Analysis

  • max time kernel
    147s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/04/2025, 18:45

General

  • Target

    random.exe

  • Size

    6.1MB

  • MD5

    aeb501aaff744b2e4176c497529124b4

  • SHA1

    dd408690d4636c90e1ba225e0879ce317c6705c0

  • SHA256

    640a56ac231ec705c9f0c334f57ccbd0279310bdfe47d5b1b56363a5af163780

  • SHA512

    d0f36d8168b85fd21287911bb4668f0c73b407361ec071476ed1d294e205157032d292f27047662fa499d96528a89586f5ecedbe78b09cdd7b74f0bd74c4a542

  • SSDEEP

    196608:FxTSXgjUf2OTyLNWqNMxVIV1xJ8CgGbvg0d7h6V3ai:F1Qd2OeLNFmxVO1v7rbvg07S

Malware Config

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://clarmodq.top/qoxo

https://soursopsf.run/gsoiao

https://changeaie.top/geps

https://easyupgw.live/eosz

https://liftally.top/xasj

https://upmodini.digital/gokk

https://salaccgfa.top/gsooz

https://zestmodp.top/zeda

https://hxcelmodo.run/nahd

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Identifies Wine through registry keys 2 TTPs 6 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\random.exe
    "C:\Users\Admin\AppData\Local\Temp\random.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5812
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9g42.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9g42.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3828
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1S39z3.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1S39z3.exe
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:6052
        • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
          "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4648
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2Q7356.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2Q7356.exe
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4696
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:320
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"
      2⤵
        PID:3584
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:5128
      • C:\Windows\system32\rundll32.exe
        rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\"
        2⤵
          PID:2420
      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
        C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
        1⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:3204
      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
        C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
        1⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:2148
      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
        C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
        1⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:1228

      Network

      MITRE ATT&CK Enterprise v16

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3n53T.exe

        Filesize

        2.4MB

        MD5

        99cff97fb3d1f5335692620efe46826e

        SHA1

        5e31f7c1dbc854525f8edb2026458d9bf97cf48d

        SHA256

        dc3e6a9199b0c87289c8f983c487b8fec44f3d1a7b6f1098f652c90d0c22f7e2

        SHA512

        bf88856c8735113982f1d6d4d1e365679c5281a86fb65c622f17fc4c55ad3203a7d91bb11618df857d37334601a788c5e5443fd80cb9ff44bfc885f6422fd6ac

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9g42.exe

        Filesize

        3.7MB

        MD5

        c5235628da54511571c7e4981d54fb2a

        SHA1

        375a2bb3524d81d850f56df60fff1630ae2b04b1

        SHA256

        95051cf57ee447461223a4819192eab6102f87c6a21cf79107fcd937be80ef96

        SHA512

        6ed024e49b2eeab2fe063c696feeccc4da403ea9122d15ec6db3f0d27ba7b00611ee8b51e4b55c0c3832cfa70e0841d2c57166b14c205cd3b4a3e417710bc221

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1S39z3.exe

        Filesize

        2.1MB

        MD5

        991d6ae36958f2d14d04f55975a75203

        SHA1

        b1dc11e7f64a19a6794f16def7e978c7deb70853

        SHA256

        fe70369d4b479537bb85b333bdb2d56566d6dfb9320c566b25ac6faa904fc317

        SHA512

        47ae0adc282f0cd2934a68898f836c6f5dd251c3efc76a44d442c9c4d2590b7c1a51c16f171831069b7f2894ba929736647a66615a760b338f2a40ebb5ef68e3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2Q7356.exe

        Filesize

        1.8MB

        MD5

        64fa9ffc7dbe14f22855094cf85f5a8d

        SHA1

        f07683c01147d441eb0a35e33abb70d4f57ebb08

        SHA256

        d5ae228ca49436dd15f5380d1065429cf9cc3f0a9739899ee7f8e3d2c9cb3404

        SHA512

        e3f003b1ad5cf7c6d6e33239c7c0589e3fadb7a31e3c3fd9dd9382a89700d4bfee00ad61a3e3dcab1fa18785e14e0665f017f701d65647ce56a14ec327d2c60c

