Overview
overview
10Static
static
10quarantine...YX.exe
windows7-x64
8quarantine...YX.exe
windows10-2004-x64
8quarantine...dC.exe
windows7-x64
3quarantine...dC.exe
windows10-2004-x64
7quarantine...4U.exe
windows7-x64
7quarantine...4U.exe
windows10-2004-x64
7quarantine...Un.exe
windows7-x64
1quarantine...Un.exe
windows10-2004-x64
1quarantine...Gw.msi
windows7-x64
6quarantine...Gw.msi
windows10-2004-x64
6quarantine...pL.exe
windows7-x64
9quarantine...pL.exe
windows10-2004-x64
9quarantine...wS.exe
windows7-x64
10quarantine...wS.exe
windows10-2004-x64
10quarantine...au.exe
windows7-x64
10quarantine...au.exe
windows10-2004-x64
10quarantine...Ms.exe
windows7-x64
10quarantine...Ms.exe
windows10-2004-x64
10quarantine...mH.exe
windows7-x64
10quarantine...mH.exe
windows10-2004-x64
10quarantine...MX.exe
windows7-x64
3quarantine...MX.exe
windows10-2004-x64
7quarantine...Ll.exe
windows7-x64
9quarantine...Ll.exe
windows10-2004-x64
9quarantine...er.exe
windows7-x64
10quarantine...er.exe
windows10-2004-x64
10quarantine/pwldr.exe
windows7-x64
6quarantine/pwldr.exe
windows10-2004-x64
6quarantine...Mc.exe
windows7-x64
10quarantine...Mc.exe
windows10-2004-x64
10quarantine...s9.exe
windows7-x64
3quarantine...s9.exe
windows10-2004-x64
1Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25/02/2025, 22:21
Behavioral task
behavioral1
Sample
quarantine/0iMSdYX.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
quarantine/0iMSdYX.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
quarantine/6NPpGdC.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
quarantine/6NPpGdC.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
quarantine/8NsQP4U.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
quarantine/8NsQP4U.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
quarantine/Cv5YtUn.exe
Resource
win7-20250207-en
Behavioral task
behavioral8
Sample
quarantine/Cv5YtUn.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
quarantine/DeX17Gw.msi
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
quarantine/DeX17Gw.msi
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
quarantine/E3WGlpL.exe
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
quarantine/E3WGlpL.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
quarantine/JhOTKwS.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
quarantine/JhOTKwS.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
quarantine/MegVlau.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
quarantine/MegVlau.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
quarantine/Q7t2AMs.exe
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
quarantine/Q7t2AMs.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
quarantine/RHPLumH.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
quarantine/RHPLumH.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
quarantine/Yg1HwMX.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
quarantine/Yg1HwMX.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
quarantine/bgUvqLl.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
quarantine/bgUvqLl.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
quarantine/netdriver.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
quarantine/netdriver.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
quarantine/pwldr.exe
Resource
win7-20250207-en
Behavioral task
behavioral28
Sample
quarantine/pwldr.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
quarantine/q3na5Mc.exe
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
quarantine/q3na5Mc.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
quarantine/rA6Gys9.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
quarantine/rA6Gys9.exe
Resource
win10v2004-20250217-en
General
-
Target
quarantine/Q7t2AMs.exe
-
Size
1.8MB
-
MD5
e3db5749715032f09380e2b83170df85
-
SHA1
5eba9270b0a48ffda040d10e08aef49acbb4452d
-
SHA256
0b7d45d489afd6e58928811ef8f1205be232299791f0011578e9ce688735aafe
-
SHA512
682cd0e0a9c915b6c7b0b95186c18536167059920abe8afd92efa7259f6a5d918a4e7a7da7c32f44bc62e6d16fd8988ea046a21429b83bbe37457fdf3e77e199
-
SSDEEP
49152:piz+b/M/T/XsCWYkr+Sah/lROSwrk9CUMeUz:piCb2/XsLrPCOd4g/x
Malware Config
Extracted
amadey
5.21
a4d2cd
http://cobolrationumelawrtewarms.com
http://�������� jlgenfekjlfnvtgpegkwr.xyz
