Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-12-2024 10:24
Static task
static1
Behavioral task
behavioral1
Sample
7799197bff28707544d1c92e81250479de08e605210d39ec4b395a89e9489ccb.exe
Resource
win7-20240903-en
General
-
Target
7799197bff28707544d1c92e81250479de08e605210d39ec4b395a89e9489ccb.exe
-
Size
2.9MB
-
MD5
c3ee35c8b65f7b15a8941b2dee05835e
-
SHA1
62a6c389a94fff3eb70a308b29aa7ca8444dfcc2
-
SHA256
7799197bff28707544d1c92e81250479de08e605210d39ec4b395a89e9489ccb
-
SHA512
cce2363ac083c3929839a430e0219c28da3b2d805edbb059e5c40a00ed659b9337635dadc9db86acc86993945533c4661fcaf637a22ab349306d69221b0d8789
-
SSDEEP
49152:JtFTAjdF8vSRDsEJ+rjNLYKiBU/RIH5H+Y7eXsZXarBt8Z:BqdVRDIrZY+JIH5hCcZXIS
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Gcleaner family
-
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2016 created 1284 2016 d808323f7a.exe 21 -
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 4984f3a357.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7799197bff28707544d1c92e81250479de08e605210d39ec4b395a89e9489ccb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c696d7d6a2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d808323f7a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c05596eb37.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4984f3a357.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c05596eb37.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7799197bff28707544d1c92e81250479de08e605210d39ec4b395a89e9489ccb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7799197bff28707544d1c92e81250479de08e605210d39ec4b395a89e9489ccb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c696d7d6a2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d808323f7a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c05596eb37.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4984f3a357.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c696d7d6a2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d808323f7a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4984f3a357.exe -
Executes dropped EXE 5 IoCs
pid Process 2748 axplong.exe 2716 c696d7d6a2.exe 2016 d808323f7a.exe 704 c05596eb37.exe 2312 4984f3a357.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 7799197bff28707544d1c92e81250479de08e605210d39ec4b395a89e9489ccb.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine c696d7d6a2.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine d808323f7a.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine c05596eb37.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 4984f3a357.exe -
Loads dropped DLL 9 IoCs
pid Process 1680 7799197bff28707544d1c92e81250479de08e605210d39ec4b395a89e9489ccb.exe 1680 7799197bff28707544d1c92e81250479de08e605210d39ec4b395a89e9489ccb.exe 2748 axplong.exe 2748 axplong.exe 2748 axplong.exe 2748 axplong.exe 2748 axplong.exe 2748 axplong.exe 704 c05596eb37.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\c696d7d6a2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007638001\\c696d7d6a2.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\c05596eb37.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007640001\\c05596eb37.exe" axplong.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 1680 7799197bff28707544d1c92e81250479de08e605210d39ec4b395a89e9489ccb.exe 2748 axplong.exe 2716 c696d7d6a2.exe 2016 d808323f7a.exe 704 c05596eb37.exe 2312 4984f3a357.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job 7799197bff28707544d1c92e81250479de08e605210d39ec4b395a89e9489ccb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c05596eb37.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7799197bff28707544d1c92e81250479de08e605210d39ec4b395a89e9489ccb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c696d7d6a2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d808323f7a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4984f3a357.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 1680 7799197bff28707544d1c92e81250479de08e605210d39ec4b395a89e9489ccb.exe 2748 axplong.exe 2716 c696d7d6a2.exe 2016 d808323f7a.exe 2016 d808323f7a.exe 2016 d808323f7a.exe 2016 d808323f7a.exe 2016 d808323f7a.exe 1884 dialer.exe 1884 dialer.exe 1884 dialer.exe 1884 dialer.exe 704 c05596eb37.exe 2312 4984f3a357.exe 2312 4984f3a357.exe 2312 4984f3a357.exe 2312 4984f3a357.exe 2312 4984f3a357.exe 2312 4984f3a357.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1680 7799197bff28707544d1c92e81250479de08e605210d39ec4b395a89e9489ccb.