Analysis

  • max time kernel
    140s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    12-12-2024 08:16

General

  • Target

    51983f3a2a0ddfb233a314390926ede2a02ecf09c0e51c9f8a46f1b32bb631e7.exe

  • Size

    1.8MB

  • MD5

    0b20eccc24df80884571a59d9baa22e6

  • SHA1

    7e7d09c55a0c5dedc8025711062fb7928f63ad3a

  • SHA256

    51983f3a2a0ddfb233a314390926ede2a02ecf09c0e51c9f8a46f1b32bb631e7

  • SHA512

    0313eb3f8ecab91c16fb0437abbd22c895d4d50686fa66f3c07262a1c7062de2ae6d8e905df3f8cd9129d682c5a600ae57a0dcbcb680e1e6affe89ba6a1cb650

  • SSDEEP

    24576:6+NRtAUxQrMZk3S/LFn+VPUkNgAIdqSMUKMvpHdcPWhAHwf5yPovMH1s964reC9x:62wr5CJn1ke/dqSj9c+Dyz1s9QOxqk

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 3 IoCs
  • Identifies Wine through registry keys 2 TTPs 4 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\51983f3a2a0ddfb233a314390926ede2a02ecf09c0e51c9f8a46f1b32bb631e7.exe
    "C:\Users\Admin\AppData\Local\Temp\51983f3a2a0ddfb233a314390926ede2a02ecf09c0e51c9f8a46f1b32bb631e7.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
      "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2732
      • C:\Users\Admin\AppData\Local\Temp\1006184001\18a491df12.exe
        "C:\Users\Admin\AppData\Local\Temp\1006184001\18a491df12.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:932
      • C:\Users\Admin\AppData\Local\Temp\1006185001\aebf188724.exe
        "C:\Users\Admin\AppData\Local\Temp\1006185001\aebf188724.exe"
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Windows security modification
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1006184001\18a491df12.exe

    Filesize

    1.7MB

    MD5

    fa8bc0aa526b9961adf9260dc7ec9399

    SHA1

    044527ce83eb090a0c1ec2cdaddedc5f5405bf2d

    SHA256

    1722fc2ecb85459ab3e76adc12f5c29d3e3ee2b4b18dd48c5ef0e5d79b77330e

    SHA512

    2f0244f7f3cf90b0dd1e5d04db4e4d443a16e7779bf791dc68ed54f6d734e1d620193967e96ee881b03e5b6ef6a8609efdb890f5345db340d94fe70c2807c31b

  • C:\Users\Admin\AppData\Local\Temp\1006185001\aebf188724.exe

    Filesize

    2.7MB

    MD5

    f150e060b781896b4e6e1029ee1f5b74

    SHA1

    ef52c884174df898a956d9a40304e586e2382e2d

    SHA256

    0316ba41b0629155197d29677225f77581c470a5f91aea8dd6a38850cd510516

    SHA512

    40dc0453b3feece1d0ad5ed8de9cfd45465347190c1031791c6a035dc0e74bd842fa21e56b86feebe89892dfbd8bcdbf8d44bc658c0afcfb6deb6d0b5e18c18f

  • \Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe

    Filesize

    1.8MB

    MD5

    0b20eccc24df80884571a59d9baa22e6

    SHA1

    7e7d09c55a0c5dedc8025711062fb7928f63ad3a

    SHA256

    51983f3a2a0ddfb233a314390926ede2a02ecf09c0e51c9f8a46f1b32bb631e7

    SHA512

    0313eb3f8ecab91c16fb0437abbd22c895d4d50686fa66f3c07262a1c7062de2ae6d8e905df3f8cd9129d682c5a600ae57a0dcbcb680e1e6affe89ba6a1cb650

