Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250207-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250207-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
08/02/2025, 16:56
Static task
static1
Behavioral task
behavioral1
Sample
Fuckman1222.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Fuckman1222.exe
Resource
win10ltsc2021-20250207-en
General
-
Target
Fuckman1222.exe
-
Size
357KB
-
MD5
61d52fac0e14469242d7a57c38fb69f9
-
SHA1
ba287e919dbd980dc21390c9eca47904463b43b5
-
SHA256
b9b4f637ac232a76c562a0c693f217d40c1c42652f8a78bef2cf4caceb9eb164
-
SHA512
9f84bc269b0a4c0b31866a9982e90a4273a0d2bea4bf53a100c6083c1fe75515847e2d84b0f4f4b1d79eaa2185ad1a9893b67337d10069fb30e969231db2580d
-
SSDEEP
6144:b7zZpiCk17utgPi6NViFY1mIHYH2bOVOWX74DscbbQHzm5ZO0zg8lMSKkbgSJTjr:PzZpiV17uqPi6a4mIG2yVlLKPb+zm5Z9
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ OYHPBK2YCBC8OU0363LZ7E4R4RX.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 098520dd48.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Downloads MZ/PE file 5 IoCs
flow pid Process 32 4292 Fuckman1222.exe 41 1656 axplong.exe 52 3880 Process not Found 60 1656 axplong.exe 61 1656 axplong.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion OYHPBK2YCBC8OU0363LZ7E4R4RX.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion OYHPBK2YCBC8OU0363LZ7E4R4RX.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 098520dd48.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 098520dd48.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1724898312-1363836731-1320094270-1000\Control Panel\International\Geo\Nation OYHPBK2YCBC8OU0363LZ7E4R4RX.exe Key value queried \REGISTRY\USER\S-1-5-21-1724898312-1363836731-1320094270-1000\Control Panel\International\Geo\Nation axplong.exe -
Executes dropped EXE 5 IoCs
pid Process 3960 OYHPBK2YCBC8OU0363LZ7E4R4RX.exe 1656 axplong.exe 2592 098520dd48.exe 2600 axplong.exe 4368 axplong.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1724898312-1363836731-1320094270-1000\Software\Wine OYHPBK2YCBC8OU0363LZ7E4R4RX.exe Key opened \REGISTRY\USER\S-1-5-21-1724898312-1363836731-1320094270-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1724898312-1363836731-1320094270-1000\Software\Wine 098520dd48.exe Key opened \REGISTRY\USER\S-1-5-21-1724898312-1363836731-1320094270-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1724898312-1363836731-1320094270-1000\Software\Wine axplong.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1724898312-1363836731-1320094270-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\098520dd48.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1019191001\\098520dd48.exe" axplong.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 3960 OYHPBK2YCBC8OU0363LZ7E4R4RX.exe 1656 axplong.exe 2592 098520dd48.exe 2600 axplong.exe 4368 axplong.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4676 set thread context of 4292 4676 Fuckman1222.exe 84 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job OYHPBK2YCBC8OU0363LZ7E4R4RX.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1208 4676 WerFault.exe 83 4788 4292 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fuckman1222.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OYHPBK2YCBC8OU0363LZ7E4R4RX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 098520dd48.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fuckman1222.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1188 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4292 Fuckman1222.exe 4292 Fuckman1222.exe 4292 Fuckman1222.exe 4292 Fuckman1222.exe 3960 OYHPBK2YCBC8OU0363LZ7E4R4RX.exe 3960 OYHPBK2YCBC8OU0363LZ7E4R4RX.exe 1656 axplong.exe 1656 axplong.exe 2592 098520dd48.exe 2592 098520dd48.exe 2600 axplong.exe 2600 axplong.exe 4368 axplong.exe 4368 axplong.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3960 OYHPBK2YCBC8OU0363LZ7E4R4RX.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4676 wrote to memory of 4292 4676 Fuckman1222.exe 84 PID 4676 wrote to memory of 4292 4676 Fuckman1222.exe 84 PID 4676 wrote to memory of 4292 4676 Fuckman1222.exe 84 PID 4676 wrote to memory of 4292 4676 Fuckman1222.exe 84 PID 4676 wrote to memory of 4292 4676 Fuckman1222.exe 84 PID 4676 wrote to memory of 4292 4676 Fuckman1222.exe 84 PID 4676 wrote to memory of 4292 4676 Fuckman1222.exe 84 PID 4676 wrote to memory of 4292 4676 Fuckman1222.exe 84 PID 4676 wrote to memory of 4292 4676 Fuckman1222.exe 84 PID 4292 wrote to memory of 3960 4292 Fuckman1222.exe 92 PID 4292 wrote to memory of 3960 4292 Fuckman1222.exe 92 PID 4292 wrote to memory of 3960 4292 Fuckman1222.exe 92 PID 3960 wrote to memory of 1656 3960 OYHPBK2YCBC8OU0363LZ7E4R4RX.exe 93 PID 3960 wrote to memory of 1656 3960 OYHPBK2YCBC8OU0363LZ7E4R4RX.exe 93 PID 3960 wrote to memory of 1656 3960 OYHPBK2YCBC8OU0363LZ7E4R4RX.exe 93 PID 1656 wrote to memory of 2592 1656 axplong.exe 96 PID 1656 wrote to memory of 2592 1656 axplong.exe 96 PID 1656 wrote to memory of 2592 1656 axplong.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fuckman1222.exe"C:\Users\Admin\AppData\Local\Temp\Fuckman1222.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\Fuckman1222.exe"C:\Users\Admin\AppData\Local\Temp\Fuckman1222.exe"2⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\OYHPBK2YCBC8OU0363LZ7E4R4RX.exe"C:\Users\Admin\AppData\Local\Temp\OYHPBK2YCBC8OU0363LZ7E4R4RX.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\1019191001\098520dd48.exe"C:\Users\Admin\AppData\Local\Temp\1019191001\098520dd48.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2592
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4292 -s 13443⤵
- Program crash
PID:4788
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4676 -s 8202⤵
- Program crash
PID:1208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4676 -ip 46761⤵PID:2724
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-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⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4292 -ip 42921⤵PID:4640
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2600
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4368
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD59aae6d5ccff76c42937b4429b9f58e2e
SHA1a7c69ded9e92661378c844f4454b88781d7f167c
SHA2569a7d9449917fed431828e097fd169dd284ad98577c8345cb82e7b502506afd5e
SHA5128877fc53d794833c427c6517d360385c44d947cc079a9799198bdd80c8e301a6554edbbae3e3348dc946fc640562f4dcd40ab0bfff4303dde641fe95c5efcf71
-
Filesize
1.8MB
MD5c85b31285d25a60c52ca68a12666bab2
SHA152ca79e85e2d171a4fab23e9fa934bee82f0c81e
SHA25617877408071345861ebaa176742af045ea1f6f274d7dc458c653adec2263e237
SHA5124391a4993575cd806411dc185b403e3b1afb3a0af0d893135660517b7f59f85933e8b5ca4f16e0799872f98780d07d04d062528886a3c422e7a5fced1df9110f