Analysis
-
max time kernel
147s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2025, 18:45
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win10v2004-20250314-en
General
-
Target
random.exe
-
Size
6.1MB
-
MD5
aeb501aaff744b2e4176c497529124b4
-
SHA1
dd408690d4636c90e1ba225e0879ce317c6705c0
-
SHA256
640a56ac231ec705c9f0c334f57ccbd0279310bdfe47d5b1b56363a5af163780
-
SHA512
d0f36d8168b85fd21287911bb4668f0c73b407361ec071476ed1d294e205157032d292f27047662fa499d96528a89586f5ecedbe78b09cdd7b74f0bd74c4a542
-
SSDEEP
196608:FxTSXgjUf2OTyLNWqNMxVIV1xJ8CgGbvg0d7h6V3ai:F1Qd2OeLNFmxVO1v7rbvg07S
Malware Config
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://clarmodq.top/qoxo
https://soursopsf.run/gsoiao
https://changeaie.top/geps
https://easyupgw.live/eosz
https://liftally.top/xasj
https://upmodini.digital/gokk
https://salaccgfa.top/gsooz
https://zestmodp.top/zeda
https://hxcelmodo.run/nahd
Signatures
-
Amadey family
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1S39z3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2Q7356.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2Q7356.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1S39z3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2Q7356.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1S39z3.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation 1S39z3.exe -
Executes dropped EXE 7 IoCs
pid Process 3828 d9g42.exe 6052 1S39z3.exe 4648 rapes.exe 4696 2Q7356.exe 3204 rapes.exe 2148 rapes.exe 1228 rapes.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine 1S39z3.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine 2Q7356.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" random.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" d9g42.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 6052 1S39z3.exe 4648 rapes.exe 4696 2Q7356.exe 3204 rapes.exe 2148 rapes.exe 1228 rapes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job 1S39z3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9g42.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1S39z3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2Q7356.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 6052 1S39z3.exe 6052 1S39z3.exe 4648 rapes.exe 4648 rapes.exe 4696 2Q7356.exe 4696 2Q7356.exe 4696 2Q7356.exe 4696 2Q7356.exe 4696 2Q7356.exe 4696 2Q7356.exe 4696 2Q7356.exe 4696 2Q7356.exe 4696 2Q7356.exe 4696 2Q7356.exe 3204 rapes.exe 3204 rapes.exe 2148 rapes.exe 2148 rapes.exe 1228 rapes.exe 1228 rapes.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeImpersonatePrivilege 4696 2Q7356.exe Token: SeImpersonatePrivilege 4696 2Q7356.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 5812 wrote to memory of 3828 5812 random.exe 89 PID 5812 wrote to memory of 3828 5812 random.exe 89 PID 5812 wrote to memory of 3828 5812 random.exe 89 PID 3828 wrote to memory of 6052 3828 d9g42.exe 91 PID 3828 wrote to memory of 6052 3828 d9g42.exe 91 PID 3828 wrote to memory of 6052 3828 d9g42.exe 91 PID 320 wrote to memory of 3584 320 cmd.exe 93 PID 320 wrote to memory of 3584 320 cmd.exe 93 PID 5128 wrote to memory of 2420 5128 cmd.exe 94 PID 5128 wrote to memory of 2420 5128 cmd.exe 94 PID 6052 wrote to memory of 4648 6052 1S39z3.exe 98 PID 6052 wrote to memory of 4648 6052 1S39z3.exe 98 PID 6052 wrote to memory of 4648 6052 1S39z3.exe 98 PID 3828 wrote to memory of 4696 3828 d9g42.exe 99 PID 3828 wrote to memory of 4696 3828 d9g42.exe 99 PID 3828 wrote to memory of 4696 3828 d9g42.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5812 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9g42.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9g42.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1S39z3.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1S39z3.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:6052 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4648
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2Q7356.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2Q7356.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4696
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"1⤵
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"2⤵PID:3584
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\"1⤵
- Suspicious use of WriteProcessMemory
PID:5128 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\"2⤵PID:2420
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3204
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2148
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1228
Network
MITRE ATT&CK Enterprise v16
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD599cff97fb3d1f5335692620efe46826e
SHA15e31f7c1dbc854525f8edb2026458d9bf97cf48d
SHA256dc3e6a9199b0c87289c8f983c487b8fec44f3d1a7b6f1098f652c90d0c22f7e2
SHA512bf88856c8735113982f1d6d4d1e365679c5281a86fb65c622f17fc4c55ad3203a7d91bb11618df857d37334601a788c5e5443fd80cb9ff44bfc885f6422fd6ac
-
Filesize
3.7MB
MD5c5235628da54511571c7e4981d54fb2a
SHA1375a2bb3524d81d850f56df60fff1630ae2b04b1
SHA25695051cf57ee447461223a4819192eab6102f87c6a21cf79107fcd937be80ef96
SHA5126ed024e49b2eeab2fe063c696feeccc4da403ea9122d15ec6db3f0d27ba7b00611ee8b51e4b55c0c3832cfa70e0841d2c57166b14c205cd3b4a3e417710bc221
-
Filesize
2.1MB
MD5991d6ae36958f2d14d04f55975a75203
SHA1b1dc11e7f64a19a6794f16def7e978c7deb70853
SHA256fe70369d4b479537bb85b333bdb2d56566d6dfb9320c566b25ac6faa904fc317
SHA51247ae0adc282f0cd2934a68898f836c6f5dd251c3efc76a44d442c9c4d2590b7c1a51c16f171831069b7f2894ba929736647a66615a760b338f2a40ebb5ef68e3
-
Filesize
1.8MB
MD564fa9ffc7dbe14f22855094cf85f5a8d
SHA1f07683c01147d441eb0a35e33abb70d4f57ebb08
SHA256d5ae228ca49436dd15f5380d1065429cf9cc3f0a9739899ee7f8e3d2c9cb3404
SHA512e3f003b1ad5cf7c6d6e33239c7c0589e3fadb7a31e3c3fd9dd9382a89700d4bfee00ad61a3e3dcab1fa18785e14e0665f017f701d65647ce56a14ec327d2c60c