  • memory/820-79-0x00000000010B0000-0x000000000136C000-memory.dmp

    Filesize

    2.7MB

  • memory/820-77-0x00000000010B0000-0x000000000136C000-memory.dmp

    Filesize

    2.7MB

  • memory/820-69-0x00000000010B0000-0x000000000136C000-memory.dmp

    Filesize

    2.7MB

  • memory/820-70-0x00000000010B0000-0x000000000136C000-memory.dmp

    Filesize

    2.7MB

  • memory/820-67-0x00000000010B0000-0x000000000136C000-memory.dmp

    Filesize

    2.7MB

  • memory/932-46-0x0000000000210000-0x000000000089E000-memory.dmp

    Filesize

    6.6MB

  • memory/932-45-0x0000000000210000-0x000000000089E000-memory.dmp

    Filesize

    6.6MB

  • memory/2732-65-0x0000000006600000-0x00000000068BC000-memory.dmp

    Filesize

    2.7MB

  • memory/2732-72-0x0000000000820000-0x0000000000CDA000-memory.dmp

    Filesize

    4.7MB

  • memory/2732-24-0x0000000000820000-0x0000000000CDA000-memory.dmp

    Filesize

    4.7MB

  • memory/2732-26-0x0000000000820000-0x0000000000CDA000-memory.dmp

    Filesize

    4.7MB

  • memory/2732-22-0x0000000000820000-0x0000000000CDA000-memory.dmp

    Filesize

    4.7MB

  • memory/2732-43-0x0000000006B80000-0x000000000720E000-memory.dmp

    Filesize

    6.6MB

  • memory/2732-92-0x0000000000820000-0x0000000000CDA000-memory.dmp

    Filesize

    4.7MB

  • memory/2732-44-0x0000000006B80000-0x000000000720E000-memory.dmp

    Filesize

    6.6MB

  • memory/2732-91-0x0000000000820000-0x0000000000CDA000-memory.dmp

    Filesize

    4.7MB

  • memory/2732-47-0x0000000000820000-0x0000000000CDA000-memory.dmp

    Filesize

    4.7MB

  • memory/2732-21-0x0000000000820000-0x0000000000CDA000-memory.dmp

    Filesize

    4.7MB

  • memory/2732-68-0x0000000000820000-0x0000000000CDA000-memory.dmp

    Filesize

    4.7MB

  • memory/2732-90-0x0000000000820000-0x0000000000CDA000-memory.dmp

    Filesize

    4.7MB

  • memory/2732-66-0x0000000006600000-0x00000000068BC000-memory.dmp

    Filesize

    2.7MB

  • memory/2732-89-0x0000000000820000-0x0000000000CDA000-memory.dmp

    Filesize

    4.7MB

  • memory/2732-64-0x0000000000820000-0x0000000000CDA000-memory.dmp

    Filesize

    4.7MB

  • memory/2732-88-0x0000000000820000-0x0000000000CDA000-memory.dmp

    Filesize

    4.7MB

  • memory/2732-87-0x0000000000820000-0x0000000000CDA000-memory.dmp

    Filesize

    4.7MB

  • memory/2732-71-0x0000000000820000-0x0000000000CDA000-memory.dmp

    Filesize

    4.7MB

  • memory/2732-23-0x0000000000820000-0x0000000000CDA000-memory.dmp

    Filesize

    4.7MB

  • memory/2732-73-0x0000000006B80000-0x000000000720E000-memory.dmp

    Filesize

    6.6MB

  • memory/2732-74-0x0000000006600000-0x00000000068BC000-memory.dmp

    Filesize

    2.7MB

  • memory/2732-76-0x0000000006600000-0x00000000068BC000-memory.dmp

    Filesize

    2.7MB

  • memory/2732-86-0x0000000000820000-0x0000000000CDA000-memory.dmp

    Filesize

    4.7MB

  • memory/2732-85-0x0000000000820000-0x0000000000CDA000-memory.dmp

    Filesize

    4.7MB

  • memory/2732-80-0x0000000000820000-0x0000000000CDA000-memory.dmp

    Filesize

    4.7MB

  • memory/2732-81-0x0000000000820000-0x0000000000CDA000-memory.dmp

    Filesize

    4.7MB

  • memory/2732-82-0x0000000000820000-0x0000000000CDA000-memory.dmp

    Filesize

    4.7MB

  • memory/2732-83-0x0000000000820000-0x0000000000CDA000-memory.dmp

    Filesize

    4.7MB

  • memory/2732-84-0x0000000000820000-0x0000000000CDA000-memory.dmp

    Filesize

    4.7MB

  • memory/2932-1-0x00000000778B0000-0x00000000778B2000-memory.dmp

    Filesize

    8KB

  • memory/2932-2-0x0000000000B01000-0x0000000000B2F000-memory.dmp

    Filesize

    184KB

  • memory/2932-3-0x0000000000B00000-0x0000000000FBA000-memory.dmp

    Filesize

    4.7MB

  • memory/2932-5-0x0000000000B00000-0x0000000000FBA000-memory.dmp

    Filesize

    4.7MB

  • memory/2932-0-0x0000000000B00000-0x0000000000FBA000-memory.dmp

    Filesize

    4.7MB

  • memory/2932-9-0x0000000000B00000-0x0000000000FBA000-memory.dmp

    Filesize

    4.7MB

  • memory/2932-19-0x0000000006DD0000-0x000000000728A000-memory.dmp

    Filesize

    4.7MB

  • memory/2932-18-0x0000000000B00000-0x0000000000FBA000-memory.dmp

    Filesize

    4.7MB