Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/11/2024, 02:08

General

  • Target

    174595892c7337fea83a7dd094ec5742ada5ad23d88c6b215ee1622794ebd518.exe

  • Size

    1.8MB

  • MD5

    0d8215079b1f4b7c08f6a6b5acdaa2dc

  • SHA1

    50561d1f4d3e9fb29768354052eb18a1620cca9b

  • SHA256

    174595892c7337fea83a7dd094ec5742ada5ad23d88c6b215ee1622794ebd518

  • SHA512

    ed617dcc63126b5725c02dbd0eacac085c49f730bfa6c5a692a431b237df33f803ceed6798f163fbec2102c8f5263b7fe3a7e22b7b46cfeccff7aaf967653d85

  • SSDEEP

    49152:YTdvdrLAFFn5sMLymql2oJ58B66c0zv5fh4qiW7UQ:AVr8FFn5s/mql2oJu6w53UQ

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

lumma

C2

https://navygenerayk.store/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Identifies Wine through registry keys 2 TTPs 6 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\174595892c7337fea83a7dd094ec5742ada5ad23d88c6b215ee1622794ebd518.exe
    "C:\Users\Admin\AppData\Local\Temp\174595892c7337fea83a7dd094ec5742ada5ad23d88c6b215ee1622794ebd518.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:60
    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
      "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1936
      • C:\Users\Admin\AppData\Local\Temp\1002552001\ha7dur10.exe
        "C:\Users\Admin\AppData\Local\Temp\1002552001\ha7dur10.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1152
        • C:\Windows\Temp\{9096EB3F-3973-4561-8D32-0E97D18D766A}\.cr\ha7dur10.exe
          "C:\Windows\Temp\{9096EB3F-3973-4561-8D32-0E97D18D766A}\.cr\ha7dur10.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\1002552001\ha7dur10.exe" -burn.filehandle.attached=540 -burn.filehandle.self=692
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3668
          • C:\Windows\Temp\{B1285FF5-2F84-4489-8186-670D26D33B25}\.ba\Newfts.exe
            "C:\Windows\Temp\{B1285FF5-2F84-4489-8186-670D26D33B25}\.ba\Newfts.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3776
            • C:\Users\Admin\AppData\Roaming\Fbhost_alpha\Newfts.exe
              C:\Users\Admin\AppData\Roaming\Fbhost_alpha\Newfts.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of WriteProcessMemory
              PID:2372
              • C:\Users\Admin\AppData\Roaming\Fbhost_alpha\tcpvcon.exe
                "C:\Users\Admin\AppData\Roaming\Fbhost_alpha\tcpvcon.exe" "C:\Users\Admin\AppData\Roaming\Fbhost_alpha\tcpvcon.exe" /accepteula
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2588
      • C:\Users\Admin\AppData\Local\Temp\1002617001\d37f2d874f.exe
        "C:\Users\Admin\AppData\Local\Temp\1002617001\d37f2d874f.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4068
      • C:\Users\Admin\AppData\Local\Temp\1002618001\30456414e8.exe
        "C:\Users\Admin\AppData\Local\Temp\1002618001\30456414e8.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1992
  • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
    C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:4820
  • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
    C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:2132

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1002552001\ha7dur10.exe

    Filesize

    8.4MB

    MD5

    2f8fd18eb8f7832baa360c7ea352fb4f

    SHA1

    e6e35646162c50941cb04767c3efb6e877800660

    SHA256

    6c68d28c2fd55a424a21ba96b76d383f652bbed8cb68d7fbfaafcd139a689e44

    SHA512

    1323985d00c239059d490357ee58d6ac70a804da77a706d793774ef1c8feeec52bc1b33ae01b9b51bb8ba787ebbed11b94e7f30c482ad9a7ee89a91bd6189434

  • C:\Users\Admin\AppData\Local\Temp\1002617001\d37f2d874f.exe

    Filesize

    1.7MB

    MD5

    59328e9917f1459c4d90ecf841ec1525

    SHA1

    0b95d543756d47bbf4cd688e0b0b7cd97e058261

    SHA256

    a2da48843061ab7aa3a6b30598184f5dc2246f84627385ead6780d75f19fcb2b

    SHA512

    3c49829464b2751a72326a08deee4b2bf386cfac3c2b52f80868403b9833b9b980de1bf7e343120aec8a404885196da09e6b461ab59dcdc78a9bf230e1f32231

