Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 17:19
Static task
static1
Behavioral task
behavioral1
Sample
ae7cee2a37b6db87bb902e868f14ff3e666b94ef0f910abb1c1f997986ebc8f8.exe
Resource
win7-20240903-en
General
-
Target
ae7cee2a37b6db87bb902e868f14ff3e666b94ef0f910abb1c1f997986ebc8f8.exe
-
Size
1.8MB
-
MD5
7eb364eea0c2b3fbd888a56ed722e620
-
SHA1
899ce1f752474250e705ecb03debc6f654acf6d9
-
SHA256
ae7cee2a37b6db87bb902e868f14ff3e666b94ef0f910abb1c1f997986ebc8f8
-
SHA512
aa968393006cc966323ba29fae087329a914bdf5cbe7abee65c9b9a3a849e64ae543e3030d850b230d23868ec3a99d17ffb0951c3ccdc0ec7e99624653e6052b
-
SSDEEP
49152:Tsjx/8ZKhghrGvti28GOYO13yd5jtd9OuftmdfcsSkwJ:iohSwL13+5pd9EffLw
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
lumma
https://atten-supporse.biz/api
https://covery-mover.biz/api
Signatures
-
Amadey family
-
Lumma family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ae7cee2a37b6db87bb902e868f14ff3e666b94ef0f910abb1c1f997986ebc8f8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ de8254df7f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3f5d3722d5.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ae7cee2a37b6db87bb902e868f14ff3e666b94ef0f910abb1c1f997986ebc8f8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion de8254df7f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3f5d3722d5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ae7cee2a37b6db87bb902e868f14ff3e666b94ef0f910abb1c1f997986ebc8f8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion de8254df7f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3f5d3722d5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation chrome11.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation ae7cee2a37b6db87bb902e868f14ff3e666b94ef0f910abb1c1f997986ebc8f8.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation axplong.exe -
Executes dropped EXE 7 IoCs
pid Process 4536 axplong.exe 4760 chrome11.exe 1140 de8254df7f.exe 5088 3f5d3722d5.exe 3388 axplong.exe 3212 axplong.exe 2996 axplong.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine de8254df7f.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 3f5d3722d5.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine ae7cee2a37b6db87bb902e868f14ff3e666b94ef0f910abb1c1f997986ebc8f8.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\de8254df7f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1005989001\\de8254df7f.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3f5d3722d5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1005990001\\3f5d3722d5.exe" axplong.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 3612 ae7cee2a37b6db87bb902e868f14ff3e666b94ef0f910abb1c1f997986ebc8f8.exe 4536 axplong.exe 1140 de8254df7f.exe 5088 3f5d3722d5.exe 3388 axplong.exe 3212 axplong.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\Application\chrome.exe chrome11.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe chrome11.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job ae7cee2a37b6db87bb902e868f14ff3e666b94ef0f910abb1c1f997986ebc8f8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de8254df7f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f5d3722d5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae7cee2a37b6db87bb902e868f14ff3e666b94ef0f910abb1c1f997986ebc8f8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 3612 ae7cee2a37b6db87bb902e868f14ff3e666b94ef0f910abb1c1f997986ebc8f8.exe 3612 ae7cee2a37b6db87bb902e868f14ff3e666b94ef0f910abb1c1f997986ebc8f8.exe 4536 axplong.exe 4536 axplong.exe 4760 chrome11.exe 1140 de8254df7f.exe 1140 de8254df7f.exe 5088 3f5d3722d5.exe 5088 3f5d3722d5.exe 3388 axplong.exe 3388 axplong.exe 3212 axplong.exe 3212 axplong.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4760 chrome11.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3612 ae7cee2a37b6db87bb902e868f14ff3e666b94ef0f910abb1c1f997986ebc8f8.