Analysis
-
max time kernel
16s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2025, 20:31
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win10v2004-20250314-en
General
-
Target
random.exe
-
Size
1.8MB
-
MD5
53f24086dc5ae9e8e778e4b6fe6dacac
-
SHA1
86743fc7837b42371aad3aa62660b5351253c53b
-
SHA256
53d4b7a917d975149ee9a757ccbb944e5a7f40814b07108358495bef54e1371d
-
SHA512
42f3b01c4f039995837e2157caf6bada0bb32ecea9ecdc48a92f30b181e741ccd91f1a1de5538f34e3fceb3f13e72b40a6984d513fd421bb1e6dd7561d6ba0cf
-
SSDEEP
24576:CtGHLU9QqvWZRjmY3N/KQWteLFYxEOw/kMcv8QfMIOXMPKaDafM/Z1aVrQRsAtFQ:CtGg9QbRqK52ehsMc5BLVAvQF
Malware Config
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Signatures
-
Amadey family
-
Gcleaner family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 31 4932 rapes.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion kZZeUXM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion kZZeUXM.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation random.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation rapes.exe -
Executes dropped EXE 3 IoCs
pid Process 4932 rapes.exe 5468 oalJJxv.exe 3096 kZZeUXM.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine rapes.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Service 7953 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\10343420101\\kZZeUXM.exe\"" reg.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1560 random.exe 4932 rapes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job random.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oalJJxv.exe -
Modifies registry key 1 TTPs 8 IoCs
pid Process 1888 reg.exe 1272 reg.exe 440 reg.exe 4572 reg.exe 5240 reg.exe 6068 reg.exe 5524 reg.exe 4584 reg.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1560 random.exe 1560 random.exe 4932 rapes.exe 4932 rapes.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1560 wrote to memory of 4932 1560 random.exe 89 PID 1560 wrote to memory of 4932 1560 random.exe 89 PID 1560 wrote to memory of 4932 1560 random.exe 89 PID 4932 wrote to memory of 5468 4932 rapes.exe 101 PID 4932 wrote to memory of 5468 4932 rapes.exe 101 PID 4932 wrote to memory of 5468 4932 rapes.exe 101 PID 4932 wrote to memory of 3096 4932 rapes.exe 108 PID 4932 wrote to memory of 3096 4932 rapes.exe 108 PID 3096 wrote to memory of 5240 3096 kZZeUXM.exe 109 PID 3096 wrote to memory of 5240 3096 kZZeUXM.exe 109 PID 3096 wrote to memory of 6068 3096 kZZeUXM.exe 111 PID 3096 wrote to memory of 6068 3096 kZZeUXM.exe 111 PID 3096 wrote to memory of 4584 3096 kZZeUXM.exe 113 PID 3096 wrote to memory of 4584 3096 kZZeUXM.exe 113 PID 3096 wrote to memory of 5524 3096 kZZeUXM.exe 115 PID 3096 wrote to memory of 5524 3096 kZZeUXM.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\10343250101\oalJJxv.exe"C:\Users\Admin\AppData\Local\Temp\10343250101\oalJJxv.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5468
-
-
C:\Users\Admin\AppData\Local\Temp\10343420101\kZZeUXM.exe"C:\Users\Admin\AppData\Local\Temp\10343420101\kZZeUXM.exe"3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\system32\reg.exereg query HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /s4⤵
- Modifies registry key
PID:5240
-
-
C:\Windows\system32\reg.exereg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Microsoft Windows Service 7953" /t REG_SZ /d \"C:\Users\Admin\AppData\Local\Temp\10343420101\kZZeUXM.exe\" /f4⤵
- Adds Run key to start application
- Modifies registry key
PID:6068
-
-
