Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11-11-2024 14:16
Static task
static1
Behavioral task
behavioral1
Sample
e80221eb09fa2b4e4de4048a68269f41a1b657ace42c1975111a785cc1582712.exe
Resource
win7-20241010-en
General
-
Target
e80221eb09fa2b4e4de4048a68269f41a1b657ace42c1975111a785cc1582712.exe
-
Size
1.8MB
-
MD5
3dd27665b6308911f1c8670054c1a4cd
-
SHA1
111e3ed45baf38fbaac055e5bf4e61eca1cfa996
-
SHA256
e80221eb09fa2b4e4de4048a68269f41a1b657ace42c1975111a785cc1582712
-
SHA512
7bf9215e4725a92d4b9bce9822060bc51f18116479cd29b37680ccc5d577552e784815449b9cd76787b77a2a7986e0625e2eab8bd62f722129f181876d30721d
-
SSDEEP
24576:ul44DmDyjQsrm6wy9W1ZUD4enKkDwQ56mvVBx4Fh2IS3omXl6/bXdFgVAvn/bGT/:t4DZjFrm699IkKVY3xlISYmXWdF5lq
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
lumma
https://scriptyprefej.store
https://navygenerayk.store
https://founpiuer.store
https://necklacedmny.store
https://thumbystriw.store
https://fadehairucw.store
https://crisiwarny.store
https://presticitpo.store
Signatures
-
Amadey family
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
Processes:
dc9bc9afe3.exe70340e13f8.exee80221eb09fa2b4e4de4048a68269f41a1b657ace42c1975111a785cc1582712.exeaxplong.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dc9bc9afe3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 70340e13f8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e80221eb09fa2b4e4de4048a68269f41a1b657ace42c1975111a785cc1582712.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
70340e13f8.exee80221eb09fa2b4e4de4048a68269f41a1b657ace42c1975111a785cc1582712.exeaxplong.exedc9bc9afe3.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 70340e13f8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e80221eb09fa2b4e4de4048a68269f41a1b657ace42c1975111a785cc1582712.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e80221eb09fa2b4e4de4048a68269f41a1b657ace42c1975111a785cc1582712.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dc9bc9afe3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dc9bc9afe3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 70340e13f8.exe -
Executes dropped EXE 3 IoCs
Processes:
axplong.exedc9bc9afe3.exe70340e13f8.exepid process 2224 axplong.exe 2764 dc9bc9afe3.exe 2772 70340e13f8.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
e80221eb09fa2b4e4de4048a68269f41a1b657ace42c1975111a785cc1582712.exeaxplong.exedc9bc9afe3.exe70340e13f8.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine e80221eb09fa2b4e4de4048a68269f41a1b657ace42c1975111a785cc1582712.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine dc9bc9afe3.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine 70340e13f8.exe -
Loads dropped DLL 6 IoCs
Processes:
e80221eb09fa2b4e4de4048a68269f41a1b657ace42c1975111a785cc1582712.exeaxplong.exepid process 1796 e80221eb09fa2b4e4de4048a68269f41a1b657ace42c1975111a785cc1582712.exe 1796 e80221eb09fa2b4e4de4048a68269f41a1b657ace42c1975111a785cc1582712.exe 2224 axplong.exe 2224 axplong.exe 2224 axplong.exe 2224 axplong.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
axplong.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\dc9bc9afe3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1002673001\\dc9bc9afe3.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\70340e13f8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1002674001\\70340e13f8.exe" axplong.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
e80221eb09fa2b4e4de4048a68269f41a1b657ace42c1975111a785cc1582712.exeaxplong.exedc9bc9afe3.exe70340e13f8.exepid process 1796 e80221eb09fa2b4e4de4048a68269f41a1b657ace42c1975111a785cc1582712.exe 2224 axplong.exe 2764 dc9bc9afe3.exe 2772 70340e13f8.exe -
Drops file in Windows directory 1 IoCs
Processes:
