Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2025, 18:42
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win10v2004-20250314-en
General
-
Target
random.exe
-
Size
6.2MB
-
MD5
12dba2a7b6bcedc49cdadacb325fe8bd
-
SHA1
f6a4579eb43c1813ae288d8b5d2d6131a6595102
-
SHA256
17a507cbf6c00ccd79c7e3439db56a0efc450df48bd1acbf2cd3036bc2e7b9ca
-
SHA512
f5ab92ef5c550f64efdbcc703fc4f44240eeae0cfc64fabd3c7bef066a1d13dd631e481ce25496f4e2dea5dbc2af461efc5940821248a78a8875242cb03fced4
-
SSDEEP
196608:9I9Mh4BpipAGOotweNewWyUPkrKJ6Jdojw+t+1f0:SSgipAXot1VUMaz
Malware Config
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://clarmodq.top/qoxo
https://soursopsf.run/gsoiao
https://changeaie.top/geps
https://oeasyupgw.live/eosz
https://liftally.top/xasj
https://upmodini.digital/gokk
https://salaccgfa.top/gsooz
https://szestmodp.top/zeda
https://xcelmodo.run/nahd
Signatures
-
Amadey family
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1q82N1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2G3445.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1q82N1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1q82N1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2G3445.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2G3445.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation 1q82N1.exe -
Executes dropped EXE 6 IoCs
pid Process 4856 Z0b97.exe 6128 1q82N1.exe 5400 rapes.exe 4740 2G3445.exe 5552 rapes.exe 2728 rapes.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Wine 1q82N1.exe Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Wine 2G3445.exe Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Wine rapes.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Z0b97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" random.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 6128 1q82N1.exe 5400 rapes.exe 4740 2G3445.exe 5552 rapes.exe 2728 rapes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job 1q82N1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Z0b97.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1q82N1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2G3445.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 6128 1q82N1.exe 6128 1q82N1.exe 5400 rapes.exe 5400 rapes.exe 4740 2G3445.exe 4740 2G3445.exe 4740 2G3445.exe 4740 2G3445.exe 4740 2G3445.exe 4740 2G3445.exe 4740 2G3445.exe 4740 2G3445.exe 4740 2G3445.exe 4740 2G3445.exe 5552 rapes.exe 5552 rapes.exe 2728 rapes.exe 2728 rapes.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeImpersonatePrivilege 4740 2G3445.exe Token: SeImpersonatePrivilege 4740 2G3445.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 5452 wrote to memory of 4856 5452 random.exe 88 PID 5452 wrote to memory of 4856 5452 random.exe 88 PID 5452 wrote to memory of 4856 5452 random.exe 88 PID 4856 wrote to memory of 6128 4856 Z0b97.exe 90 PID 4856 wrote to memory of 6128 4856 Z0b97.exe 90 PID 4856 wrote to memory of 6128 4856 Z0b97.exe 90 PID 536 wrote to memory of 3380 536 cmd.exe 92 PID 536 wrote to memory of 3380 536 cmd.exe 92 PID 764 wrote to memory of 668 764 cmd.exe 93 PID 764 wrote to memory of 668 764 cmd.exe 93 PID 6128 wrote to memory of 5400 6128 1q82N1.exe 97 PID 6128 wrote to memory of 5400 6128 1q82N1.exe 97 PID 6128 wrote to memory of 5400 6128 1q82N1.exe 97 PID 4856 wrote to memory of 4740 4856 Z0b97.exe 98 PID 4856 wrote to memory of 4740 4856 Z0b97.exe 98 PID 4856 wrote to memory of 4740 4856 Z0b97.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5452 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Z0b97.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Z0b97.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1q82N1.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1q82N1.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:6128 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5400
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2G3445.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2G3445.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4740
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"1⤵
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"2⤵PID:3380
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\"1⤵
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\"2⤵PID:668
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5552
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2728
Network
MITRE ATT&CK Enterprise v16
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD5663c7e12dfe1471ad97dadbeda95016d
SHA11a306629437c7ca637f9847a0efafd41bbcf0411
SHA256ad518278ad1ddd5df4de0a2704cdc4f92891f22d25568730a09c59b9bb1e7563
SHA512bcada03c475237377c44ae0bfe841264b44a008716597f7d2c166ec6a6067bfa7e53ec00f403badb5b19555fe34a8e5c0db2104b5fa43a42203ca5225fb433fc
-
Filesize
3.8MB
MD5ae7c8fa13fb7a2fc4d596cb37b61e69e
SHA12c60f393ec9d5989755926bc552574585a8ec9ae
SHA2565f9a5f3e3529fbe50e855a9f0107905c70d27b8215c679c336b6c3e9bf6f4947
SHA5122d6a9a6c5c3b00cae1cfdd9aec8b97a7961ed26919f3d408b86f2f419e228a47e51bcbc399a8573cafc744258beafa08d79eac886484ebaaa13f26e3cc76a490
-
Filesize
2.1MB
MD59ef2f2ae404b81493bdb38e881eeb89f
SHA18e505931fe431913cda47524c54d29e976acb333
SHA256dd36c7d50cb05761391a7f65932193ec847d34f8ba1bb2f2a43ecf4985d911f4
SHA51265e7c1cd5b16bd2369f4c20d5855b72c3c47a058f7acf2670099109ee5c965efff5bcc2507bbbea919e6db104b600a7aca297665675c4c1bebbc5315426ed9e0
-
Filesize
1.8MB
MD59a48327c055e61617de9363c04858a75
SHA1cbe4ea43097862839bcc568e98a89f6ea00cd37c
SHA2569f691d34588b13da7a9fce8b4fde65da8a3cf75958a7258ccd69dad4285cc18d
SHA51254c35d527da4656dc45200974373969b97ae95eb4b144d287a2135cbc3c4310d6d65edac7f38a5438763772b73c8757bc6866c623f10ac11b6a260f2eef965a5