Analysis
-
max time kernel
140s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/03/2025, 07:13
Static task
static1
Behavioral task
behavioral1
Sample
05c8f3700c6327871c199be6417c5c9c.exe
Resource
win7-20240903-en
General
-
Target
05c8f3700c6327871c199be6417c5c9c.exe
-
Size
1.9MB
-
MD5
05c8f3700c6327871c199be6417c5c9c
-
SHA1
8f4862310762601e271ac27535382d5c7ed740e7
-
SHA256
18cd20dd8567ce6137508f9dece0571f32741ddaa15d8884ad090a4dce7bab1a
-
SHA512
76ea3ebcbe8397496a39cb278251839afa966a04a0451891c8300b1a97136b981ba04f903c6f85d83e8724346dda84613a3b99a52c2da4feff72f6d0f35e9bbc
-
SSDEEP
49152:qsbYVKQjiw4DQIf0XkzgUAkDObQLNuWHxr7+:LRw4EXgObmHx
Malware Config
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Signatures
-
Amadey family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 05c8f3700c6327871c199be6417c5c9c.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 05c8f3700c6327871c199be6417c5c9c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 05c8f3700c6327871c199be6417c5c9c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe -
Executes dropped EXE 1 IoCs
pid Process 2776 rapes.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 05c8f3700c6327871c199be6417c5c9c.exe -
Loads dropped DLL 1 IoCs
pid Process 2324 05c8f3700c6327871c199be6417c5c9c.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2324 05c8f3700c6327871c199be6417c5c9c.exe 2776 rapes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job 05c8f3700c6327871c199be6417c5c9c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 05c8f3700c6327871c199be6417c5c9c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2324 05c8f3700c6327871c199be6417c5c9c.exe 2776 rapes.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2324 05c8f3700c6327871c199be6417c5c9c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2776 2324 05c8f3700c6327871c199be6417c5c9c.exe 31 PID 2324 wrote to memory of 2776 2324 05c8f3700c6327871c199be6417c5c9c.exe 31 PID 2324 wrote to memory of 2776 2324 05c8f3700c6327871c199be6417c5c9c.exe 31 PID 2324 wrote to memory of 2776 2324 05c8f3700c6327871c199be6417c5c9c.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\05c8f3700c6327871c199be6417c5c9c.exe"C:\Users\Admin\AppData\Local\Temp\05c8f3700c6327871c199be6417c5c9c.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD505c8f3700c6327871c199be6417c5c9c
SHA18f4862310762601e271ac27535382d5c7ed740e7
SHA25618cd20dd8567ce6137508f9dece0571f32741ddaa15d8884ad090a4dce7bab1a
SHA51276ea3ebcbe8397496a39cb278251839afa966a04a0451891c8300b1a97136b981ba04f903c6f85d83e8724346dda84613a3b99a52c2da4feff72f6d0f35e9bbc