Analysis
-
max time kernel
141s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2025, 18:50
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win10v2004-20250410-en
General
-
Target
random.exe
-
Size
6.2MB
-
MD5
f751716f05d99853f2990902a7a0fba2
-
SHA1
08c84f7a3f066fea39e6328c469364233640aa08
-
SHA256
2a571c59ffbf801083d9ba971d4b52cee9661f19086283cfb1d59235d1e0f08c
-
SHA512
649505c753582f06ced51949e6cd2c89d451aeac3354b3675e6a36388358ce243b266146f01de6f2d47edc0a55fddb9680ab2717b2b628bb51fb642a884ff160
-
SSDEEP
196608:td82bRN0BOsEWbVdjpP+cQ6Q9WvbqrZ+:fN04WbVld+vUqZ
Malware Config
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://wclarmodq.top/qoxo
https://soursopsf.run/gsoiao
https://changeaie.top/geps
https://easyupgw.live/eosz
https://liftally.top/xasj
https://upmodini.digital/gokk
https://uu5salaccgfa.top/gsooz
https://axzestmodp.top/zeda
https://gyxcelmodo.run/nahd
Signatures
-
Amadey family
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2B0712.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1J12M0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1J12M0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1J12M0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2B0712.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2B0712.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3630502724-2561614198-3854231964-1000\Control Panel\International\Geo\Nation 1J12M0.exe -
Executes dropped EXE 6 IoCs
pid Process 3632 I1O69.exe 2760 1J12M0.exe 6116 rapes.exe 4052 2B0712.exe 5288 rapes.exe 5312 rapes.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3630502724-2561614198-3854231964-1000\Software\Wine 1J12M0.exe Key opened \REGISTRY\USER\S-1-5-21-3630502724-2561614198-3854231964-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3630502724-2561614198-3854231964-1000\Software\Wine 2B0712.exe Key opened \REGISTRY\USER\S-1-5-21-3630502724-2561614198-3854231964-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3630502724-2561614198-3854231964-1000\Software\Wine rapes.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" random.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" I1O69.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2760 1J12M0.exe 6116 rapes.exe 4052 2B0712.exe 5288 rapes.exe 5312 rapes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job 1J12M0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language I1O69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1J12M0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B0712.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2760 1J12M0.exe 2760 1J12M0.exe 6116 rapes.exe 6116 rapes.exe 4052 2B0712.exe 4052 2B0712.exe 4052 2B0712.exe 4052 2B0712.exe 4052 2B0712.exe 4052 2B0712.exe 4052 2B0712.exe 4052 2B0712.exe 4052 2B0712.exe 4052 2B0712.exe 5288 rapes.exe 5288 rapes.exe 5312 rapes.exe 5312 rapes.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeImpersonatePrivilege 4052 2B0712.exe Token: SeImpersonatePrivilege 4052 2B0712.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 5220 wrote to memory of 3632 5220 random.exe 82 PID 5220 wrote to memory of 3632 5220 random.exe 82 PID 5220 wrote to memory of 3632 5220 random.exe 82 PID 1224 wrote to memory of 3828 1224 cmd.exe 83 PID 1224 wrote to memory of 3828 1224 cmd.exe 83 PID 3632 wrote to memory of 2760 3632 I1O69.exe 86 PID 3632 wrote to memory of 2760 3632 I1O69.exe 86 PID 3632 wrote to memory of 2760 3632 I1O69.exe 86 PID 3308 wrote to memory of 5416 3308 cmd.exe 87 PID 3308 wrote to memory of 5416 3308 cmd.exe 87 PID 2760 wrote to memory of 6116 2760 1J12M0.exe 88 PID 2760 wrote to memory of 6116 2760 1J12M0.exe 88 PID 2760 wrote to memory of 6116 2760 1J12M0.exe 88 PID 3632 wrote to memory of 4052 3632 I1O69.exe 89 PID 3632 wrote to memory of 4052 3632 I1O69.exe 89 PID 3632 wrote to memory of 4052 3632 I1O69.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5220 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\I1O69.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\I1O69.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1J12M0.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1J12M0.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6116
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2B0712.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2B0712.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4052
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"1⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"2⤵PID:3828
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\"1⤵
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\"2⤵PID:5416
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5288
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5312
Network
MITRE ATT&CK Enterprise v16
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD5a4bc02bc055210a40a61df94f176928b
SHA14522e3450b66bd0da8623e16cef73ffe495082cb
SHA2566ccbe9a84e3ca24016683f55814b882f8609423955acfea9587fb2a3ae48fdf1
SHA51284640d2db0b528e1f691c11e0cea770d6359ac8b42e7802a421dc90fe4d8ed9e99f4f61e065c79e3189beb4af1942c78a6970baa51d3b9445f18dbaaa67c03a3
-
Filesize
3.8MB
MD53a9f6b1a8eb6e7af06e6ed8573dfce8e
SHA1971a0843491c2ae53d4798dc4cd9c394a2c06f54
SHA256b075732695378864af9eee06e6dc29f8956d5f72e1508bcb1677c5fcbf63644d
SHA5123e15bbf23ce7c802085cd8876a489b7b03095eb127549b3e33b96b1b49fae57e19642b438fa5ae07ebe78f362b13779604aade89b91e513bbeceea49b10d8944
-
Filesize
2.1MB
MD59e3768b4d556fa13b3138fa0bfc87ada
SHA103ad8e08a5154ba7c16672a313dd15235db7ab34
SHA256f2c97a36c4c17e511516dff225d42230023bcdd5c90d725963690564b6ac4362
SHA5122e55d39b5a1c83cef7a49ef977a2a50d83b978286c57daf2d2e1d644ed36299da1bd0d3bdf1aa1d228b50660335ef2a2641c9c12b1afe6bc9642e04be87f50b0
-
Filesize
1.8MB
MD5794d7f6a5d6267b55676576fca930053
SHA1c1fec8b1dff294222e2e351e046d6e2952820da8
SHA25663918e46602e4b0d1f1433ced81587f58f12b0b79ab52a586c3fcb51157d51f8
SHA512c7d1c4ed1960fdd6b9b728c0b5350ac5c96f8b2a925034f814cf0029ee8955d7f4ffb15a717a6ec941c1332f6082e30e7f12d1f1425c7c47a208a36cda196ca4