Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 02:08
Static task
static1
Behavioral task
behavioral1
Sample
174595892c7337fea83a7dd094ec5742ada5ad23d88c6b215ee1622794ebd518.exe
Resource
win7-20240729-en
General
-
Target
174595892c7337fea83a7dd094ec5742ada5ad23d88c6b215ee1622794ebd518.exe
-
Size
1.8MB
-
MD5
0d8215079b1f4b7c08f6a6b5acdaa2dc
-
SHA1
50561d1f4d3e9fb29768354052eb18a1620cca9b
-
SHA256
174595892c7337fea83a7dd094ec5742ada5ad23d88c6b215ee1622794ebd518
-
SHA512
ed617dcc63126b5725c02dbd0eacac085c49f730bfa6c5a692a431b237df33f803ceed6798f163fbec2102c8f5263b7fe3a7e22b7b46cfeccff7aaf967653d85
-
SSDEEP
49152:YTdvdrLAFFn5sMLymql2oJ58B66c0zv5fh4qiW7UQ:AVr8FFn5s/mql2oJu6w53UQ
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
lumma
https://navygenerayk.store/api
Signatures
-
Amadey family
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 174595892c7337fea83a7dd094ec5742ada5ad23d88c6b215ee1622794ebd518.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d37f2d874f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 30456414e8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d37f2d874f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 30456414e8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 30456414e8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 174595892c7337fea83a7dd094ec5742ada5ad23d88c6b215ee1622794ebd518.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 174595892c7337fea83a7dd094ec5742ada5ad23d88c6b215ee1622794ebd518.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d37f2d874f.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 174595892c7337fea83a7dd094ec5742ada5ad23d88c6b215ee1622794ebd518.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation axplong.exe -
Executes dropped EXE 10 IoCs
pid Process 1936 axplong.exe 1152 ha7dur10.exe 3668 ha7dur10.exe 4068 d37f2d874f.exe 1992 30456414e8.exe 4820 axplong.exe 3776 Newfts.exe 2372 Newfts.exe 2588 tcpvcon.exe 2132 axplong.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 174595892c7337fea83a7dd094ec5742ada5ad23d88c6b215ee1622794ebd518.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine d37f2d874f.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 30456414e8.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine axplong.exe -
Loads dropped DLL 9 IoCs
pid Process 3668 ha7dur10.exe 3776 Newfts.exe 3776 Newfts.exe 3776 Newfts.exe 3776 Newfts.exe 2372 Newfts.exe 2372 Newfts.exe 2372 Newfts.exe 2372 Newfts.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d37f2d874f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1002617001\\d37f2d874f.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\30456414e8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1002618001\\30456414e8.exe" axplong.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 60 174595892c7337fea83a7dd094ec5742ada5ad23d88c6b215ee1622794ebd518.exe 1936 axplong.exe 4068 d37f2d874f.exe 1992 30456414e8.exe 4820 axplong.exe 2132 axplong.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job 174595892c7337fea83a7dd094ec5742ada5ad23d88c6b215ee1622794ebd518.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ha7dur10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30456414e8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Newfts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tcpvcon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 174595892c7337fea83a7dd094ec5742ada5ad23d88c6b215ee1622794ebd518.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ha7dur10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d37f2d874f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Newfts.