Analysis
-
max time kernel
143s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 02:48
Static task
static1
Behavioral task
behavioral1
Sample
b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe
Resource
win7-20240729-en
General
-
Target
b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe
-
Size
1.8MB
-
MD5
d2a8b6cdfaf14a244d67ed5a6d4ef96b
-
SHA1
1e1e724ddbcd0e9a1bef3329fbf7a4bdf678fcd0
-
SHA256
b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8
-
SHA512
3278f33946775cedcaaa92431fc438c638bcf70db47ae5f8096cff3fdabad826d6bc32997ec459dac4d95d1e24ed383803ec5f8e97f8168c1d5d8575cc86a9fe
-
SSDEEP
49152:HrsIs20hN29fIuGt/GU7YyyxviJiUQxJ907xvqM07bLGNH:HrdsFN29fIXGuWxa5MJ9A
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://necklacedmny.store/api
https://founpiuer.store/api
https://navygenerayk.store/api
Signatures
-
Amadey family
-
Lumma family
-
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4920 created 3424 4920 gdn5yfjd.exe 56 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ gdn5yfjd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2dee000306.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b491cbdffb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion gdn5yfjd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2dee000306.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2dee000306.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion gdn5yfjd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b491cbdffb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b491cbdffb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation gdn5yfjd.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TypeId.vbs gdn5yfjd.exe -
Executes dropped EXE 6 IoCs
pid Process 948 axplong.exe 4920 gdn5yfjd.exe 1732 2dee000306.exe 4124 b491cbdffb.exe 3324 axplong.exe 540 axplong.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 2dee000306.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine b491cbdffb.exe -
resource yara_rule behavioral2/files/0x0007000000023c8d-28.dat themida behavioral2/memory/4920-45-0x0000000000400000-0x000000000184E000-memory.dmp themida behavioral2/memory/4920-46-0x0000000000400000-0x000000000184E000-memory.dmp themida behavioral2/memory/4920-1330-0x0000000000400000-0x000000000184E000-memory.dmp themida -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2dee000306.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1001812001\\2dee000306.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b491cbdffb.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1001813001\\b491cbdffb.exe" axplong.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA gdn5yfjd.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 440 b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe 948 axplong.exe 4920 gdn5yfjd.exe 1732 2dee000306.exe 4124 b491cbdffb.exe 3324 axplong.exe 540 axplong.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4920 set thread context of 3412 4920 gdn5yfjd.exe 105 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gdn5yfjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2dee000306.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b491cbdffb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 440 b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe 440 b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe 948 axplong.exe 948 axplong.exe 4920 gdn5yfjd.exe 4920 gdn5yfjd.exe 1732 2dee000306.exe 1732 2dee000306.exe 4124 b491cbdffb.exe 4124 b491cbdffb.exe 1688 powershell.exe 1688 powershell.exe 1688 powershell.exe 3324 axplong.exe 3324 axplong.exe 4920 gdn5yfjd.exe 540 axplong.exe 540 axplong.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4920 gdn5yfjd.exe Token: SeDebugPrivilege 1688 powershell.exe Token: SeDebugPrivilege 4920 gdn5yfjd.exe Token: SeDebugPrivilege 3412 InstallUtil.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 440 b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 440 wrote to memory of 948 440 b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe 86 PID 440 wrote to memory of 948 440 b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe 86 PID 440 wrote to memory of 948 440 b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe 86 PID 948 wrote to memory of 4920 948 axplong.exe 96 PID 948 wrote to memory of 4920 948 axplong.exe 96 PID 948 wrote to memory of 4920 948 axplong.exe 96 PID 948 wrote to memory of 1732 948 axplong.exe 97 PID 948 wrote to memory of 1732 948 axplong.exe 97 PID 948 wrote to memory of 1732 948 axplong.exe 97 PID 948 wrote to memory of 4124 948 axplong.exe 99 PID 948 wrote to memory of 4124 948 axplong.exe 99 PID 948 wrote to memory of 4124 948 axplong.exe 99 PID 4920 wrote to memory of 1688 4920 gdn5yfjd.exe 100 PID 4920 wrote to memory of 1688 4920 gdn5yfjd.exe 100 PID 4920 wrote to memory of 1688 4920 gdn5yfjd.exe 100 PID 4920 wrote to memory of 3412 4920 gdn5yfjd.exe 105 PID 4920 wrote to memory of 3412 4920 gdn5yfjd.exe 105 PID 4920 wrote to memory of 3412 4920 gdn5yfjd.exe 105 PID 4920 wrote to memory of 3412 4920 gdn5yfjd.exe 105 PID 4920 wrote to memory of 3412 4920 gdn5yfjd.exe 105 PID 4920 wrote to memory of 3412 4920 gdn5yfjd.exe 105 PID 4920 wrote to memory of 3412 4920 gdn5yfjd.exe 105 PID 4920 wrote to memory of 3412 4920 gdn5yfjd.exe 105
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe"C:\Users\Admin\AppData\Local\Temp\b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Local\Temp\1001791001\gdn5yfjd.exe"C:\Users\Admin\AppData\Local\Temp\1001791001\gdn5yfjd.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001812001\2dee000306.exe"C:\Users\Admin\AppData\Local\Temp\1001812001\2dee000306.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\1001813001\b491cbdffb.exe"C:\Users\Admin\AppData\Local\Temp\1001813001\b491cbdffb.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4124
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3412
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3324
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.5MB
MD50143accc4350dcc3d211d0453f0db35c
SHA190a15d873d020b9e89c81c3240835ea939302ead
SHA25676089a25e76533661a8e8712847e024151b6c7b390634edd8cf1968d04917e57
SHA51236d5e9ff52d31f00f494a9f7bb840a0c37f8aaec065e633fdb6a3509745a5c2fdabcc47e6a6779ce9c019aedbc997770f59e10ab24203f17bf3bd1bb976c483f
-
Filesize
2.0MB
MD565ed3bcfe7c423aef11ad136275bab5f
SHA1572cbb3be18d27ceacbcfedd09e40e51cfe598f7
SHA256b2aa0446dc6a4f25c4f083155b7b237d66a432f6255d65b85ab524f596935345
SHA512329a3406855b4585dd7b2413afa0ad2307980aafa2b5c00cdce2a835dc2dcc7e83b439b6e5f94f512494f8737a67413e64a0a9ac726496381f2d98143bf3d672
-
Filesize
2.8MB
MD5c695df1872b28812321df9528ed0fe35
SHA10fb47357f0f8a70cf0b6f20c867d5bb210015e83
SHA256636832ede50a4ce20c3d26c15012738d15f833b823ae22cadf4615e44e892e04
SHA512a68ff1389bfa5a4aef3d3378dd6240ed6452128c1d1a849fdfd7662b2d400cd6a414f4a45b3d231c63db4a61ee39a6baded65df6e36ff9627d083dbddcbd7ad1
-
Filesize
1.8MB
MD5d2a8b6cdfaf14a244d67ed5a6d4ef96b
SHA11e1e724ddbcd0e9a1bef3329fbf7a4bdf678fcd0
SHA256b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8
SHA5123278f33946775cedcaaa92431fc438c638bcf70db47ae5f8096cff3fdabad826d6bc32997ec459dac4d95d1e24ed383803ec5f8e97f8168c1d5d8575cc86a9fe
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82