Analysis
-
max time kernel
112s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 21:14
Static task
static1
Behavioral task
behavioral1
Sample
e80171fd5b32206e71fed542c3cae3055217f5f590faf8daa155b4a362942e65N.exe
Resource
win7-20241010-en
General
-
Target
e80171fd5b32206e71fed542c3cae3055217f5f590faf8daa155b4a362942e65N.exe
-
Size
1.8MB
-
MD5
436ec8e845cbb9bcd7098b37be1c0610
-
SHA1
5149fff99b5fef0018f704566908816d838c064c
-
SHA256
e80171fd5b32206e71fed542c3cae3055217f5f590faf8daa155b4a362942e65
-
SHA512
7df98128ab269db1bef8e802f130d3d426133ea72a34f24bb299ec2980f373e7d6f4884d2b296d6633bf5ea82a716c37a8c55a494a9fc8e42f6d798896eac4b3
-
SSDEEP
49152:hHxYCcMZJv29KMiwObbQZwOU5X1kR/AEFktM:hHxYWPUi7vQHUxgEM
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://founpiuer.store/api
Signatures
-
Amadey family
-
Lumma family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 97ad328b28.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 67f6eb41af.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e80171fd5b32206e71fed542c3cae3055217f5f590faf8daa155b4a362942e65N.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e80171fd5b32206e71fed542c3cae3055217f5f590faf8daa155b4a362942e65N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 97ad328b28.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 97ad328b28.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 67f6eb41af.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e80171fd5b32206e71fed542c3cae3055217f5f590faf8daa155b4a362942e65N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 67f6eb41af.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation e80171fd5b32206e71fed542c3cae3055217f5f590faf8daa155b4a362942e65N.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation axplong.exe -
Executes dropped EXE 6 IoCs
pid Process 116 axplong.exe 4916 r42aoop5.exe 3832 97ad328b28.exe 3400 67f6eb41af.exe 2472 axplong.exe 2932 axplong.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 67f6eb41af.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine e80171fd5b32206e71fed542c3cae3055217f5f590faf8daa155b4a362942e65N.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 97ad328b28.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 r42aoop5.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\97ad328b28.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1002130001\\97ad328b28.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\67f6eb41af.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1002131001\\67f6eb41af.exe" axplong.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 3176 e80171fd5b32206e71fed542c3cae3055217f5f590faf8daa155b4a362942e65N.exe 116 axplong.exe 3832 97ad328b28.exe 3400 67f6eb41af.exe 2472 axplong.exe 2932 axplong.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job e80171fd5b32206e71fed542c3cae3055217f5f590faf8daa155b4a362942e65N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2080 3400 WerFault.exe 94 4748 3400 WerFault.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e80171fd5b32206e71fed542c3cae3055217f5f590faf8daa155b4a362942e65N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 97ad328b28.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 67f6eb41af.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3176 e80171fd5b32206e71fed542c3cae3055217f5f590faf8daa155b4a362942e65N.exe 3176 e80171fd5b32206e71fed542c3cae3055217f5f590faf8daa155b4a362942e65N.exe 116 axplong.exe 116 axplong.exe 3832 97ad328b28.exe 3832 97ad328b28.exe 3400 67f6eb41af.exe 3400 67f6eb41af.exe 2472 axplong.exe 2472 axplong.exe 4916 r42aoop5.exe 4916 r42aoop5.exe 2932 axplong.exe 2932 axplong.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4916 r42aoop5.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3176 wrote to memory of 116 3176 e80171fd5b32206e71fed542c3cae3055217f5f590faf8daa155b4a362942e65N.exe 86 PID 3176 wrote to memory of 116 3176 e80171fd5b32206e71fed542c3cae3055217f5f590faf8daa155b4a362942e65N.exe 86 PID 3176 wrote to memory of 116 3176 e80171fd5b32206e71fed542c3cae3055217f5f590faf8daa155b4a362942e65N.exe 86 PID 116 wrote to memory of 4916 116 axplong.exe 90 PID 116 wrote to memory of 4916 116 axplong.exe 90 PID 116 wrote to memory of 3832 116 axplong.exe 92 PID 116 wrote to memory of 3832 116 axplong.exe 92 PID 116 wrote to memory of 3832 116 axplong.exe 92 PID 116 wrote to memory of 3400 116 axplong.exe 94 PID 116 wrote to memory of 3400 116 axplong.exe 94 PID 116 wrote to memory of 3400 116 axplong.exe 94 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 r42aoop5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e80171fd5b32206e71fed542c3cae3055217f5f590faf8daa155b4a362942e65N.exe"C:\Users\Admin\AppData\Local\Temp\e80171fd5b32206e71fed542c3cae3055217f5f590faf8daa155b4a362942e65N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Admin\AppData\Local\Temp\1002107001\r42aoop5.exe"C:\Users\Admin\AppData\Local\Temp\1002107001\r42aoop5.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
PID:4916
-
-
C:\Users\Admin\AppData\Local\Temp\1002130001\97ad328b28.exe"C:\Users\Admin\AppData\Local\Temp\1002130001\97ad328b28.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3832
-
-
C:\Users\Admin\AppData\Local\Temp\1002131001\67f6eb41af.exe"C:\Users\Admin\AppData\Local\Temp\1002131001\67f6eb41af.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3400 -s 15244⤵
- Program crash
PID:2080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3400 -s 15004⤵
- Program crash
PID:4748
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3400 -ip 34001⤵PID:3740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 3400 -ip 34001⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2472
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2932
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5454e92ed1eb0eaada7fd93a1ac351358
SHA1952e9f201df8bccb8de4449198bfbc7bd3b7c9c8
SHA256b9525ba4f59a6a47eed1ef07ba7d30d8a73c4fbaf5a1f05d06a476e63541d7c3
SHA512ea9dc76096e2f2c011e42e5a159f14fc9e58a3f03b87cdd4ec55f1deeaa4267bd82413bd0ae77a0272a7a3e3659a7cd57c46a5295b8cfdf4da01bb449c8f5a0f
-
Filesize
2.0MB
MD5c17ed24e02488677c15a7f9af66a0aba
SHA1222cf4373cb4d9f05dccd3e2745a4b19cb4dd29f
SHA25661503aab6e8bb537631115556cf898894274211cae16c143081c2912532a018e
SHA512031737664e0233b9e3f96bb19263d6b02de181255c9ab78fc7d8bdebd7733e5e67652715222fdfcb6d1303648bdd01a8b5da6f21adf6ad85fafccdf16b7fb451
-
Filesize
3.0MB
MD5ba28052ecef3449530e0ea8d916fd71e
SHA148757c01438c59588a809862af2b61b225bc73fa
SHA256db5b59c0d354b53a3db4405d6ddda24e240d354180e703604ee5b8bb7e6d22ef
SHA51256ba2ef3f472e1ed691b0887058c72c7e2de7f4f4f6d18ce29f68b1dfd7e625e8c90043a5e15369d2bd4c0b1c6c9e7b9dd438086eb71cb282dd53b47b2743bda
-
Filesize
1.8MB
MD5436ec8e845cbb9bcd7098b37be1c0610
SHA15149fff99b5fef0018f704566908816d838c064c
SHA256e80171fd5b32206e71fed542c3cae3055217f5f590faf8daa155b4a362942e65
SHA5127df98128ab269db1bef8e802f130d3d426133ea72a34f24bb299ec2980f373e7d6f4884d2b296d6633bf5ea82a716c37a8c55a494a9fc8e42f6d798896eac4b3