C:\Windows\system32\reg.exereg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run /v "Microsoft Windows Service 7953" /t REG_BINARY /d 020000000000000000000000 /f4⤵
- Modifies registry key
PID:4584
-
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\RunNotification /v "StartupTNotiMicrosoft Windows Service 7953" /t REG_DWORD /d 1 /f4⤵
- Modifies registry key
PID:5524
-
-
-
C:\Users\Admin\AppData\Local\Temp\10343440101\5d68e248e9.exe"C:\Users\Admin\AppData\Local\Temp\10343440101\5d68e248e9.exe"3⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10343440101\5d68e248e9.exe"4⤵PID:2280
-
-
-
C:\Users\Admin\AppData\Local\Temp\10343450101\d2c5a227a8.exe"C:\Users\Admin\AppData\Local\Temp\10343450101\d2c5a227a8.exe"3⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10343450101\d2c5a227a8.exe"4⤵PID:1708
-
-
-
C:\Users\Admin\AppData\Local\Temp\10343460101\kZZeUXM.exe"C:\Users\Admin\AppData\Local\Temp\10343460101\kZZeUXM.exe"3⤵PID:3724
-
C:\Windows\system32\reg.exereg query HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /s4⤵
- Modifies registry key
PID:1888
-
-
C:\Windows\system32\reg.exereg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Microsoft Windows Service 7708" /t REG_SZ /d \"C:\Users\Admin\AppData\Local\Temp\10343460101\kZZeUXM.exe\" /f4⤵
- Modifies registry key
PID:1272
-
-
C:\Windows\system32\reg.exereg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run /v "Microsoft Windows Service 7708" /t REG_BINARY /d 020000000000000000000000 /f4⤵
- Modifies registry key
PID:4572
-
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\RunNotification /v "StartupTNotiMicrosoft Windows Service 7708" /t REG_DWORD /d 1 /f4⤵
- Modifies registry key
PID:440
-
-
-
C:\Users\Admin\AppData\Local\Temp\10343470101\kDveTWY.exe"C:\Users\Admin\AppData\Local\Temp\10343470101\kDveTWY.exe"3⤵PID:2484
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:3744
-
-
-
C:\Users\Admin\AppData\Local\Temp\10343480101\0e3f788b09.exe"C:\Users\Admin\AppData\Local\Temp\10343480101\0e3f788b09.exe"3⤵PID:532
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:4252
-
-
-
C:\Users\Admin\AppData\Local\Temp\10343490101\dBSGwVB.exe"C:\Users\Admin\AppData\Local\Temp\10343490101\dBSGwVB.exe"3⤵PID:1220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\Netstat\netsup.bat" "4⤵PID:4508
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\bild.exe"5⤵PID:5960
-
-
C:\Users\Public\Netstat\bild.exeC:\Users\Public\Netstat\bild.exe5⤵PID:3896
-
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵PID:3256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
9.8MB
MD59a2147c4532f7fa643ab5792e3fe3d5c
SHA180244247bc0bc46884054db9c8ddbc6dee99b529
SHA2563e8b13abf977519f8aa7ced613234a39ee1a39e07a2915c60c09713677ecdeba
SHA512c4513062787175cc942cdb0324c1465957bf4d2c48d68a4896daeb427b936ae8d9c78b88f67c456566e8fc32787b1d8b92b3521f7e47e2e90b3f9e10d8498aba
-
Filesize
6.4MB
MD5b5871f405d4fc3d7d7f149d47c3c55c6
SHA138fdc1e1fcf581764cf23f34e6c6fee7be3228b2
SHA25687a0413f69cc75e47c0720c3af3ab522d2965df2e945bc6f9da03912b2dfd46b
SHA512a6daba1d5b493ed661775a7a9c9cf0266150ee3365cc36ecd1bfca85fb621f6b5744f35dbfbc6f47d870355033334556363f9a8e20772d7f71c12cd07d83c789
-
Filesize
4.5MB
MD5dc8a79bc78a1a0600ec101211275eccc
SHA18c97e296cc941be66560109ae7847b6ffd68fd36
SHA256218a7666ce28ca053e21388489d95339ed59f9cf4662be9f3514668439e2032d
SHA51246bb5a185ea7507376483012ab69960fae952215393ae2411b58e6a2e7a91da52dd4a1ee70e53ea052fef2e56a5d2e68ef89a6598db209e6939325ef3cb58ee7
-
Filesize
4.3MB
MD5dfc21cdaa3f4cf680627a41f5a18e772
SHA1ec93a703400b1bf985e7c76d598e1fb69d398460
SHA2567c4976fcf064d1c38148014e5730d3621936180c5ab4ca2e8301f96afd3201fb