      • memory/1228-65-0x0000000000F60000-0x000000000142A000-memory.dmp

        Filesize

        4.8MB

      • memory/2148-57-0x0000000000F60000-0x000000000142A000-memory.dmp

        Filesize

        4.8MB

      • memory/3204-41-0x0000000000F60000-0x000000000142A000-memory.dmp

        Filesize

        4.8MB

      • memory/3204-43-0x0000000000F60000-0x000000000142A000-memory.dmp

        Filesize

        4.8MB

      • memory/4648-60-0x0000000000F60000-0x000000000142A000-memory.dmp

        Filesize

        4.8MB

      • memory/4648-44-0x0000000000F60000-0x000000000142A000-memory.dmp

        Filesize

        4.8MB

      • memory/4648-61-0x0000000000F60000-0x000000000142A000-memory.dmp

        Filesize

        4.8MB

      • memory/4648-38-0x0000000000F60000-0x000000000142A000-memory.dmp

        Filesize

        4.8MB

      • memory/4648-55-0x0000000000F60000-0x000000000142A000-memory.dmp

        Filesize

        4.8MB

      • memory/4648-34-0x0000000000F60000-0x000000000142A000-memory.dmp

        Filesize

        4.8MB

      • memory/4648-62-0x0000000000F60000-0x000000000142A000-memory.dmp

        Filesize

        4.8MB

      • memory/4648-35-0x0000000000F60000-0x000000000142A000-memory.dmp

        Filesize

        4.8MB

      • memory/4648-29-0x0000000000F60000-0x000000000142A000-memory.dmp

        Filesize

        4.8MB

      • memory/4648-46-0x0000000000F60000-0x000000000142A000-memory.dmp

        Filesize

        4.8MB

      • memory/4648-59-0x0000000000F60000-0x000000000142A000-memory.dmp

        Filesize

        4.8MB

      • memory/4648-58-0x0000000000F60000-0x000000000142A000-memory.dmp

        Filesize

        4.8MB

      • memory/4648-48-0x0000000000F60000-0x000000000142A000-memory.dmp

        Filesize

        4.8MB

      • memory/4648-50-0x0000000000F60000-0x000000000142A000-memory.dmp

        Filesize

        4.8MB

      • memory/4648-63-0x0000000000F60000-0x000000000142A000-memory.dmp

        Filesize

        4.8MB

      • memory/4648-52-0x0000000000F60000-0x000000000142A000-memory.dmp

        Filesize

        4.8MB

      • memory/4696-45-0x0000000000E90000-0x000000000131D000-memory.dmp

        Filesize

        4.6MB

      • memory/4696-54-0x0000000000E90000-0x000000000131D000-memory.dmp

        Filesize

        4.6MB

      • memory/4696-53-0x0000000000E90000-0x000000000131D000-memory.dmp

        Filesize

        4.6MB

      • memory/4696-51-0x0000000000E90000-0x000000000131D000-memory.dmp

        Filesize

        4.6MB

      • memory/4696-49-0x0000000000E90000-0x000000000131D000-memory.dmp

        Filesize

        4.6MB

      • memory/4696-47-0x0000000000E90000-0x000000000131D000-memory.dmp

        Filesize

        4.6MB

      • memory/4696-39-0x0000000000E90000-0x000000000131D000-memory.dmp

        Filesize

        4.6MB

      • memory/4696-37-0x0000000000E90000-0x000000000131D000-memory.dmp

        Filesize

        4.6MB

      • memory/4696-32-0x0000000000E90000-0x000000000131D000-memory.dmp

        Filesize

        4.6MB

      • memory/6052-28-0x00000000000E0000-0x00000000005AA000-memory.dmp

        Filesize

        4.8MB

      • memory/6052-14-0x00000000000E0000-0x00000000005AA000-memory.dmp

        Filesize

        4.8MB