Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-12-2024 15:56
Static task
static1
Behavioral task
behavioral1
Sample
aab886620b8c09be6b08d2184e7afd12c8ca28a15423753083e06a56e01c1cb9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
aab886620b8c09be6b08d2184e7afd12c8ca28a15423753083e06a56e01c1cb9.exe
Resource
win10v2004-20241007-en
General
-
Target
aab886620b8c09be6b08d2184e7afd12c8ca28a15423753083e06a56e01c1cb9.exe
-
Size
2.9MB
-
MD5
74cc7ac88cfc4c527bd92ce90894f97f
-
SHA1
23f80e6a99f9f4378225793b2c57240c1f257700
-
SHA256
aab886620b8c09be6b08d2184e7afd12c8ca28a15423753083e06a56e01c1cb9
-
SHA512
ab5c24c0943cf2c26a3f99e674407c63cea1c060e0b5b88d905fd9decfd793a08712dfbc37b2de4c9093638024d923a1720a158a6553b13fccc609d0f1e52730
-
SSDEEP
49152:Xyp6nuLKmDaqoC5HaQWysDsnktnTT9phhlrzC:XuI4KmDazWaQrinTT9phhlrz
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d274874025.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ aab886620b8c09be6b08d2184e7afd12c8ca28a15423753083e06a56e01c1cb9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d274874025.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d274874025.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion aab886620b8c09be6b08d2184e7afd12c8ca28a15423753083e06a56e01c1cb9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion aab886620b8c09be6b08d2184e7afd12c8ca28a15423753083e06a56e01c1cb9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe -
Executes dropped EXE 3 IoCs
pid Process 2744 axplong.exe 2496 d274874025.exe 2948 skotes.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine aab886620b8c09be6b08d2184e7afd12c8ca28a15423753083e06a56e01c1cb9.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine d274874025.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine skotes.exe -
Loads dropped DLL 6 IoCs
pid Process 2684 aab886620b8c09be6b08d2184e7afd12c8ca28a15423753083e06a56e01c1cb9.exe 2684 aab886620b8c09be6b08d2184e7afd12c8ca28a15423753083e06a56e01c1cb9.exe 2744 axplong.exe 2744 axplong.exe 2496 d274874025.exe 2496 d274874025.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\d274874025.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006454001\\d274874025.exe" axplong.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2684 aab886620b8c09be6b08d2184e7afd12c8ca28a15423753083e06a56e01c1cb9.exe 2744 axplong.exe 2496 d274874025.exe 2948 skotes.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job aab886620b8c09be6b08d2184e7afd12c8ca28a15423753083e06a56e01c1cb9.exe File created C:\Windows\Tasks\skotes.job d274874025.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aab886620b8c09be6b08d2184e7afd12c8ca28a15423753083e06a56e01c1cb9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d274874025.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2684 aab886620b8c09be6b08d2184e7afd12c8ca28a15423753083e06a56e01c1cb9.exe 2744 axplong.exe 2496 d274874025.exe 2948 skotes.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2684 aab886620b8c09be6b08d2184e7afd12c8ca28a15423753083e06a56e01c1cb9.exe 2496 d274874025.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2744 2684 aab886620b8c09be6b08d2184e7afd12c8ca28a15423753083e06a56e01c1cb9.exe 30 PID 2684 wrote to memory of 2744 2684 aab886620b8c09be6b08d2184e7afd12c8ca28a15423753083e06a56e01c1cb9.exe 30 PID 2684 wrote to memory of 2744 2684 aab886620b8c09be6b08d2184e7afd12c8ca28a15423753083e06a56e01c1cb9.exe 30 PID 2684 wrote to memory of 2744 2684 aab886620b8c09be6b08d2184e7afd12c8ca28a15423753083e06a56e01c1cb9.exe 30 PID 2744 wrote to memory of 2496 2744 axplong.exe 33 PID 2744 wrote to memory of 2496 2744 axplong.exe 33 PID 2744 wrote to memory of 2496 2744 axplong.exe 33 PID 2744 wrote to memory of 2496 2744 axplong.exe 33 PID 2496 wrote to memory of 2948 2496 d274874025.exe 34 PID 2496 wrote to memory of 2948 2496 d274874025.exe 34 PID 2496 wrote to memory of 2948 2496 d274874025.exe 34 PID 2496 wrote to memory of 2948 2496 d274874025.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\aab886620b8c09be6b08d2184e7afd12c8ca28a15423753083e06a56e01c1cb9.exe"C:\Users\Admin\AppData\Local\Temp\aab886620b8c09be6b08d2184e7afd12c8ca28a15423753083e06a56e01c1cb9.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\1006454001\d274874025.exe"C:\Users\Admin\AppData\Local\Temp\1006454001\d274874025.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2948
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5a92be5b5786140603d32d0eba41aa39e
SHA1f8ca51eb7d4f38ef8eb10c270ed7919a79a6c677
SHA256e4749a946131d4dc4625819bc09be7862498aaa3afad6d456c6ff8964ae77cfe
SHA51272b2b28359d4152bc40d5257d6fd3375afadb37814ad63a7bb579fa9edf632855a1422bc5d5ed177b0d1ce8e8d9a3d2ff0b993a026d08ee1888f2dfa929b6702
-
Filesize
2.9MB
MD574cc7ac88cfc4c527bd92ce90894f97f
SHA123f80e6a99f9f4378225793b2c57240c1f257700
SHA256aab886620b8c09be6b08d2184e7afd12c8ca28a15423753083e06a56e01c1cb9
SHA512ab5c24c0943cf2c26a3f99e674407c63cea1c060e0b5b88d905fd9decfd793a08712dfbc37b2de4c9093638024d923a1720a158a6553b13fccc609d0f1e52730