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2748 1680 7799197bff28707544d1c92e81250479de08e605210d39ec4b395a89e9489ccb.exe 30 PID 1680 wrote to memory of 2748 1680 7799197bff28707544d1c92e81250479de08e605210d39ec4b395a89e9489ccb.exe 30 PID 1680 wrote to memory of 2748 1680 7799197bff28707544d1c92e81250479de08e605210d39ec4b395a89e9489ccb.exe 30 PID 1680 wrote to memory of 2748 1680 7799197bff28707544d1c92e81250479de08e605210d39ec4b395a89e9489ccb.exe 30 PID 2748 wrote to memory of 2716 2748 axplong.exe 33 PID 2748 wrote to memory of 2716 2748 axplong.exe 33 PID 2748 wrote to memory of 2716 2748 axplong.exe 33 PID 2748 wrote to memory of 2716 2748 axplong.exe 33 PID 2748 wrote to memory of 2016 2748 axplong.exe 34 PID 2748 wrote to memory of 2016 2748 axplong.exe 34 PID 2748 wrote to memory of 2016 2748 axplong.exe 34 PID 2748 wrote to memory of 2016 2748 axplong.exe 34 PID 2016 wrote to memory of 1884 2016 d808323f7a.exe 35 PID 2016 wrote to memory of 1884 2016 d808323f7a.exe 35 PID 2016 wrote to memory of 1884 2016 d808323f7a.exe 35 PID 2016 wrote to memory of 1884 2016 d808323f7a.exe 35 PID 2016 wrote to memory of 1884 2016 d808323f7a.exe 35 PID 2016 wrote to memory of 1884 2016 d808323f7a.exe 35 PID 2748 wrote to memory of 704 2748 axplong.exe 36 PID 2748 wrote to memory of 704 2748 axplong.exe 36 PID 2748 wrote to memory of 704 2748 axplong.exe 36 PID 2748 wrote to memory of 704 2748 axplong.exe 36 PID 2748 wrote to memory of 2312 2748 axplong.exe 37 PID 2748 wrote to memory of 2312 2748 axplong.exe 37 PID 2748 wrote to memory of 2312 2748 axplong.exe 37 PID 2748 wrote to memory of 2312 2748 axplong.exe 37
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\7799197bff28707544d1c92e81250479de08e605210d39ec4b395a89e9489ccb.exe"C:\Users\Admin\AppData\Local\Temp\7799197bff28707544d1c92e81250479de08e605210d39ec4b395a89e9489ccb.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\1007638001\c696d7d6a2.exe"C:\Users\Admin\AppData\Local\Temp\1007638001\c696d7d6a2.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
-
C:\Users\Admin\AppData\Local\Temp\1007639001\d808323f7a.exe"C:\Users\Admin\AppData\Local\Temp\1007639001\d808323f7a.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2016
-
-
C:\Users\Admin\AppData\Local\Temp\1007640001\c05596eb37.exe"C:\Users\Admin\AppData\Local\Temp\1007640001\c05596eb37.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:704
-
-
C:\Users\Admin\AppData\Local\Temp\1007641001\4984f3a357.exe"C:\Users\Admin\AppData\Local\Temp\1007641001\4984f3a357.exe"4⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2312
-
-
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7CNUR30T\download[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
2.8MB
MD5afea54bb6f5e4adb448036812363ca2e
SHA19626b3093dc9c9aa2982462b14258b7ff9f8e256
SHA2569742f2ebcfdac7645f7872e538cfde538ad165eab94e1f934bb8ebd1ab18aed4
SHA51259231960ead5c1001e03164248fe3d771aadba467cfdbcf30138286962ab779961c6319b417bd6a751bcfe432fb56efc5d35a225a9965ee07d60809e60484527
-
Filesize
1.9MB
MD59b43474fd844676d97d016d9d037bbcf
SHA1078b35dc7f41594097c7b44c48355ecc69561705
SHA2560bf7baaeecf805b63fb7c3db3a1e0df9be2d92cedc384108be9cc676bdf8619e
SHA51203c71fa8b1f58ff01e9a73b0788e65ccc2ffb7a56e632ca2c1d316c9114f3c3472a3639553cabc92ba6ac43d98f72cb852055bb46af21c929a5b6842f28c8b51
-
Filesize
1.9MB
MD51f39fac8d8f8c1e3e0697ebf585af36c
SHA1f98243a6bdea8f7de4cfa02d157e94b1cf925f51
SHA256ec2349f4f55242a8328a7f11c5013a7525fa05aa18a680c1d82f2d6d93e6e1ad
SHA512ebf1551cc77e6f815f18ebd38ffc3b581fbc0b07642175db9178652e3cad6be0a38bf978ea09d46815ca64b1482a87261ac5e34303b14420ce89c7c684a7aaed
-
Filesize
4.2MB
MD50e6e12f9a9c017b4be17933aeacd543c
SHA14c8fda6bdcbb813081a6d72bd6ad3ff430e17bee
SHA256738cdc197a8ece363679b55f005dccd3a943e4b333d69e946f80ff6c0445cd87
SHA5124050a406f72c3842fb207b40c77a153f96b863029e191cddae1ab1f59b3ba6a8f49a5de46e0a7159382fc101e1199a5c14d54f8eff29d55a246dfba4a232cf91
-
Filesize
2.9MB
MD5c3ee35c8b65f7b15a8941b2dee05835e
SHA162a6c389a94fff3eb70a308b29aa7ca8444dfcc2
SHA2567799197bff28707544d1c92e81250479de08e605210d39ec4b395a89e9489ccb
SHA512cce2363ac083c3929839a430e0219c28da3b2d805edbb059e5c40a00ed659b9337635dadc9db86acc86993945533c4661fcaf637a22ab349306d69221b0d8789
-
Filesize
1.4MB
MD5a8cf5621811f7fac55cfe8cb3fa6b9f6
SHA1121356839e8138a03141f5f5856936a85bd2a474
SHA256614a0362ab87cee48d0935b5bb957d539be1d94c6fdeb3fe42fac4fbe182c10c
SHA5124479d951435f222ca7306774002f030972c9f1715d6aaf512fca9420dd79cb6d08240f80129f213851773290254be34f0ff63c7b1f4d554a7db5f84b69e84bdd