Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
11-02-2025 09:59
Static task
static1
General
-
Target
284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe
-
Size
1.8MB
-
MD5
0bd65d719958147c36050e910765ce4d
-
SHA1
ebac484d5a74c02602497779aa5f698c0d6f12de
-
SHA256
284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a
-
SHA512
e2203613eda0b3b85a6267276abaec04d075bd9c3c5d49842c15bf4102788fee1d300cef847796f20156dfcd65fcbf86b495c5943d656af855a57e3885b4c61b
-
SSDEEP
49152:DR7mYJyM4o8oiKo0yXr/eXIikTJMTXouL+Z:DVmYgro8pKvyaYiw4
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Gcleaner family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7cf9d04015.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4372251f33.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ efcf23fe30.exe -
Downloads MZ/PE file 5 IoCs
flow pid Process 10 4924 axplong.exe 10 4924 axplong.exe 68 4196 Process not Found 75 4924 axplong.exe 79 4992 skotes.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion efcf23fe30.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4372251f33.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4372251f33.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7cf9d04015.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion efcf23fe30.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7cf9d04015.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1290774215-692483676-1419523182-1000\Control Panel\International\Geo\Nation 284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe Key value queried \REGISTRY\USER\S-1-5-21-1290774215-692483676-1419523182-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-1290774215-692483676-1419523182-1000\Control Panel\International\Geo\Nation 4372251f33.exe -
Executes dropped EXE 6 IoCs
pid Process 4924 axplong.exe 4064 7cf9d04015.exe 1740 4372251f33.exe 4992 skotes.exe 2956 skotes.exe 4064 efcf23fe30.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1290774215-692483676-1419523182-1000\Software\Wine 4372251f33.exe Key opened \REGISTRY\USER\S-1-5-21-1290774215-692483676-1419523182-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1290774215-692483676-1419523182-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1290774215-692483676-1419523182-1000\Software\Wine efcf23fe30.exe Key opened \REGISTRY\USER\S-1-5-21-1290774215-692483676-1419523182-1000\Software\Wine 284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe Key opened \REGISTRY\USER\S-1-5-21-1290774215-692483676-1419523182-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1290774215-692483676-1419523182-1000\Software\Wine 7cf9d04015.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1290774215-692483676-1419523182-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7cf9d04015.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1019808001\\7cf9d04015.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-1290774215-692483676-1419523182-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4372251f33.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1019809001\\4372251f33.exe" axplong.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 2572 284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe 4924 axplong.exe 4064 7cf9d04015.exe 1740 4372251f33.exe 4992 skotes.exe 2956 skotes.exe 4064 efcf23fe30.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4064 set thread context of 5044 4064 efcf23fe30.exe 103 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job 284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe File created C:\Windows\Tasks\skotes.job 4372251f33.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7cf9d04015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4372251f33.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efcf23fe30.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1184 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2572 284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe 2572 284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe 4924 axplong.exe 4924 axplong.exe 4064 7cf9d04015.exe 4064 7cf9d04015.exe 1740 4372251f33.exe 1740 4372251f33.exe 4992 skotes.exe 4992 skotes.exe 2956 skotes.exe 2956 skotes.exe 4064 efcf23fe30.exe 4064 efcf23fe30.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4064 efcf23fe30.