Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
11/02/2025, 14:54
Static task
static1
Behavioral task
behavioral1
Sample
95d87424384bed2b8798668d45a7380dba16af93592624047007cdf47672a03a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
95d87424384bed2b8798668d45a7380dba16af93592624047007cdf47672a03a.exe
Resource
win10v2004-20250207-en
General
-
Target
95d87424384bed2b8798668d45a7380dba16af93592624047007cdf47672a03a.exe
-
Size
1.8MB
-
MD5
3af90e4da7e6b4bca27579b16206954f
-
SHA1
ccd7d9488bc793fc191f0c5905a6eb1e2cd7e032
-
SHA256
95d87424384bed2b8798668d45a7380dba16af93592624047007cdf47672a03a
-
SHA512
46247a89b128a14c78c486fa5d7a739d6a5b306fd92f7cc0b35f9688c60e1ca0ee4779cff95feadcb5510b87199013d521720dcf60427f238ddaf8932ccc9ccd
-
SSDEEP
49152:302a7VIpkTCJ1XTIMvj719TP5bvyv/OA1C:30jCjnTIMvj715Rb
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 95d87424384bed2b8798668d45a7380dba16af93592624047007cdf47672a03a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 92b14922b0.exe -
Downloads MZ/PE file 4 IoCs
flow pid Process 28 4136 Process not Found 50 2700 axplong.exe 63 2700 axplong.exe 67 4524 skotes.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 92b14922b0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 95d87424384bed2b8798668d45a7380dba16af93592624047007cdf47672a03a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 92b14922b0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 95d87424384bed2b8798668d45a7380dba16af93592624047007cdf47672a03a.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1290774215-692483676-1419523182-1000\Control Panel\International\Geo\Nation 95d87424384bed2b8798668d45a7380dba16af93592624047007cdf47672a03a.exe Key value queried \REGISTRY\USER\S-1-5-21-1290774215-692483676-1419523182-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-1290774215-692483676-1419523182-1000\Control Panel\International\Geo\Nation 92b14922b0.exe -
Executes dropped EXE 6 IoCs
pid Process 2700 axplong.exe 3656 axplong.exe 3232 axplong.exe 2576 axplong.exe 3276 92b14922b0.exe 4524 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1290774215-692483676-1419523182-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1290774215-692483676-1419523182-1000\Software\Wine 95d87424384bed2b8798668d45a7380dba16af93592624047007cdf47672a03a.exe Key opened \REGISTRY\USER\S-1-5-21-1290774215-692483676-1419523182-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1290774215-692483676-1419523182-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1290774215-692483676-1419523182-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1290774215-692483676-1419523182-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1290774215-692483676-1419523182-1000\Software\Wine 92b14922b0.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1290774215-692483676-1419523182-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\92b14922b0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1019857001\\92b14922b0.exe" axplong.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 1268 95d87424384bed2b8798668d45a7380dba16af93592624047007cdf47672a03a.exe 2700 axplong.exe 3656 axplong.exe 3232 axplong.exe 2576 axplong.exe 3276 92b14922b0.exe 4524 skotes.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job 95d87424384bed2b8798668d45a7380dba16af93592624047007cdf47672a03a.exe File created C:\Windows\Tasks\skotes.job 92b14922b0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92b14922b0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 95d87424384bed2b8798668d45a7380dba16af93592624047007cdf47672a03a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4356 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1268 95d87424384bed2b8798668d45a7380dba16af93592624047007cdf47672a03a.exe 1268 95d87424384bed2b8798668d45a7380dba16af93592624047007cdf47672a03a.exe 2700 axplong.exe 2700 axplong.exe 3656 axplong.exe 3656 axplong.exe 3232 axplong.exe 3232 axplong.exe 2576 axplong.exe 2576 axplong.exe 3276 92b14922b0.exe 3276 92b14922b0.exe 4524 skotes.exe 4524 skotes.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1268 wrote to memory of 2700 1268 95d87424384bed2b8798668d45a7380dba16af93592624047007cdf47672a03a.exe 89 PID 1268 wrote to memory of 2700 1268 95d87424384bed2b8798668d45a7380dba16af93592624047007cdf47672a03a.exe 89 PID 1268 wrote to memory of 2700 1268 95d87424384bed2b8798668d45a7380dba16af93592624047007cdf47672a03a.exe 89 PID 2700 wrote to memory of 3276 2700 axplong.exe 106 PID 2700 wrote to memory of 3276 2700 axplong.exe 106 PID 2700 wrote to memory of 3276 2700 axplong.exe 106 PID 3276 wrote to memory of 4524 3276 92b14922b0.exe 107 PID 3276 wrote to memory of 4524 3276 92b14922b0.exe 107 PID 3276 wrote to memory of 4524 3276 92b14922b0.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\95d87424384bed2b8798668d45a7380dba16af93592624047007cdf47672a03a.exe"C:\Users\Admin\AppData\Local\Temp\95d87424384bed2b8798668d45a7380dba16af93592624047007cdf47672a03a.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\1019857001\92b14922b0.exe"C:\Users\Admin\AppData\Local\Temp\1019857001\92b14922b0.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4524
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3656
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIzIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDQ5MjgiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxNzQzMjM4OTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0ODgwMjk5NDYzIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4356
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3232
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2576
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD5984349ffeb085a85bd179dc573b0685c
SHA163dc75cfc41d19079d960144586ea277b8c02b96
SHA256b276a32381e5740ab726c4fe1d1f2bf10009014ecc8d49a6fe88d775c1aac982
SHA512d15bb6c94747608a7b37671a4e2907357a1b6a411cccff5f69425919893b5474b95e2501310240a94ec50bf0e19cb9546119bfb8c6f38a093ca1244f54db194f
-
Filesize
2.0MB
MD5582f90039d305a4706f8556ac74dcb90
SHA139f2454fcdd5ffd812034b5e3b8b7183722214ec
SHA2567676247d21cfeaa362f445d12ae1985db713e69f59bd512fb6d69b7c38faf5f4
SHA51299f25a83afbd6fbe784c3110f32ba693a386be041b68625f44e1d43487407366a81f6f51173b702da9b66ed7e1d1faf37d4309ce6e57c5e438d84452aed2c12c
-
Filesize
1.8MB
MD53af90e4da7e6b4bca27579b16206954f
SHA1ccd7d9488bc793fc191f0c5905a6eb1e2cd7e032
SHA25695d87424384bed2b8798668d45a7380dba16af93592624047007cdf47672a03a
SHA51246247a89b128a14c78c486fa5d7a739d6a5b306fd92f7cc0b35f9688c60e1ca0ee4779cff95feadcb5510b87199013d521720dcf60427f238ddaf8932ccc9ccd