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3612 wrote to memory of 4536 3612 ae7cee2a37b6db87bb902e868f14ff3e666b94ef0f910abb1c1f997986ebc8f8.exe 83 PID 3612 wrote to memory of 4536 3612 ae7cee2a37b6db87bb902e868f14ff3e666b94ef0f910abb1c1f997986ebc8f8.exe 83 PID 3612 wrote to memory of 4536 3612 ae7cee2a37b6db87bb902e868f14ff3e666b94ef0f910abb1c1f997986ebc8f8.exe 83 PID 4536 wrote to memory of 4760 4536 axplong.exe 86 PID 4536 wrote to memory of 4760 4536 axplong.exe 86 PID 4760 wrote to memory of 4328 4760 chrome11.exe 91 PID 4760 wrote to memory of 4328 4760 chrome11.exe 91 PID 4536 wrote to memory of 1140 4536 axplong.exe 93 PID 4536 wrote to memory of 1140 4536 axplong.exe 93 PID 4536 wrote to memory of 1140 4536 axplong.exe 93 PID 4536 wrote to memory of 5088 4536 axplong.exe 102 PID 4536 wrote to memory of 5088 4536 axplong.exe 102 PID 4536 wrote to memory of 5088 4536 axplong.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae7cee2a37b6db87bb902e868f14ff3e666b94ef0f910abb1c1f997986ebc8f8.exe"C:\Users\Admin\AppData\Local\Temp\ae7cee2a37b6db87bb902e868f14ff3e666b94ef0f910abb1c1f997986ebc8f8.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\1005970001\chrome11.exe"C:\Users\Admin\AppData\Local\Temp\1005970001\chrome11.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\System32\certutil.exe"C:\Windows\System32\certutil.exe" -silent -importPFX -p "" -f "C:\Users\Admin\AppData\Local\Temp\tmpADB7.tmp"4⤵PID:4328
-
-
-
C:\Users\Admin\AppData\Local\Temp\1005989001\de8254df7f.exe"C:\Users\Admin\AppData\Local\Temp\1005989001\de8254df7f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1140
-
-
C:\Users\Admin\AppData\Local\Temp\1005990001\3f5d3722d5.exe"C:\Users\Admin\AppData\Local\Temp\1005990001\3f5d3722d5.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5088
-
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3388
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3212
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Identifies Wine through registry keys
PID:2996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\84ef8e32cf3dd22e15e36759d999f0aa_dd2803c7-d377-4f06-bdfe-aea230fc7b0e
Filesize2KB
MD50158fe9cead91d1b027b795984737614
SHA1b41a11f909a7bdf1115088790a5680ac4e23031b
SHA256513257326e783a862909a2a0f0941d6ff899c403e104fbd1dbc10443c41d9f9a
SHA512c48a55cc7a92cefcefe5fb2382ccd8ef651fc8e0885e88a256cd2f5d83b824b7d910f755180b29eccb54d9361d6af82f9cc741bd7e6752122949b657da973676
-
Filesize
4.5MB
MD55b39766f490f17925defaee5de2f9861
SHA19c89f2951c255117eb3eebcd61dbecf019a4c186
SHA256de615656d7f80b5e01bc6a604a780245ca0ccefd920a6e2f1439bf27c02b7b7a
SHA512d216fa45c98e423f15c2b52f980fc1c439d365b9799e5063e6b09837b419d197ba68d52ea7facf469eae38e531f17bd19eaf25d170465dc41217ca6ab9eb30bf
-
Filesize
1.7MB
MD5b1389ec87bad100fad616612b0f8850c
SHA12893314486cb66c4454a83f21be67c536dcf0822
SHA25631b4f87080ce3e4bb1425ac640fdf884e0c54f27992177d9006174c9a662673b
SHA512cc16a98f23a91a30cf8042000c5db986c24c20b6cb72faebe94728815f73fa6c12a6a5f0625773a0f2aa46b08736fb4b4ef083192dc94e49fefcbcab3cc9e040
-
Filesize
1.8MB
MD5f311c4e019a62fb6a0151f10f30cc2bf
SHA133741cc7dbb6c8ab5661b01be59abc95bc2fe93b
SHA2567fe212bf16319044794c1dfae79a8c3c6d6f0f9752eb8682472b54c6b15c9381
SHA5129fef6e8e3c1dd403c906caa6d2afe7d401790260c5bea21992211406c28e43831529ed99ba03d5b2b149cc3e4c196c5bbbe0a822d4ed20bc28d6610c4ac85db7
-
Filesize
1.8MB
MD57eb364eea0c2b3fbd888a56ed722e620
SHA1899ce1f752474250e705ecb03debc6f654acf6d9
SHA256ae7cee2a37b6db87bb902e868f14ff3e666b94ef0f910abb1c1f997986ebc8f8
SHA512aa968393006cc966323ba29fae087329a914bdf5cbe7abee65c9b9a3a849e64ae543e3030d850b230d23868ec3a99d17ffb0951c3ccdc0ec7e99624653e6052b
-
Filesize
2KB
MD5b19a11965de37e496427234749835b26
SHA19515cea270cb49c21f4469c06bc7e9f6bc72d725
SHA2567bc12ee97d31e00746a203d42c18aebab6b43246508269762bac74fae4f9cee0
SHA512265f5175aa40a0809e627ba79468b2c41cd6c2a9c52c58edb0c4eec30334118714c6d60f546de782152acd912723ce01d8303082adcac42fbc13bcfdc1498e42
-
Filesize
2KB
MD50d75207d497b5165758ec2cb8e0fbb71
SHA1c07029c2ba769a4261ee863a6022d5353326b1b1
SHA2562ce01ade4d04b6b86fc8cfea6d234eb950403df01e2e1fc28bf25492a52a10fa
SHA512d850f345b3a7cbcb28a91c70db5ad4d74a9b9b28858dbd458c4ce9bfe29f2ae0e9ac9dfa6a68084aca85717bba001b0f6c925e90301cbbd5b3ff390350fa2278
-
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\1BB5164CA9926EC73600477060415A2675CB8C1E
Filesize1KB
MD58560c23ce76a9c7e77dab55728ebc1bf
SHA1478bf8f7a0186fb723b9408764d3cda8bbf3893d
SHA2566b0657f973854da0094511baea57e5c4f6a71af6176c67a67eacda2c9057bc0b
SHA51248bb1ed8919aae04a52c61a4fcc24629ff09d211a1da95bb6024cbac1d2e35cabfba790a2417ebdb973abf261a9324ee4f5c116bc056fa0d41164bea7087c51c