SHA5120cd58ba0cb75269937c150700a9e82214d1cf11f77632213848c2dcc62819fad29068965f5b0b4b4ca8c5f39d3ec0b3948bedfddc87448055f60f02727e0bfcb
-
Filesize
1.4MB
MD5fc6cd346462b85853040586c7af71316
SHA1fd2e85e7252fb1f4bfba00c823abed3ec3e501e1
SHA2565a967613fad14a8eb61757b641eb3f84236360e06834800e90e2e28da09da2de
SHA512382d8cb536172bf3d99d28e92d1056d4bcfe96b08109bdffe9e2745b434cd2d301f320ce4ff836bf6bf90c08ba8859fbd36741b3a572d52bfb1f782e86f8d746
-
Filesize
1.1MB
MD596fa728730da64d7d6049c305c40232c
SHA13fd03c4f32e3f9dbcc617507a7a842afb668c4de
SHA25628d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93
SHA512c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe
-
Filesize
13.1MB
MD579a51197969dadee0226635f5977f6ab
SHA11785a081523553690d110c4153e3b3c990c08d45
SHA256868c78f267862af83cf94c9d21615d9c01afe3dbd0da02dc96bbc3a956ccc48d
SHA512202ea6d421bb7163ba741267543dff4f97012f2489f694f06555b1bbffec3a59fe71d5675755f5d746727eaf93b6d8204eab4e11fd692cf82570b1edf8a80a55
-
Filesize
1.8MB
MD553f24086dc5ae9e8e778e4b6fe6dacac
SHA186743fc7837b42371aad3aa62660b5351253c53b
SHA25653d4b7a917d975149ee9a757ccbb944e5a7f40814b07108358495bef54e1371d
SHA51242f3b01c4f039995837e2157caf6bada0bb32ecea9ecdc48a92f30b181e741ccd91f1a1de5538f34e3fceb3f13e72b40a6984d513fd421bb1e6dd7561d6ba0cf
-
Filesize
2.9MB
MD5b826dd92d78ea2526e465a34324ebeea
SHA1bf8a0093acfd2eb93c102e1a5745fb080575372e
SHA2567824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b
SHA5121ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17
-
Filesize
18KB
MD5a0b9388c5f18e27266a31f8c5765b263
SHA1906f7e94f841d464d4da144f7c858fa2160e36db
SHA256313117e723dda6ea3911faacd23f4405003fb651c73de8deff10b9eb5b4a058a
SHA5126051a0b22af135b4433474dc7c6f53fb1c06844d0a30ed596a3c6c80644df511b023e140c4878867fa2578c79695fac2eb303aea87c0ecfc15a4ad264bd0b3cd
-
Filesize
3.0MB
MD5a4b303dc02b6bd4a20ce1887b4ed1628
SHA1138030a4f83d38b19a68189c2df8141a170a30be
SHA256c9ef292f6f5301eda50c64fc2bb10961da9e3d6b4105f68c23b7f431b5449e56
SHA512a94befc6c078abe3f0f0a2f000ab4de28945da4bc37ae40734d23cbeb0693806b07a031a31f7de2d26ec58c4010bf6d67e668a102bf31523474521f91a78ee61
-
Filesize
3.4MB
MD5c08a82209e0883196262d2505461c86a
SHA199b8e9ded07cfa6c4816017d9b67ecc137196b09
SHA25620f43f6fc6955055b93c0030a14ca0e59dbdb897207b00538c5ddd531f85cac0
SHA51224e47053e73f95da048c1c2d6d23cf583ae8217a606895c2f9b5b78dc3e9530a8c0fcf4f35e06839efc5dd774526b74f2794262ce8fe5ff5ff289a1dd814243d
-
Filesize
103KB
MD58d9709ff7d9c83bd376e01912c734f0a
SHA1e3c92713ce1d7eaa5e2b1fabeb06cdc0bb499294
SHA25649a568f8ac11173e3a0d76cff6bc1d4b9bdf2c35c6d8570177422f142dcfdbe3
SHA512042ad89ed2e15671f5df67766d11e1fa7ada8241d4513e7c8f0d77b983505d63ebfb39fefa590a2712b77d7024c04445390a8bf4999648f83dbab6b0f04eb2ee
-
Filesize
755KB
MD50e37fbfa79d349d672456923ec5fbbe3
SHA14e880fc7625ccf8d9ca799d5b94ce2b1e7597335
SHA2568793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18
SHA5122bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630
-
Filesize
161B
MD5bb8869e7e80234a30633bd0301b57deb
SHA113790ad2bc012431324093b16c19b1e532c94e63
SHA256d6f183097bf12a7f68632efecc6dc7ddac16002839229502b32cd40826dd472c
SHA5127d043054fcde4c73e9e5988330a94a737360adf1b0d806efc4660d1e336e27a66149494b611969a29b873d76bc4b1278b47d1efc27a9c7bd50a1f8cdf346937a
-
Filesize
32KB
MD5dcde2248d19c778a41aa165866dd52d0
SHA17ec84be84fe23f0b0093b647538737e1f19ebb03
SHA2569074fd40ea6a0caa892e6361a6a4e834c2e51e6e98d1ffcda7a9a537594a6917
SHA512c5d170d420f1aeb9bcd606a282af6e8da04ae45c83d07faaacb73ff2e27f4188b09446ce508620124f6d9b447a40a23620cfb39b79f02b04bb9e513866352166