Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 15:29
Static task
static1
Behavioral task
behavioral1
Sample
5c378d13c9c4361e25258365eec31c68797532a73ac2de86d52a655b276c0554.exe
Resource
win7-20240729-en
General
-
Target
5c378d13c9c4361e25258365eec31c68797532a73ac2de86d52a655b276c0554.exe
-
Size
1.8MB
-
MD5
3099ddd6873222d4e652db0c52a63750
-
SHA1
599a2d8ed030925c7e015095834ce3d42edd78eb
-
SHA256
5c378d13c9c4361e25258365eec31c68797532a73ac2de86d52a655b276c0554
-
SHA512
c497351cb73c2dede38f908457f558cdcb019665ba362a5b85919a8a96f07a1cbc3347bd0d758531070076d868ae28f4ac334b258b880b6ece6c31e3b5281e9f
-
SSDEEP
24576:Axr4T4OnanVJGo985/R7FS75ywvgv4/GnPNn3ZItReFBNO+y7jH3SD0JDQ+NGFu9:AGtaL18wIwIv4oNuKs1biD4DiFZJwr
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
lumma
https://atten-supporse.biz/api
https://covery-mover.biz/api
Signatures
-
Amadey family
-
Lumma family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c53d768ba9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fac5dc878d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5c378d13c9c4361e25258365eec31c68797532a73ac2de86d52a655b276c0554.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5c378d13c9c4361e25258365eec31c68797532a73ac2de86d52a655b276c0554.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c53d768ba9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fac5dc878d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5c378d13c9c4361e25258365eec31c68797532a73ac2de86d52a655b276c0554.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c53d768ba9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fac5dc878d.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5c378d13c9c4361e25258365eec31c68797532a73ac2de86d52a655b276c0554.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation chrome11.exe -
Executes dropped EXE 7 IoCs
pid Process 376 axplong.exe 4656 axplong.exe 3024 chrome11.exe 4660 c53d768ba9.exe 2228 fac5dc878d.exe 4744 axplong.exe 1640 axplong.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 5c378d13c9c4361e25258365eec31c68797532a73ac2de86d52a655b276c0554.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine c53d768ba9.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine fac5dc878d.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c53d768ba9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1005981001\\c53d768ba9.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fac5dc878d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1005982001\\fac5dc878d.exe" axplong.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 3252 5c378d13c9c4361e25258365eec31c68797532a73ac2de86d52a655b276c0554.exe 376 axplong.exe 4656 axplong.exe 4660 c53d768ba9.exe 2228 fac5dc878d.exe 4744 axplong.exe 1640 axplong.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\Application\chrome.exe chrome11.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe chrome11.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job 5c378d13c9c4361e25258365eec31c68797532a73ac2de86d52a655b276c0554.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5c378d13c9c4361e25258365eec31c68797532a73ac2de86d52a655b276c0554.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c53d768ba9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fac5dc878d.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 3252 5c378d13c9c4361e25258365eec31c68797532a73ac2de86d52a655b276c0554.exe 3252 5c378d13c9c4361e25258365eec31c68797532a73ac2de86d52a655b276c0554.exe 376 axplong.exe 376 axplong.exe 4656 axplong.exe 4656 axplong.exe 3024 chrome11.exe 4660 c53d768ba9.exe 4660 c53d768ba9.exe 2228 fac5dc878d.exe 2228 fac5dc878d.exe 4744 axplong.exe 4744 axplong.exe 1640 axplong.exe 1640 axplong.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3024 chrome11.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3252 5c378d13c9c4361e25258365eec31c68797532a73ac2de86d52a655b276c0554.