 Hkbsse.exe 104 PID 1520 wrote to memory of 1852 1520 Hkbsse.exe 104 PID 1520 wrote to memory of 1852 1520 Hkbsse.exe 104 PID 1852 wrote to memory of 2024 1852 JavUmar1.exe 120 PID 1852 wrote to memory of 2024 1852 JavUmar1.exe 120 PID 1852 wrote to memory of 2024 1852 JavUmar1.exe 120 PID 1852 wrote to memory of 3596 1852 JavUmar1.exe 121 PID 1852 wrote to memory of 3596 1852 JavUmar1.exe 121 PID 1852 wrote to memory of 3596 1852 JavUmar1.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe"C:\Users\Admin\AppData\Local\Temp\6fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\1000477001\Newofff.exe"C:\Users\Admin\AppData\Local\Temp\1000477001\Newofff.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\1000098001\JavUmar1.exe"C:\Users\Admin\AppData\Local\Temp\1000098001\JavUmar1.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2024
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3596
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4660
-
C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe1⤵
- Executes dropped EXE
PID:2404
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1560
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1216
-
C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe1⤵
- Executes dropped EXE
PID:4880
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3720
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.9MB
MD50ddaf55ff5b6daf269845dee74b4f24b
SHA19b9363db8deadeee5803ce1751230fb56d776501
SHA2566798b30915ded323d8ca7f310a7d518cfa5de39bcc20ae984c9a3b65ccbeb941
SHA512262dab88704c4aff25f7b802759699ad1c712c227ec8afad5354ed2f37ef8a5510edaf692eb39e95f9dac695990176ad78e1720044343a855069b042dd09d763
-
Filesize
416KB
MD5f5d7b79ee6b6da6b50e536030bcc3b59
SHA1751b555a8eede96d55395290f60adc43b28ba5e2
SHA2562f1aff28961ba0ce85ea0e35b8936bc387f84f459a4a1d63d964ce79e34b8459
SHA512532b17cd2a6ac5172b1ddba1e63edd51ab53a4527204415241e3a78e8ffeb9728071bde5ae1eefabefd2627f00963f8a5458668cd7b8df041c8683252ff56b46
-
Filesize
1.8MB
MD5a5a80ebfc812f7f5117e1c290d03c66f
SHA195adf3f585ff1b332973752f27edeeca5049452a
SHA2566fefbaa7c5cb09a64b483a20030e7c6e8411def2a1c9bfc9432cf2636c0d2017
SHA5126308155f9dcd7ae7f15da0fe7a71bbe7aa910b05abbbad036b2c1a6f473dbdc955f4e7d0cdf167206409877d07ce06d655f085ad89a5a17792f0ae3c14f253f6