Analysis
-
max time kernel
146s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20241010-es -
resource tags
arch:x64arch:x86image:win7-20241010-eslocale:es-esos:windows7-x64systemwindows -
submitted
15/02/2025, 15:51
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win7-20241010-es
Behavioral task
behavioral2
Sample
random.exe
Resource
win10v2004-20250207-es
Behavioral task
behavioral3
Sample
random.exe
Resource
win10ltsc2021-20250211-es
Behavioral task
behavioral4
Sample
random.exe
Resource
win11-20250210-es
General
-
Target
random.exe
-
Size
1.8MB
-
MD5
bc3b0fcb68c9a3e6ce6ee8b3b9c258f6
-
SHA1
edde275eb12f3e35413bf5872034ed7fe318ee68
-
SHA256
c4de054a99bee0ddfb0969f6e7a371ab4c0cdf3fb5e6e712d657eb58f5e916d8
-
SHA512
7f1b24935b2e0746aa57ce2bc2208b7756556de44e759073539e434fcaa859a1be62ea554999468bba9948de54038f7ee389ff80effcd2ba4e2d238cc86e4d83
-
SSDEEP
49152:y3OcrT0HpwEszQyM6w1muKtmMSb65a2wz3pcM:K4GJzbM6qmuKtjSb65ybV
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Detect Poverty Stealer Payload 1 IoCs
resource yara_rule behavioral1/files/0x00050000000195c1-107.dat family_povertystealer -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
Povertystealer family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a571806e6c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b3cc172df2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1091cd40f2.exe -
Downloads MZ/PE file 4 IoCs
flow pid Process 4 3032 axplong.exe 4 3032 axplong.exe 7 3032 axplong.exe 10 2020 skotes.exe -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a571806e6c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b3cc172df2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b3cc172df2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1091cd40f2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a571806e6c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1091cd40f2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe -
Executes dropped EXE 6 IoCs
pid Process 3032 axplong.exe 1880 a571806e6c.exe 2952 b3cc172df2.exe 2020 skotes.exe 1552 0LGvvQO.exe 2928 1091cd40f2.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine a571806e6c.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine b3cc172df2.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 1091cd40f2.exe -
Loads dropped DLL 11 IoCs
pid Process 1920 random.exe 1920 random.exe 3032 axplong.exe 3032 axplong.exe 3032 axplong.exe 3032 axplong.exe 2952 b3cc172df2.exe 2952 b3cc172df2.exe 2020 skotes.exe 2020 skotes.exe 3032 axplong.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\a571806e6c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1020772001\\a571806e6c.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\b3cc172df2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1020773001\\b3cc172df2.exe" axplong.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 1920 random.exe 3032 axplong.exe 1880 a571806e6c.exe 2952 b3cc172df2.exe 2020 skotes.exe 2928 1091cd40f2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job b3cc172df2.exe File created C:\Windows\Tasks\axplong.job random.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a571806e6c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3cc172df2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0LGvvQO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1091cd40f2.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1920 random.exe 3032 axplong.exe 1880 a571806e6c.exe 2952 b3cc172df2.exe 2020 skotes.exe 2928 1091cd40f2.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1920 random.exe 2952 b3cc172df2.