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3252 wrote to memory of 376 3252 5c378d13c9c4361e25258365eec31c68797532a73ac2de86d52a655b276c0554.exe 82 PID 3252 wrote to memory of 376 3252 5c378d13c9c4361e25258365eec31c68797532a73ac2de86d52a655b276c0554.exe 82 PID 3252 wrote to memory of 376 3252 5c378d13c9c4361e25258365eec31c68797532a73ac2de86d52a655b276c0554.exe 82 PID 376 wrote to memory of 3024 376 axplong.exe 88 PID 376 wrote to memory of 3024 376 axplong.exe 88 PID 3024 wrote to memory of 3292 3024 chrome11.exe 90 PID 3024 wrote to memory of 3292 3024 chrome11.exe 90 PID 376 wrote to memory of 4660 376 axplong.exe 92 PID 376 wrote to memory of 4660 376 axplong.exe 92 PID 376 wrote to memory of 4660 376 axplong.exe 92 PID 376 wrote to memory of 2228 376 axplong.exe 95 PID 376 wrote to memory of 2228 376 axplong.exe 95 PID 376 wrote to memory of 2228 376 axplong.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c378d13c9c4361e25258365eec31c68797532a73ac2de86d52a655b276c0554.exe"C:\Users\Admin\AppData\Local\Temp\5c378d13c9c4361e25258365eec31c68797532a73ac2de86d52a655b276c0554.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Local\Temp\1005970001\chrome11.exe"C:\Users\Admin\AppData\Local\Temp\1005970001\chrome11.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\System32\certutil.exe"C:\Windows\System32\certutil.exe" -silent -importPFX -p "" -f "C:\Users\Admin\AppData\Local\Temp\tmpBC5D.tmp"4⤵PID:3292
-
-
-
C:\Users\Admin\AppData\Local\Temp\1005981001\c53d768ba9.exe"C:\Users\Admin\AppData\Local\Temp\1005981001\c53d768ba9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4660
-
-
C:\Users\Admin\AppData\Local\Temp\1005982001\fac5dc878d.exe"C:\Users\Admin\AppData\Local\Temp\1005982001\fac5dc878d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2228
-
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4656
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4744
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.5MB
MD55b39766f490f17925defaee5de2f9861
SHA19c89f2951c255117eb3eebcd61dbecf019a4c186
SHA256de615656d7f80b5e01bc6a604a780245ca0ccefd920a6e2f1439bf27c02b7b7a
SHA512d216fa45c98e423f15c2b52f980fc1c439d365b9799e5063e6b09837b419d197ba68d52ea7facf469eae38e531f17bd19eaf25d170465dc41217ca6ab9eb30bf
-
Filesize
1.7MB
MD5288001b65d38a2878e7d1f424b419f3c
SHA1c215fe8ed0d086ce614fcba865954697364dfde8
SHA256868eda914f608108639b82ddad28ba808eed057111f6d82ad8a3d20c1773be63
SHA5124e4983ddb993e4c2956f241608ee95b04796a62dc170181b400dde198dc2225ba95db96f8c63163624355cbce5c6ce552b3e1d552b401032dfc2a723f3aaa59f
-
Filesize
1.8MB
MD578eec814d6034177867d547093eaf7d8
SHA1d8267c5ab4bc8a1194901ef66d0d1ea65b2d40a1
SHA2568bfdc1e85021c5cb619aa4d502a5a6cb16cba8cc0c3442828db08dbcdf0a68b2
SHA51238bfb3e5dd2e3c4ddb6d226d1fa11c5cba75870b53908a7839ce669c84b1fe83197fd06a2c9e953b4f486d8b926d4966deaa533a28fd8c29dd70ae6db7bb3637
-
Filesize
1.8MB
MD53099ddd6873222d4e652db0c52a63750
SHA1599a2d8ed030925c7e015095834ce3d42edd78eb
SHA2565c378d13c9c4361e25258365eec31c68797532a73ac2de86d52a655b276c0554
SHA512c497351cb73c2dede38f908457f558cdcb019665ba362a5b85919a8a96f07a1cbc3347bd0d758531070076d868ae28f4ac334b258b880b6ece6c31e3b5281e9f
-
Filesize
2KB
MD5ec47a3f31b83e9547bca7ae68e313a8a
SHA107f345f085d5d8d60763c91ea51117d85a0d0c76
SHA256df6bbb7be7ecfe06aba068cb54c7f853ca460cd38a3b56e4d93997a7c2e4e29a
SHA5129f65a00c6c389f5e3ce88d5484147d649964a4a30df3b7f2f0e2948879fe2d2f1072f2d9d27214eb242afc5b57355ef541ab04dfdae2584f4f25d974e4487fc9
-
Filesize
2KB
MD574b2173c0c26844f120340d9ca1c97d5
SHA13bd6fe69b44969e61e2913ec86952a3ef37141d2
SHA2563bdc4c184961a223fbbdbc6639e7c97399acb34106b184ec214d8d4778bb4372
SHA5125f6af068faa4dfd4768b936efb084e9de906a9dc1a6e773a59b6d3c035a3757b4351cafdfefeeccb3bbc375e3bdb2777c2fac63b1f76c064f43024ae19eaf564
-
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\D17074A9919164A295EC2F423EAE9D69B1A1F706
Filesize1KB
MD59827eadf44ba7470389dd89665a44f53
SHA169a5cec0cfe62c9ad7d7b5ed13b715c7489078eb
SHA2565792e51af39e717e2a1d99722375163c4d0e0e5a77bc3b8dc26b7cd918baabb1
SHA5124bc986c2982d220d798a7003e7f8808a7a81884a616cb1e0ef26ec2ee15342a2dab76a060c7040789c2642b470ad70ca4b3e4e6b2fca5ac141017124903bf6e4