-
install_dir
a58456755d
-
install_file
Gxtuum.exe
-
strings_key
00fadbeacf092dfd58b48ef4ac68f826
-
url_paths
/3ofn3jf3e2ljk/index.php
Extracted
systembc
towerbingobongoboom.com
93.186.202.3
-
dns
5.132.191.104
Signatures
-
Amadey family
-
Systembc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ sounsaytums.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rbsmife.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Q7t2AMs.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Gxtuum.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 6 2812 Gxtuum.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Q7t2AMs.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion sounsaytums.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rbsmife.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rbsmife.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Q7t2AMs.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion sounsaytums.exe -
Executes dropped EXE 3 IoCs
pid Process 2812 Gxtuum.exe 2044 sounsaytums.exe 1984 rbsmife.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine Gxtuum.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine sounsaytums.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine rbsmife.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine Q7t2AMs.exe -
Loads dropped DLL 4 IoCs
pid Process 2096 Q7t2AMs.exe 2096 Q7t2AMs.exe 2812 Gxtuum.exe 2812 Gxtuum.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2096 Q7t2AMs.exe 2812 Gxtuum.exe 2044 sounsaytums.exe 1984 rbsmife.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\Gxtuum.job Q7t2AMs.exe File created C:\Windows\Tasks\Test Task17.job sounsaytums.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sounsaytums.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rbsmife.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Q7t2AMs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2096 Q7t2AMs.exe 2812 Gxtuum.exe 2044 sounsaytums.exe 1984 rbsmife.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2096 Q7t2AMs.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2812 2096 Q7t2AMs.exe 31 PID 2096 wrote to memory of 2812 2096 Q7t2AMs.exe 31 PID 2096 wrote to memory of 2812 2096 Q7t2AMs.exe 31 PID 2096 wrote to memory of 2812 2096 Q7t2AMs.exe 31 PID 2812 wrote to memory of 2044 2812 Gxtuum.exe 33 PID 2812 wrote to memory of 2044 2812 Gxtuum.exe 33 PID 2812 wrote to memory of 2044 2812 Gxtuum.exe 33 PID 2812 wrote to memory of 2044 2812 Gxtuum.exe 33 PID 944 wrote to memory of 1984 944 taskeng.exe 35 PID 944 wrote to memory of 1984 944 taskeng.exe 35 PID 944 wrote to memory of 1984 944 taskeng.exe 35 PID 944 wrote to memory of 1984 944 taskeng.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\quarantine\Q7t2AMs.exe"C:\Users\Admin\AppData\Local\Temp\quarantine\Q7t2AMs.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Roaming\10000160100\sounsaytums.exe"C:\Users\Admin\AppData\Roaming\10000160100\sounsaytums.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2044
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {3279D3F4-691F-49DA-8C18-18C8B088C80A} S-1-5-21-2703099537-420551529-3771253338-1000:XECUDNCD\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:944 -
C:\ProgramData\dnao\rbsmife.exeC:\ProgramData\dnao\rbsmife.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD522b7fa9d7ece61a0e0a7a0e9b130e311
SHA100329bc46fab8e69da98e11894e7249fc4b5199f
SHA2560acada86bfe4cbdc97544e147207bcee377948415acb32223fe6a69716591c8f
SHA512cbc289aaf8a12863fc5d27443daea89e90045805b110eb2a4eabbfa2afb185651355dcffcb9a8188801786e2a07aa7198d31aba8d3bc4c2f8bcfea66033260b9
-
Filesize
218B
MD5900d8ea41149a4bc1d0bc27b8178287c
SHA1583e385ffa18b2bc1247e82dce18ec48826d7237
SHA2568c761b26944c1136b004791bc0924f71976a8db069e0caf4c5aee93ad46370c7
SHA512e5296bea28e9f65dac0dda22c415b64b79b866da928cf3b074d2c44e6dded8764a8ed1909728ad01a09a09b264e16f670588fe8979093339ef501b0def195e68
-
Filesize
1.8MB
MD5e3db5749715032f09380e2b83170df85
SHA15eba9270b0a48ffda040d10e08aef49acbb4452d
SHA2560b7d45d489afd6e58928811ef8f1205be232299791f0011578e9ce688735aafe
SHA512682cd0e0a9c915b6c7b0b95186c18536167059920abe8afd92efa7259f6a5d918a4e7a7da7c32f44bc62e6d16fd8988ea046a21429b83bbe37457fdf3e77e199