Overview
overview
10Static
static
7quarantine...XS.exe
windows7-x64
10quarantine...XS.exe
windows10-2004-x64
10quarantine...q7.exe
windows7-x64
5quarantine...q7.exe
windows10-2004-x64
5quarantine...yQ.exe
windows7-x64
7quarantine...yQ.exe
windows10-2004-x64
7quarantine...Nv.exe
windows7-x64
10quarantine...Nv.exe
windows10-2004-x64
10quarantine...TI.exe
windows7-x64
10quarantine...TI.exe
windows10-2004-x64
10quarantine...08.exe
windows7-x64
3quarantine...08.exe
windows10-2004-x64
3Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27/02/2025, 19:34
Static task
static1
Behavioral task
behavioral1
Sample
quarantine/27JinXS.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
quarantine/27JinXS.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
quarantine/DVaKyq7.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
quarantine/DVaKyq7.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
quarantine/FydOzyQ.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
quarantine/FydOzyQ.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
quarantine/mAtJWNv.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
quarantine/mAtJWNv.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
quarantine/systemPTI.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
quarantine/systemPTI.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
quarantine/uW8i508.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
quarantine/uW8i508.exe
Resource
win10v2004-20250217-en
General
-
Target
quarantine/27JinXS.exe
-
Size
1.8MB
-
MD5
36e536a514745cab05f83cbe5f4a412e
-
SHA1
befb59b14249e5f240bb80281f1a14663438b126
-
SHA256
539b89630bf205ece9a5e8e8a1326534c5a39dc511839c68ecb99ef9f5a97715
-
SHA512
63245e2771ce4118f3a51a5d0d87cec398838389e56ad7783299cd21b98f5f5b33dcf99ca015f68b30d9349e94c8cfc1e7ad40ec67f8db2766d38c94202ab88f
-
SSDEEP
49152:t08XQzvwAeSbDRSBrpRXGEfe1KDe241I0cxcV:t08gfeS4BrnWEfe1KDe24qzxy
Malware Config
Extracted
amadey
5.21
a4d2cd
http://cobolrationumelawrtewarms.com
http://�������� jlgenfekjlfnvtgpegkwr.xyz
-
install_dir
a58456755d
-
install_file
Gxtuum.exe
-
strings_key
00fadbeacf092dfd58b48ef4ac68f826
-
url_paths
/3ofn3jf3e2ljk/index.php
Extracted
systembc
towerbingobongoboom.com
93.186.202.3
-
dns
5.132.191.104
Signatures
-
Amadey family
-
Systembc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Gxtuum.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ sidedrive.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ hoxc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 27JinXS.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion sidedrive.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion hoxc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion hoxc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 27JinXS.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 27JinXS.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion sidedrive.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Gxtuum.exe -
Executes dropped EXE 3 IoCs
pid Process 2808 Gxtuum.exe 2800 sidedrive.exe 2176 hoxc.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine sidedrive.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine hoxc.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 27JinXS.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine Gxtuum.exe -
Loads dropped DLL 4 IoCs
pid Process 2328 27JinXS.exe 2328 27JinXS.exe 2808 Gxtuum.exe 2808 Gxtuum.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2328 27JinXS.exe 2808 Gxtuum.exe 2800 sidedrive.exe 2176 hoxc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\Test Task17.job sidedrive.exe File created C:\Windows\Tasks\Gxtuum.job 27JinXS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27JinXS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sidedrive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hoxc.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2328 27JinXS.exe 2808 Gxtuum.exe 2800 sidedrive.exe 2176 hoxc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2328 27JinXS.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2808 2328 27JinXS.exe 31 PID 2328 wrote to memory of 2808 2328 27JinXS.exe 31 PID 2328 wrote to memory of 2808 2328 27JinXS.exe 31 PID 2328 wrote to memory of 2808 2328 27JinXS.exe 31 PID 2808 wrote to memory of 2800 2808 Gxtuum.exe 33 PID 2808 wrote to memory of 2800 2808 Gxtuum.exe 33 PID 2808 wrote to memory of 2800 2808 Gxtuum.exe 33 PID 2808 wrote to memory of 2800 2808 Gxtuum.exe 33 PID 2160 wrote to memory of 2176 2160 taskeng.exe 35 PID 2160 wrote to memory of 2176 2160 taskeng.exe 35 PID 2160 wrote to memory of 2176 2160 taskeng.exe 35 PID 2160 wrote to memory of 2176 2160 taskeng.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\quarantine\27JinXS.exe"C:\Users\Admin\AppData\Local\Temp\quarantine\27JinXS.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\10000370102\sidedrive.exe"C:\Users\Admin\10000370102\sidedrive.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2800
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {56804526-E9AE-48FF-A5B0-1B5591B07AFC} S-1-5-21-2703099537-420551529-3771253338-1000:XECUDNCD\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\ProgramData\wvxbcsn\hoxc.exeC:\ProgramData\wvxbcsn\hoxc.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD59327612494e1fec94a9a71ecedc9d7f4
SHA104b1499f6545f8b46dff78e5fc23c1dabba8d4cf
SHA256a3648d301911d0cec6cb3146aa6b855d431ef1111e82f34f7fa2ea726d3a751a
SHA512aac244e169bae3beb125b0a19cb94f7cfcb606374d71e313bee07620add5a618452a951cfcec804c8d7256f9b01d80400be381e94e147fa094fa8785f93b3a87
-
Filesize
1.7MB
MD5ab3bb6fd999fcaac8b629e73f9c25f94
SHA1fe902e4109b31a7cd4139903844fbcff0e90dc19
SHA2564ab7a73329c779250db180f35da568e52bc9e36ea2667348693cccc67b17f8e6
SHA512f15fccc089d99eb10744d5ed31147f32ccefb23300010b7a4322b4a87b4f6431a3cb5da64def3325d9acb5c5f73b50cd6d94b688d2dc08e9a822fabc9352aaf0
-
Filesize
218B
MD5a2597aecff2914ba5f294aab65b8a9a8
SHA1b7b756348c806371483e008be85989bbe00d93bd
SHA2564135fe8029dbfb1e2594501ff10f81e7f260fb0ea286c4599763301a2f1ce683
SHA512ec16dffe4ecea273c01786d8edc4ffe1b821721d3a7881a518c0d5e15940b92b9f7de472aa829699f2adc9753832667f58a7140340c5f7b23a1d83c13786e1e2
-
Filesize
1.8MB
MD536e536a514745cab05f83cbe5f4a412e
SHA1befb59b14249e5f240bb80281f1a14663438b126
SHA256539b89630bf205ece9a5e8e8a1326534c5a39dc511839c68ecb99ef9f5a97715
SHA51263245e2771ce4118f3a51a5d0d87cec398838389e56ad7783299cd21b98f5f5b33dcf99ca015f68b30d9349e94c8cfc1e7ad40ec67f8db2766d38c94202ab88f