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1920 wrote to memory of 3032 1920 random.exe 31 PID 1920 wrote to memory of 3032 1920 random.exe 31 PID 1920 wrote to memory of 3032 1920 random.exe 31 PID 1920 wrote to memory of 3032 1920 random.exe 31 PID 3032 wrote to memory of 1880 3032 axplong.exe 33 PID 3032 wrote to memory of 1880 3032 axplong.exe 33 PID 3032 wrote to memory of 1880 3032 axplong.exe 33 PID 3032 wrote to memory of 1880 3032 axplong.exe 33 PID 3032 wrote to memory of 2952 3032 axplong.exe 34 PID 3032 wrote to memory of 2952 3032 axplong.exe 34 PID 3032 wrote to memory of 2952 3032 axplong.exe 34 PID 3032 wrote to memory of 2952 3032 axplong.exe 34 PID 2952 wrote to memory of 2020 2952 b3cc172df2.exe 35 PID 2952 wrote to memory of 2020 2952 b3cc172df2.exe 35 PID 2952 wrote to memory of 2020 2952 b3cc172df2.exe 35 PID 2952 wrote to memory of 2020 2952 b3cc172df2.exe 35 PID 2020 wrote to memory of 1552 2020 skotes.exe 38 PID 2020 wrote to memory of 1552 2020 skotes.exe 38 PID 2020 wrote to memory of 1552 2020 skotes.exe 38 PID 2020 wrote to memory of 1552 2020 skotes.exe 38 PID 3032 wrote to memory of 2928 3032 axplong.exe 39 PID 3032 wrote to memory of 2928 3032 axplong.exe 39 PID 3032 wrote to memory of 2928 3032 axplong.exe 39 PID 3032 wrote to memory of 2928 3032 axplong.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\1020772001\a571806e6c.exe"C:\Users\Admin\AppData\Local\Temp\1020772001\a571806e6c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1880
-
-
C:\Users\Admin\AppData\Local\Temp\1020773001\b3cc172df2.exe"C:\Users\Admin\AppData\Local\Temp\1020773001\b3cc172df2.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\1081341001\0LGvvQO.exe"C:\Users\Admin\AppData\Local\Temp\1081341001\0LGvvQO.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1552
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1020774001\1091cd40f2.exe"C:\Users\Admin\AppData\Local\Temp\1020774001\1091cd40f2.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2928
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5be387fa24001fc6815aaa56fd034e158
SHA1ea2116971dc1c9e20250d6e895a467033d3b66cc
SHA25697a0714c97ef7d24d3e6724c9101e4fa035159eab3dd194b4b8f2c3fe927ced3
SHA5128f7ce5bd72a87b7147c65a341b0f6902d68af49b1400bd6a42bcbe2b90719da218a5568eac26ca24e9f6c045ab784a446cd9e81bcf3d8ea212f96c7b9422f1da
-
Filesize
2.0MB
MD5190126600c4f0d6f6f75c7bd47081ce9
SHA17fce3c146cb29413dcbe133013f7bf760fb3d6d1
SHA25604a56891b310acf9bb0397f078f1ac1c117754423f6ebc76bd2b0c7182cf3825
SHA5128ee42e579c04a085bca667cc797b07fe63e26d5379f95d15471c877f26e5f22fb478986c717ecb1871ccbb2758eea7f523f7ce0ab2231b358a17d41223f73384
-
Filesize
3.7MB
MD51a85b92e5c9eea99ad9cd158576db415
SHA1297be663c521a3d3227b2e25f8027efdf1f8d4af
SHA256b0e7efb1c33ded1e5818fa7c0adfd655b6b6f06bc23e86c76b52d4dbd71ba190
SHA5129480d41d4bba8ad31b4eacd184207764c4eea730eb6586255c1635f1d0078a4b17f8990e6fbfcf6fb978107580627464a2d0dc3ac06f37687fc29c592ff26e64
-
Filesize
29KB
MD5add23973544b5d947afe8c05565e11f9
SHA1b6d8360d9df46c75d06ca0ddd50dc569e3affb5c
SHA2565d0cf474f881a4f66417ee5cd6407575f86faa03adabbb490421eb74f89f083b
SHA512d8ea63cec9911bb8c5cdcbfd15c368096876a56cb694df29b531eec44119cd400577367c0f490bb51de1be7f6faaa0fae74a76f79707c463fe6418c569688504
-
Filesize
1.8MB
MD5bc3b0fcb68c9a3e6ce6ee8b3b9c258f6
SHA1edde275eb12f3e35413bf5872034ed7fe318ee68
SHA256c4de054a99bee0ddfb0969f6e7a371ab4c0cdf3fb5e6e712d657eb58f5e916d8
SHA5127f1b24935b2e0746aa57ce2bc2208b7756556de44e759073539e434fcaa859a1be62ea554999468bba9948de54038f7ee389ff80effcd2ba4e2d238cc86e4d83