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 60 174595892c7337fea83a7dd094ec5742ada5ad23d88c6b215ee1622794ebd518.exe 60 174595892c7337fea83a7dd094ec5742ada5ad23d88c6b215ee1622794ebd518.exe 1936 axplong.exe 1936 axplong.exe 4068 d37f2d874f.exe 4068 d37f2d874f.exe 1992 30456414e8.exe 1992 30456414e8.exe 4820 axplong.exe 4820 axplong.exe 3776 Newfts.exe 2372 Newfts.exe 2372 Newfts.exe 2588 tcpvcon.exe 2588 tcpvcon.exe 2132 axplong.exe 2132 axplong.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2372 Newfts.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2588 tcpvcon.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 60 174595892c7337fea83a7dd094ec5742ada5ad23d88c6b215ee1622794ebd518.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 60 wrote to memory of 1936 60 174595892c7337fea83a7dd094ec5742ada5ad23d88c6b215ee1622794ebd518.exe 86 PID 60 wrote to memory of 1936 60 174595892c7337fea83a7dd094ec5742ada5ad23d88c6b215ee1622794ebd518.exe 86 PID 60 wrote to memory of 1936 60 174595892c7337fea83a7dd094ec5742ada5ad23d88c6b215ee1622794ebd518.exe 86 PID 1936 wrote to memory of 1152 1936 axplong.exe 94 PID 1936 wrote to memory of 1152 1936 axplong.exe 94 PID 1936 wrote to memory of 1152 1936 axplong.exe 94 PID 1152 wrote to memory of 3668 1152 ha7dur10.exe 95 PID 1152 wrote to memory of 3668 1152 ha7dur10.exe 95 PID 1152 wrote to memory of 3668 1152 ha7dur10.exe 95 PID 1936 wrote to memory of 4068 1936 axplong.exe 96 PID 1936 wrote to memory of 4068 1936 axplong.exe 96 PID 1936 wrote to memory of 4068 1936 axplong.exe 96 PID 1936 wrote to memory of 1992 1936 axplong.exe 97 PID 1936 wrote to memory of 1992 1936 axplong.exe 97 PID 1936 wrote to memory of 1992 1936 axplong.exe 97 PID 3668 wrote to memory of 3776 3668 ha7dur10.exe 101 PID 3668 wrote to memory of 3776 3668 ha7dur10.exe 101 PID 3668 wrote to memory of 3776 3668 ha7dur10.exe 101 PID 3776 wrote to memory of 2372 3776 Newfts.exe 102 PID 3776 wrote to memory of 2372 3776 Newfts.exe 102 PID 3776 wrote to memory of 2372 3776 Newfts.exe 102 PID 2372 wrote to memory of 2588 2372 Newfts.exe 103 PID 2372 wrote to memory of 2588 2372 Newfts.exe 103 PID 2372 wrote to memory of 2588 2372 Newfts.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\174595892c7337fea83a7dd094ec5742ada5ad23d88c6b215ee1622794ebd518.exe"C:\Users\Admin\AppData\Local\Temp\174595892c7337fea83a7dd094ec5742ada5ad23d88c6b215ee1622794ebd518.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\1002552001\ha7dur10.exe"C:\Users\Admin\AppData\Local\Temp\1002552001\ha7dur10.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\Temp\{9096EB3F-3973-4561-8D32-0E97D18D766A}\.cr\ha7dur10.exe"C:\Windows\Temp\{9096EB3F-3973-4561-8D32-0E97D18D766A}\.cr\ha7dur10.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\1002552001\ha7dur10.exe" -burn.filehandle.attached=540 -burn.filehandle.self=6924⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\Temp\{B1285FF5-2F84-4489-8186-670D26D33B25}\.ba\Newfts.exe"C:\Windows\Temp\{B1285FF5-2F84-4489-8186-670D26D33B25}\.ba\Newfts.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Users\Admin\AppData\Roaming\Fbhost_alpha\Newfts.exeC:\Users\Admin\AppData\Roaming\Fbhost_alpha\Newfts.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Roaming\Fbhost_alpha\tcpvcon.exe"C:\Users\Admin\AppData\Roaming\Fbhost_alpha\tcpvcon.exe" "C:\Users\Admin\AppData\Roaming\Fbhost_alpha\tcpvcon.exe" /accepteula7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2588
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1002617001\d37f2d874f.exe"C:\Users\Admin\AppData\Local\Temp\1002617001\d37f2d874f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4068
-
-
C:\Users\Admin\AppData\Local\Temp\1002618001\30456414e8.exe"C:\Users\Admin\AppData\Local\Temp\1002618001\30456414e8.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1992
-
