Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 15:17
Static task
static1
Behavioral task
behavioral1
Sample
4e7d65455bb1085e725a9ef074c6d8ad47d428c62acb751b7367c9f2d816c233.exe
Resource
win7-20240903-en
General
-
Target
4e7d65455bb1085e725a9ef074c6d8ad47d428c62acb751b7367c9f2d816c233.exe
-
Size
1.8MB
-
MD5
7cfcb4d63db8eb0659a98c61923ca5d8
-
SHA1
ba628972d11e981babf860bee8f0d602ab21b00a
-
SHA256
4e7d65455bb1085e725a9ef074c6d8ad47d428c62acb751b7367c9f2d816c233
-
SHA512
e14ac5d4ebd4b3dc1d24009eea95ed734af14552da125181a6f459bef21e390acd5f42d650d46e1e9abc7ca28c4d7198f60ae1fd4b4b2f89f386f2c286b820fd
-
SSDEEP
49152:GN4Ie8zGmz0KzjwksI4FTOCm1KBtx+BU:SMI3zZ7I3m12xM
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
lumma
https://scriptyprefej.store
https://navygenerayk.store
https://founpiuer.store
https://necklacedmny.store
https://thumbystriw.store
https://fadehairucw.store
https://crisiwarny.store
https://presticitpo.store
Signatures
-
Amadey family
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
Processes:
axplong.exeaxplong.exe4e7d65455bb1085e725a9ef074c6d8ad47d428c62acb751b7367c9f2d816c233.exeaxplong.exec711bd0152.exeaf89a8b599.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4e7d65455bb1085e725a9ef074c6d8ad47d428c62acb751b7367c9f2d816c233.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c711bd0152.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ af89a8b599.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
4e7d65455bb1085e725a9ef074c6d8ad47d428c62acb751b7367c9f2d816c233.exeaxplong.exeaxplong.exeaxplong.exec711bd0152.exeaf89a8b599.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4e7d65455bb1085e725a9ef074c6d8ad47d428c62acb751b7367c9f2d816c233.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4e7d65455bb1085e725a9ef074c6d8ad47d428c62acb751b7367c9f2d816c233.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c711bd0152.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c711bd0152.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion af89a8b599.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion af89a8b599.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
4e7d65455bb1085e725a9ef074c6d8ad47d428c62acb751b7367c9f2d816c233.exeaxplong.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 4e7d65455bb1085e725a9ef074c6d8ad47d428c62acb751b7367c9f2d816c233.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation axplong.exe -
Executes dropped EXE 5 IoCs
Processes:
axplong.exec711bd0152.exeaf89a8b599.exeaxplong.exeaxplong.exepid Process 3596 axplong.exe 4548 c711bd0152.exe 4776 af89a8b599.exe 1460 axplong.exe 3160 axplong.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
axplong.exeaxplong.exe4e7d65455bb1085e725a9ef074c6d8ad47d428c62acb751b7367c9f2d816c233.exeaxplong.exec711bd0152.exeaf89a8b599.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 4e7d65455bb1085e725a9ef074c6d8ad47d428c62acb751b7367c9f2d816c233.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine c711bd0152.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine af89a8b599.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
axplong.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c711bd0152.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1002679001\\c711bd0152.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\af89a8b599.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1002680001\\af89a8b599.exe" axplong.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
Processes:
4e7d65455bb1085e725a9ef074c6d8ad47d428c62acb751b7367c9f2d816c233.exeaxplong.exec711bd0152.exeaf89a8b599.exeaxplong.exeaxplong.exepid Process 2148 4e7d65455bb1085e725a9ef074c6d8ad47d428c62acb751b7367c9f2d816c233.exe 3596 axplong.exe 4548 c711bd0152.exe 4776 af89a8b599.exe 1460 axplong.exe 3160 axplong.exe -