  • C:\Users\Admin\AppData\Local\Temp\1002618001\30456414e8.exe

    Filesize

    3.2MB

    MD5

    0bab125045dae464c99cc5f6f1e7043c

    SHA1

    c976c3a92738e094aab5cad80ed01b70a8eabc89

    SHA256

    23b7371053b733774f77dac06256f6b2c33098a00accceeae845d6979017360a

    SHA512

    9a1a1f46b46060a75f4f6a9487c441366a3db583d5b8c5d7000762f769c99f3801e9756fd940b32ced87a83c21f13ab85e95f3d6892fc6efc0b08d793b868171

  • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe

    Filesize

    1.8MB

    MD5

    0d8215079b1f4b7c08f6a6b5acdaa2dc

    SHA1

    50561d1f4d3e9fb29768354052eb18a1620cca9b

    SHA256

    174595892c7337fea83a7dd094ec5742ada5ad23d88c6b215ee1622794ebd518

    SHA512

    ed617dcc63126b5725c02dbd0eacac085c49f730bfa6c5a692a431b237df33f803ceed6798f163fbec2102c8f5263b7fe3a7e22b7b46cfeccff7aaf967653d85

  • C:\Users\Admin\AppData\Roaming\Fbhost_alpha\tcpvcon.exe

    Filesize

    197KB

    MD5

    1cf39530d557ce880d7f71984928384f

    SHA1

    defeab729d8bad2fb35bfe18eb9b061dab1f2a79

    SHA256

    198995fecc0e38a2749b7e48c54112a959b77878683b726ee36430c4bacec196

    SHA512

    8ffd2e39e6213b6f8d2d51d424fbcb1c63a3099b4c952fce34a487a38f4d786e3f0c354eed598d20ddf176afe607292229b9b38182ad0219480e9c89f7d738de

  • C:\Windows\Temp\{9096EB3F-3973-4561-8D32-0E97D18D766A}\.cr\ha7dur10.exe

    Filesize

    8.1MB

    MD5

    8543de5d216f8112e80867337dec74db

    SHA1

    1cb2462e70718245cd4cb023576c74e2d4a9b213

    SHA256

    3cc98ab01aa1fb3ab9f6147ae0d0d7f82ad965f09520511ce1456eeb9aac7d58

    SHA512

    af285d51cf45e1b3a8caa89e0ce73d14c2ea76eb5cf72f09aa7fab97c486e349b5ebd0936f756e4ca8817f97182819aa1ede186a73c45c96f5d9ed138fdf8e12

  • C:\Windows\Temp\{B1285FF5-2F84-4489-8186-670D26D33B25}\.ba\Medial.dll

    Filesize

    312KB

    MD5

    1a4efbc6b661d10a1a4fdbe1a7fa54f0

    SHA1

    79f665dcb75db8d711728bab172e444cae2d8133

    SHA256

    b3baa312189da8828d8e3c2b8c20ad3df76da96908d961aa03fed98a61b9bc86

    SHA512

    7cbb77e084f0b8c1af1c7f0451fc0bddfb6b97bb0f9a563a982be8df8effb6816c0aa992448c354d3dc1b13520d440b67bb9e33bd03739e06dee7bf80d32ee39

  • C:\Windows\Temp\{B1285FF5-2F84-4489-8186-670D26D33B25}\.ba\Newfts.exe

    Filesize

    2.1MB

    MD5

    db7e67835fce6cf9889f0f68ca9c29a9

    SHA1

    5565afda37006a66f0e4546105be60bbe7970616

    SHA256

    dbd3057a58fd3407c95418bc5d9c253adc8c658ee338f22d58374ed3ea37b738

    SHA512

    bc2714bb408715e5e1cec1337b831e26dbda208183955a07ec8653a38c9c0f25f60f333a154b738927ce085e7bbff438963b941a6c2773b3e7325cd900e7651b

  • C:\Windows\Temp\{B1285FF5-2F84-4489-8186-670D26D33B25}\.ba\ProductStatistics3.dll