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2572 284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2572 wrote to memory of 4924 2572 284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe 89 PID 2572 wrote to memory of 4924 2572 284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe 89 PID 2572 wrote to memory of 4924 2572 284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe 89 PID 4924 wrote to memory of 4064 4924 axplong.exe 95 PID 4924 wrote to memory of 4064 4924 axplong.exe 95 PID 4924 wrote to memory of 4064 4924 axplong.exe 95 PID 4924 wrote to memory of 1740 4924 axplong.exe 99 PID 4924 wrote to memory of 1740 4924 axplong.exe 99 PID 4924 wrote to memory of 1740 4924 axplong.exe 99 PID 1740 wrote to memory of 4992 1740 4372251f33.exe 100 PID 1740 wrote to memory of 4992 1740 4372251f33.exe 100 PID 1740 wrote to memory of 4992 1740 4372251f33.exe 100 PID 4924 wrote to memory of 4064 4924 axplong.exe 102 PID 4924 wrote to memory of 4064 4924 axplong.exe 102 PID 4924 wrote to memory of 4064 4924 axplong.exe 102 PID 4064 wrote to memory of 5044 4064 efcf23fe30.exe 103 PID 4064 wrote to memory of 5044 4064 efcf23fe30.exe 103 PID 4064 wrote to memory of 5044 4064 efcf23fe30.exe 103 PID 4064 wrote to memory of 5044 4064 efcf23fe30.exe 103 PID 4064 wrote to memory of 5044 4064 efcf23fe30.exe 103 PID 4064 wrote to memory of 5044 4064 efcf23fe30.exe 103 PID 4064 wrote to memory of 5044 4064 efcf23fe30.exe 103 PID 4064 wrote to memory of 5044 4064 efcf23fe30.exe 103 PID 4064 wrote to memory of 5044 4064 efcf23fe30.exe 103 PID 4064 wrote to memory of 5044 4064 efcf23fe30.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe"C:\Users\Admin\AppData\Local\Temp\284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\1019808001\7cf9d04015.exe"C:\Users\Admin\AppData\Local\Temp\1019808001\7cf9d04015.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4064
-
-
C:\Users\Admin\AppData\Local\Temp\1019809001\4372251f33.exe"C:\Users\Admin\AppData\Local\Temp\1019809001\4372251f33.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4992
-
-
-
C:\Users\Admin\AppData\Local\Temp\1019810001\efcf23fe30.exe"C:\Users\Admin\AppData\Local\Temp\1019810001\efcf23fe30.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
PID:5044
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIzIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDQ5MjgiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxNzQzMjM4OTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NDQ5MzI4NzkwIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1184
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2956
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266KB
MD52939bd4cfcee7983d7be15c9df4d4864
SHA1be18bd14212f76b184fea5729229869b293530b4
SHA256815bd57c427c8fa206192b489c3e76bbdb6cd58221dbb58d512d1adca0a0cd73
SHA512edb4082ec9b4810ca8f4d23113fb0b187d9dc8c5ff807e5ab824b10ae3b49195077302a024f93d8b49b6dee77b3cf929193ad1355b6cf432e150fbf41898d63f
-
Filesize
36B
MD5a1ca4bebcd03fafbe2b06a46a694e29a
SHA1ffc88125007c23ff6711147a12f9bba9c3d197ed
SHA256c3fa59901d56ce8a95a303b22fd119cb94abf4f43c4f6d60a81fd78b7d00fa65
SHA5126fe1730bf2a6bba058c5e1ef309a69079a6acca45c0dbca4e7d79c877257ac08e460af741459d1e335197cf4de209f2a2997816f2a2a3868b2c8d086ef789b0e
-
Filesize
1.7MB
MD5f457af464c54aa2097bdedc459abd266
SHA101ebb59e4ff33ae2948522d5044f00c0c6a13bef
SHA256ff34e13e63efb7df445b92003447ff4689281ec83626594633dc8b61bcb9626a
SHA5123da5c916d3262bcdb29442daf625ea1483e38384e2d9ad83cae9694de4c9da9732e8da2068743d4698d135790088514a5c80235b7002f509556d873938bcc4e8
-
Filesize
2.0MB
MD54337cb18d6ef4061769d2645ceb0a90f
SHA1262ab69209f45a070c9ab405845835a7624dc49b
SHA25671397fc8ae19b7c0cfa91fb6a1a8829ab14e099818b66fd9bf98839c37027854
SHA512b3b7814922e4bc4efdcc776f02e5c0ad11b341be8e6e656d6d0a8e8b4aa3b1e7cf36968bc4611f23890aabe9f013ffbf2c4391f7b506b0294a245595a8423b14
-
Filesize
4.1MB
MD59e2b3772d2a4737b3f9a6399e2eb8887
SHA1415ae358a5217e30dfa6ab5830681ac3ff363452
SHA2567eb3fb8bc096b31316611b50a64e4872314746c89bd8e0ac0288f59af4a49959
SHA512c41c5c8d31300fb1a40455fec11a50076acc7d4be9ae41e9778a6a151e4151863fbf2884902b76dbe8508e241172432587edd002adeb802e1200669436694dd8
-
Filesize
1.8MB
MD50bd65d719958147c36050e910765ce4d
SHA1ebac484d5a74c02602497779aa5f698c0d6f12de
SHA256284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a
SHA512e2203613eda0b3b85a6267276abaec04d075bd9c3c5d49842c15bf4102788fee1d300cef847796f20156dfcd65fcbf86b495c5943d656af855a57e3885b4c61b