Drops file in Windows directory 1 IoCs
Processes:
4e7d65455bb1085e725a9ef074c6d8ad47d428c62acb751b7367c9f2d816c233.exedescription ioc Process File created C:\Windows\Tasks\axplong.job 4e7d65455bb1085e725a9ef074c6d8ad47d428c62acb751b7367c9f2d816c233.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
4e7d65455bb1085e725a9ef074c6d8ad47d428c62acb751b7367c9f2d816c233.exeaxplong.exec711bd0152.exeaf89a8b599.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e7d65455bb1085e725a9ef074c6d8ad47d428c62acb751b7367c9f2d816c233.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c711bd0152.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language af89a8b599.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
4e7d65455bb1085e725a9ef074c6d8ad47d428c62acb751b7367c9f2d816c233.exeaxplong.exec711bd0152.exeaf89a8b599.exeaxplong.exeaxplong.exepid Process 2148 4e7d65455bb1085e725a9ef074c6d8ad47d428c62acb751b7367c9f2d816c233.exe 2148 4e7d65455bb1085e725a9ef074c6d8ad47d428c62acb751b7367c9f2d816c233.exe 3596 axplong.exe 3596 axplong.exe 4548 c711bd0152.exe 4548 c711bd0152.exe 4776 af89a8b599.exe 4776 af89a8b599.exe 1460 axplong.exe 1460 axplong.exe 3160 axplong.exe 3160 axplong.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
4e7d65455bb1085e725a9ef074c6d8ad47d428c62acb751b7367c9f2d816c233.exepid Process 2148 4e7d65455bb1085e725a9ef074c6d8ad47d428c62acb751b7367c9f2d816c233.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
4e7d65455bb1085e725a9ef074c6d8ad47d428c62acb751b7367c9f2d816c233.exeaxplong.exedescription pid Process procid_target PID 2148 wrote to memory of 3596 2148 4e7d65455bb1085e725a9ef074c6d8ad47d428c62acb751b7367c9f2d816c233.exe 86 PID 2148 wrote to memory of 3596 2148 4e7d65455bb1085e725a9ef074c6d8ad47d428c62acb751b7367c9f2d816c233.exe 86 PID 2148 wrote to memory of 3596 2148 4e7d65455bb1085e725a9ef074c6d8ad47d428c62acb751b7367c9f2d816c233.exe 86 PID 3596 wrote to memory of 4548 3596 axplong.exe 91 PID 3596 wrote to memory of 4548 3596 axplong.exe 91 PID 3596 wrote to memory of 4548 3596 axplong.exe 91 PID 3596 wrote to memory of 4776 3596 axplong.exe 93 PID 3596 wrote to memory of 4776 3596 axplong.exe 93 PID 3596 wrote to memory of 4776 3596 axplong.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e7d65455bb1085e725a9ef074c6d8ad47d428c62acb751b7367c9f2d816c233.exe"C:\Users\Admin\AppData\Local\Temp\4e7d65455bb1085e725a9ef074c6d8ad47d428c62acb751b7367c9f2d816c233.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\1002679001\c711bd0152.exe"C:\Users\Admin\AppData\Local\Temp\1002679001\c711bd0152.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4548
-
-
C:\Users\Admin\AppData\Local\Temp\1002680001\af89a8b599.exe"C:\Users\Admin\AppData\Local\Temp\1002680001\af89a8b599.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4776
-
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1460
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD56881bff456675752a697f0dc45deb5a5
SHA1fdd6cbb6c3abe774cb811ef0928dad6fddad82c5
SHA2565e042fcf1634084d8b85c876343ba2b842ffb71d7ca295902a150b5eb01e58d0
SHA512f665b8dc2a1852f8ccb78f5354163097e97faa28b29d6d0e4eb61b486ed7bf0baa0d6929a2270440685f05f34e0996eed53866c270f78484f392c5de4d81fd6d
-
Filesize
3.0MB
MD55f3ee8b2ada3b99b5068bcb7d22704f2
SHA111c596c943487d4532ffbd9d4aaf6469524994ec
SHA256547aade9cb94390d637f9c2bf8c495d22aceda889a61c47b9b0599531a70310b
SHA512cd53ec59984e5bd74b44e390ed67687a02add67faed816e2349ad9cf8ca09d14ac050f7b902118e385f676cf457986673bfa878e4a0cdc9d5d0b9183407818fb
-
Filesize
1.8MB
MD57cfcb4d63db8eb0659a98c61923ca5d8
SHA1ba628972d11e981babf860bee8f0d602ab21b00a
SHA2564e7d65455bb1085e725a9ef074c6d8ad47d428c62acb751b7367c9f2d816c233
SHA512e14ac5d4ebd4b3dc1d24009eea95ed734af14552da125181a6f459bef21e390acd5f42d650d46e1e9abc7ca28c4d7198f60ae1fd4b4b2f89f386f2c286b820fd