    Filesize

    1.1MB

    MD5

    59c15c71fd599ff745a862d0b8932919

    SHA1

    8384f88b4cac4694cf510ca0d3f867fd83cc9e18

    SHA256

    c4ed07ad748661ce776ac6ebb4f8bef7619586bfb4443ce58c92d4b889f3d5c2

    SHA512

    be3425d55dcaa361bc8481b87b2086454baca79a3c948de9acf9ef7d3084d6d987c328d665b45dfcd0510e2c97c980aa63d7cd669fe9fc1a67983c325593481e

  • C:\Windows\Temp\{B1285FF5-2F84-4489-8186-670D26D33B25}\.ba\RegisterIdr.dll

    Filesize

    1.4MB

    MD5

    0014da7457565c1e458919f5d4cb82c1

    SHA1

    76aebb8db4eddd04ffb2e0cb841701e1edde925a

    SHA256

    ab7e259f88801dc746e8877fbf4d6eb4216af7245139ca968eca19065227e2c1

    SHA512

    74dbcf6995575360ff0ff077667bcedf856333114b0e902ec7de7e25e068a6c412e486c0100f97a3df604487697e3b5c9e5243b377d3caa8bb09d59206bdc079

  • C:\Windows\Temp\{B1285FF5-2F84-4489-8186-670D26D33B25}\.ba\uidxudp

    Filesize

    7KB

    MD5

    06d205c486bfa3488ad9f480573b3c2f

    SHA1

    ea871113310da1bdc01ad1af4ca7e9975ebb3c06

    SHA256

    29b9952c056ab61ddfe859714cf5376d3e852753022bb40fd35dc473e82e35af

    SHA512

    cc2254033ef88ec745d27563e1205fdd87504cef096d9402961f35b8428f59f7a0aabfe4ba07154fb9be6fdcc54a2912cf86c5747adaf4f2a3f1ab8eb6713f2c

  • C:\Windows\Temp\{B1285FF5-2F84-4489-8186-670D26D33B25}\.ba\xja

    Filesize

    5.5MB

    MD5

    1d37dc833ae7612fb6b90de413ba8792

    SHA1

    d606b4f0bcd4c00597d78f789d3a9fc984d2aeb0

    SHA256

    9b25e0214a5b4335545d5fcc970edcfdea11c24c4ef951bace98ddfe09680ccc

    SHA512

    06ad8524df73f4710f642541823819dad7c519f556e1337ed244785bd46d69e7aa38d8f472d24be519ae5050c18590cd761c8079d50630deb643666fefb911fa