e80221eb09fa2b4e4de4048a68269f41a1b657ace42c1975111a785cc1582712.exedescription ioc process File created C:\Windows\Tasks\axplong.job e80221eb09fa2b4e4de4048a68269f41a1b657ace42c1975111a785cc1582712.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
e80221eb09fa2b4e4de4048a68269f41a1b657ace42c1975111a785cc1582712.exeaxplong.exedc9bc9afe3.exe70340e13f8.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e80221eb09fa2b4e4de4048a68269f41a1b657ace42c1975111a785cc1582712.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc9bc9afe3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70340e13f8.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
e80221eb09fa2b4e4de4048a68269f41a1b657ace42c1975111a785cc1582712.exeaxplong.exedc9bc9afe3.exe70340e13f8.exepid process 1796 e80221eb09fa2b4e4de4048a68269f41a1b657ace42c1975111a785cc1582712.exe 2224 axplong.exe 2764 dc9bc9afe3.exe 2772 70340e13f8.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
e80221eb09fa2b4e4de4048a68269f41a1b657ace42c1975111a785cc1582712.exepid process 1796 e80221eb09fa2b4e4de4048a68269f41a1b657ace42c1975111a785cc1582712.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
e80221eb09fa2b4e4de4048a68269f41a1b657ace42c1975111a785cc1582712.exeaxplong.exedescription pid process target process PID 1796 wrote to memory of 2224 1796 e80221eb09fa2b4e4de4048a68269f41a1b657ace42c1975111a785cc1582712.exe axplong.exe PID 1796 wrote to memory of 2224 1796 e80221eb09fa2b4e4de4048a68269f41a1b657ace42c1975111a785cc1582712.exe axplong.exe PID 1796 wrote to memory of 2224 1796 e80221eb09fa2b4e4de4048a68269f41a1b657ace42c1975111a785cc1582712.exe axplong.exe PID 1796 wrote to memory of 2224 1796 e80221eb09fa2b4e4de4048a68269f41a1b657ace42c1975111a785cc1582712.exe axplong.exe PID 2224 wrote to memory of 2764 2224 axplong.exe dc9bc9afe3.exe PID 2224 wrote to memory of 2764 2224 axplong.exe dc9bc9afe3.exe PID 2224 wrote to memory of 2764 2224 axplong.exe dc9bc9afe3.exe PID 2224 wrote to memory of 2764 2224 axplong.exe dc9bc9afe3.exe PID 2224 wrote to memory of 2772 2224 axplong.exe 70340e13f8.exe PID 2224 wrote to memory of 2772 2224 axplong.exe 70340e13f8.exe PID 2224 wrote to memory of 2772 2224 axplong.exe 70340e13f8.exe PID 2224 wrote to memory of 2772 2224 axplong.exe 70340e13f8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e80221eb09fa2b4e4de4048a68269f41a1b657ace42c1975111a785cc1582712.exe"C:\Users\Admin\AppData\Local\Temp\e80221eb09fa2b4e4de4048a68269f41a1b657ace42c1975111a785cc1582712.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\1002673001\dc9bc9afe3.exe"C:\Users\Admin\AppData\Local\Temp\1002673001\dc9bc9afe3.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\1002674001\70340e13f8.exe"C:\Users\Admin\AppData\Local\Temp\1002674001\70340e13f8.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2772
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5ecfbd10e08d9c96177f20e200b32db7c
SHA1f39549ca5e29f78e2cb8b297d2b75fb5055925b2
SHA256c5d2ffc9c45c477de453ff71fc17293911c07d185c54a738dc870fc9ac973f31
SHA51217839c2f18bb4e6d372afec62beb634e292a4fb0cb1008acc73dafc15edfc80f776ea435436853716ad8631b4eee48eb3ffced7ac73e31050a87ab6c65266ddc
-
Filesize
3.0MB
MD5e583ba21c7728101b6f48e9060e627a4
SHA1811e248ee06f570a4a5e9939cbad6d114adff432
SHA25614380071e4210df990c1bdc196fbaf8f4c3e54becf4fdfbe8c4aaf71c8a6f32b
SHA5124ec0d9c09ce08d753af25662e0a388415a53901b6505e7fcbe75ee3e7bcdb869adfa5300faee8bdcc616113067f62e867d8568b725df93c7cee48789eca45902
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1.8MB
MD53dd27665b6308911f1c8670054c1a4cd
SHA1111e3ed45baf38fbaac055e5bf4e61eca1cfa996
SHA256e80221eb09fa2b4e4de4048a68269f41a1b657ace42c1975111a785cc1582712
SHA5127bf9215e4725a92d4b9bce9822060bc51f18116479cd29b37680ccc5d577552e784815449b9cd76787b77a2a7986e0625e2eab8bd62f722129f181876d30721d