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4820
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.4MB
MD52f8fd18eb8f7832baa360c7ea352fb4f
SHA1e6e35646162c50941cb04767c3efb6e877800660
SHA2566c68d28c2fd55a424a21ba96b76d383f652bbed8cb68d7fbfaafcd139a689e44
SHA5121323985d00c239059d490357ee58d6ac70a804da77a706d793774ef1c8feeec52bc1b33ae01b9b51bb8ba787ebbed11b94e7f30c482ad9a7ee89a91bd6189434
-
Filesize
1.7MB
MD559328e9917f1459c4d90ecf841ec1525
SHA10b95d543756d47bbf4cd688e0b0b7cd97e058261
SHA256a2da48843061ab7aa3a6b30598184f5dc2246f84627385ead6780d75f19fcb2b
SHA5123c49829464b2751a72326a08deee4b2bf386cfac3c2b52f80868403b9833b9b980de1bf7e343120aec8a404885196da09e6b461ab59dcdc78a9bf230e1f32231
-
Filesize
3.2MB
MD50bab125045dae464c99cc5f6f1e7043c
SHA1c976c3a92738e094aab5cad80ed01b70a8eabc89
SHA25623b7371053b733774f77dac06256f6b2c33098a00accceeae845d6979017360a
SHA5129a1a1f46b46060a75f4f6a9487c441366a3db583d5b8c5d7000762f769c99f3801e9756fd940b32ced87a83c21f13ab85e95f3d6892fc6efc0b08d793b868171
-
Filesize
1.8MB
MD50d8215079b1f4b7c08f6a6b5acdaa2dc
SHA150561d1f4d3e9fb29768354052eb18a1620cca9b
SHA256174595892c7337fea83a7dd094ec5742ada5ad23d88c6b215ee1622794ebd518
SHA512ed617dcc63126b5725c02dbd0eacac085c49f730bfa6c5a692a431b237df33f803ceed6798f163fbec2102c8f5263b7fe3a7e22b7b46cfeccff7aaf967653d85
-
Filesize
197KB
MD51cf39530d557ce880d7f71984928384f
SHA1defeab729d8bad2fb35bfe18eb9b061dab1f2a79
SHA256198995fecc0e38a2749b7e48c54112a959b77878683b726ee36430c4bacec196
SHA5128ffd2e39e6213b6f8d2d51d424fbcb1c63a3099b4c952fce34a487a38f4d786e3f0c354eed598d20ddf176afe607292229b9b38182ad0219480e9c89f7d738de
-
Filesize
8.1MB
MD58543de5d216f8112e80867337dec74db
SHA11cb2462e70718245cd4cb023576c74e2d4a9b213
SHA2563cc98ab01aa1fb3ab9f6147ae0d0d7f82ad965f09520511ce1456eeb9aac7d58
SHA512af285d51cf45e1b3a8caa89e0ce73d14c2ea76eb5cf72f09aa7fab97c486e349b5ebd0936f756e4ca8817f97182819aa1ede186a73c45c96f5d9ed138fdf8e12
-
Filesize
312KB
MD51a4efbc6b661d10a1a4fdbe1a7fa54f0
SHA179f665dcb75db8d711728bab172e444cae2d8133
SHA256b3baa312189da8828d8e3c2b8c20ad3df76da96908d961aa03fed98a61b9bc86
SHA5127cbb77e084f0b8c1af1c7f0451fc0bddfb6b97bb0f9a563a982be8df8effb6816c0aa992448c354d3dc1b13520d440b67bb9e33bd03739e06dee7bf80d32ee39
-
Filesize
2.1MB
MD5db7e67835fce6cf9889f0f68ca9c29a9
SHA15565afda37006a66f0e4546105be60bbe7970616
SHA256dbd3057a58fd3407c95418bc5d9c253adc8c658ee338f22d58374ed3ea37b738
SHA512bc2714bb408715e5e1cec1337b831e26dbda208183955a07ec8653a38c9c0f25f60f333a154b738927ce085e7bbff438963b941a6c2773b3e7325cd900e7651b
-
Filesize
1.1MB
MD559c15c71fd599ff745a862d0b8932919
SHA18384f88b4cac4694cf510ca0d3f867fd83cc9e18
SHA256c4ed07ad748661ce776ac6ebb4f8bef7619586bfb4443ce58c92d4b889f3d5c2
SHA512be3425d55dcaa361bc8481b87b2086454baca79a3c948de9acf9ef7d3084d6d987c328d665b45dfcd0510e2c97c980aa63d7cd669fe9fc1a67983c325593481e
-
Filesize
1.4MB
MD50014da7457565c1e458919f5d4cb82c1
SHA176aebb8db4eddd04ffb2e0cb841701e1edde925a
SHA256ab7e259f88801dc746e8877fbf4d6eb4216af7245139ca968eca19065227e2c1
SHA51274dbcf6995575360ff0ff077667bcedf856333114b0e902ec7de7e25e068a6c412e486c0100f97a3df604487697e3b5c9e5243b377d3caa8bb09d59206bdc079
-
Filesize
7KB
MD506d205c486bfa3488ad9f480573b3c2f
SHA1ea871113310da1bdc01ad1af4ca7e9975ebb3c06
SHA25629b9952c056ab61ddfe859714cf5376d3e852753022bb40fd35dc473e82e35af
SHA512cc2254033ef88ec745d27563e1205fdd87504cef096d9402961f35b8428f59f7a0aabfe4ba07154fb9be6fdcc54a2912cf86c5747adaf4f2a3f1ab8eb6713f2c
-
Filesize
5.5MB
MD51d37dc833ae7612fb6b90de413ba8792
SHA1d606b4f0bcd4c00597d78f789d3a9fc984d2aeb0
SHA2569b25e0214a5b4335545d5fcc970edcfdea11c24c4ef951bace98ddfe09680ccc
SHA51206ad8524df73f4710f642541823819dad7c519f556e1337ed244785bd46d69e7aa38d8f472d24be519ae5050c18590cd761c8079d50630deb643666fefb911fa