  • memory/60-4-0x0000000000430000-0x00000000008FD000-memory.dmp

    Filesize

    4.8MB

  • memory/60-1-0x0000000077EB4000-0x0000000077EB6000-memory.dmp

    Filesize

    8KB

  • memory/60-2-0x0000000000431000-0x000000000045F000-memory.dmp

    Filesize

    184KB

  • memory/60-0-0x0000000000430000-0x00000000008FD000-memory.dmp

    Filesize

    4.8MB

  • memory/60-3-0x0000000000430000-0x00000000008FD000-memory.dmp

    Filesize

    4.8MB

  • memory/60-15-0x0000000000430000-0x00000000008FD000-memory.dmp

    Filesize

    4.8MB

  • memory/1936-91-0x00000000009B0000-0x0000000000E7D000-memory.dmp

    Filesize

    4.8MB

  • memory/1936-157-0x00000000009B0000-0x0000000000E7D000-memory.dmp

    Filesize

    4.8MB

  • memory/1936-159-0x00000000009B0000-0x0000000000E7D000-memory.dmp

    Filesize

    4.8MB

  • memory/1936-70-0x00000000009B0000-0x0000000000E7D000-memory.dmp

    Filesize

    4.8MB

  • memory/1936-20-0x00000000009B0000-0x0000000000E7D000-memory.dmp

    Filesize

    4.8MB

  • memory/1936-21-0x00000000009B0000-0x0000000000E7D000-memory.dmp

    Filesize

    4.8MB

  • memory/1936-136-0x00000000009B0000-0x0000000000E7D000-memory.dmp

    Filesize

    4.8MB

  • memory/1936-158-0x00000000009B0000-0x0000000000E7D000-memory.dmp

    Filesize

    4.8MB

  • memory/1936-95-0x00000000009B0000-0x0000000000E7D000-memory.dmp

    Filesize

    4.8MB

  • memory/1936-17-0x00000000009B0000-0x0000000000E7D000-memory.dmp

    Filesize

    4.8MB

  • memory/1936-19-0x00000000009B0000-0x0000000000E7D000-memory.dmp

    Filesize

    4.8MB

  • memory/1936-160-0x00000000009B0000-0x0000000000E7D000-memory.dmp

    Filesize

    4.8MB

  • memory/1936-18-0x00000000009B1000-0x00000000009DF000-memory.dmp

    Filesize

    184KB

  • memory/1936-156-0x00000000009B0000-0x0000000000E7D000-memory.dmp

    Filesize

    4.8MB

  • memory/1936-107-0x00000000009B0000-0x0000000000E7D000-memory.dmp

    Filesize

    4.8MB

  • memory/1936-23-0x00000000009B0000-0x0000000000E7D000-memory.dmp

    Filesize

    4.8MB

  • memory/1936-22-0x00000000009B0000-0x0000000000E7D000-memory.dmp

    Filesize

    4.8MB

  • memory/1936-153-0x00000000009B0000-0x0000000000E7D000-memory.dmp

    Filesize

    4.8MB

  • memory/1936-152-0x00000000009B0000-0x0000000000E7D000-memory.dmp

    Filesize

    4.8MB

  • memory/1936-112-0x00000000009B0000-0x0000000000E7D000-memory.dmp

    Filesize

    4.8MB

  • memory/1992-90-0x0000000000880000-0x0000000000BAB000-memory.dmp

    Filesize

    3.2MB

  • memory/1992-88-0x0000000000880000-0x0000000000BAB000-memory.dmp

    Filesize

    3.2MB

  • memory/2132-155-0x00000000009B0000-0x0000000000E7D000-memory.dmp

    Filesize

    4.8MB

  • memory/2372-141-0x0000000073DA0000-0x0000000073F1B000-memory.dmp

    Filesize

    1.5MB

  • memory/2372-148-0x0000000073DA0000-0x0000000073F1B000-memory.dmp

    Filesize

    1.5MB

  • memory/2372-137-0x0000000000400000-0x0000000000669000-memory.dmp

    Filesize

    2.4MB

  • memory/2372-139-0x0000000002E40000-0x0000000002FB2000-memory.dmp

    Filesize

    1.4MB

  • memory/2372-138-0x0000000002AE0000-0x0000000002BFE000-memory.dmp

    Filesize

    1.1MB

  • memory/2372-134-0x0000000002E40000-0x0000000002FB2000-memory.dmp

    Filesize

    1.4MB

  • memory/2372-142-0x00007FFEDFA70000-0x00007FFEDFC65000-memory.dmp

    Filesize

    2.0MB

  • memory/2372-144-0x0000000073DA0000-0x0000000073F1B000-memory.dmp

    Filesize

    1.5MB

  • memory/3776-115-0x00007FFEDFA70000-0x00007FFEDFC65000-memory.dmp

    Filesize

    2.0MB

  • memory/3776-114-0x0000000073390000-0x000000007350B000-memory.dmp

    Filesize

    1.5MB

  • memory/3776-109-0x0000000000400000-0x0000000000669000-memory.dmp

    Filesize

    2.4MB

  • memory/3776-110-0x0000000002AE0000-0x0000000002BFE000-memory.dmp

    Filesize

    1.1MB

  • memory/3776-111-0x0000000002F10000-0x0000000003082000-memory.dmp

    Filesize

    1.4MB

  • memory/3776-106-0x0000000002F10000-0x0000000003082000-memory.dmp

    Filesize

    1.4MB

  • memory/3776-102-0x0000000002AE0000-0x0000000002BFE000-memory.dmp

    Filesize

    1.1MB

  • memory/4068-73-0x00000000003A0000-0x0000000000A38000-memory.dmp

    Filesize

    6.6MB

  • memory/4068-72-0x00000000003A0000-0x0000000000A38000-memory.dmp

    Filesize

    6.6MB

  • memory/4820-94-0x00000000009B0000-0x0000000000E7D000-memory.dmp

    Filesize

    4.8MB