Analysis
-
max time kernel
143s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2025, 18:53
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win10v2004-20250314-en
General
-
Target
random.exe
-
Size
6.2MB
-
MD5
bab6c308a5bc847b003f6b0a97029c4a
-
SHA1
ce02c7fc53cc4f33ece5fc50253e953d700fec19
-
SHA256
51ab4e0f6c15eff6a797de8425f07cdb597016e0d825939e5ef4c0f5c6c611d3
-
SHA512
27c19d1b2a6151538813c4c3b4e9f27fad925f776b8b9928ed7e18c7d23e9102883b8e4bb0b89ff226792cfce3c56c75ea2d6568e5b8ef7ab69c7b614ab28105
-
SSDEEP
196608:hxsPOxj9TOoc1KDpf2m8B8hn1fsQjAIt5iH1j/AK:hWajNOhmlHDsQkIDiHF/A
Malware Config
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://clarmodq.top/qoxo
https://soursopsf.run/gsoiao
https://changeaie.top/geps
https://easyupgw.live/eosz
https://liftally.top/xasj
https://upmodini.digital/gokk
https://salaccgfa.top/gsooz
https://zestmodp.top/zeda
https://xcelmodo.run/nahd
Signatures
-
Amadey family
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1o78s2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2N8566.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1o78s2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2N8566.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2N8566.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1o78s2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation 1o78s2.exe -
Executes dropped EXE 6 IoCs
pid Process 5172 i4i66.exe 6100 1o78s2.exe 5608 rapes.exe 380 2N8566.exe 1924 rapes.exe 4488 rapes.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Wine 1o78s2.exe Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Wine 2N8566.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" random.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" i4i66.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 6100 1o78s2.exe 5608 rapes.exe 380 2N8566.exe 1924 rapes.exe 4488 rapes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job 1o78s2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i4i66.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1o78s2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2N8566.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 6100 1o78s2.exe 6100 1o78s2.exe 5608 rapes.exe 5608 rapes.exe 380 2N8566.exe 380 2N8566.exe 380 2N8566.exe 380 2N8566.exe 380 2N8566.exe 380 2N8566.exe 380 2N8566.exe 380 2N8566.exe 380 2N8566.exe 380 2N8566.exe 1924 rapes.exe 1924 rapes.exe 4488 rapes.exe 4488 rapes.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeImpersonatePrivilege 380 2N8566.exe Token: SeImpersonatePrivilege 380 2N8566.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 6100 1o78s2.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2964 wrote to memory of 5172 2964 random.exe 88 PID 2964 wrote to memory of 5172 2964 random.exe 88 PID 2964 wrote to memory of 5172 2964 random.exe 88 PID 5172 wrote to memory of 6100 5172 i4i66.exe 89 PID 5172 wrote to memory of 6100 5172 i4i66.exe 89 PID 5172 wrote to memory of 6100 5172 i4i66.exe 89 PID 3844 wrote to memory of 2904 3844 cmd.exe 93 PID 3844 wrote to memory of 2904 3844 cmd.exe 93 PID 3676 wrote to memory of 2096 3676 cmd.exe 94 PID 3676 wrote to memory of 2096 3676 cmd.exe 94 PID 6100 wrote to memory of 5608 6100 1o78s2.exe 97 PID 6100 wrote to memory of 5608 6100 1o78s2.exe 97 PID 6100 wrote to memory of 5608 6100 1o78s2.exe 97 PID 5172 wrote to memory of 380 5172 i4i66.exe 98 PID 5172 wrote to memory of 380 5172 i4i66.exe 98 PID 5172 wrote to memory of 380 5172 i4i66.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4i66.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4i66.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5172 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1o78s2.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1o78s2.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:6100 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5608
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2N8566.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2N8566.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:380
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"1⤵
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"2⤵PID:2904
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\"1⤵
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\"2⤵PID:2096
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1924
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4488
Network
MITRE ATT&CK Enterprise v16
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD508dfa744b2d4d3b8685f49a37f5d8c87
SHA135c9787aa93422a40b75aaa1ccbaf076e3034cfc
SHA256fa7063effcb59df0012e18555f133df96e1679a68d5b4b17f4da2e539d7ef865
SHA512c1a3c5d0cfd75fb369ba2887ceac6c0f06e507c5cc50da81ac1173ce88c74c84ae8f465a97e535b9c12b625e0dfb4f52185aa750cf9818025cf642888af9221d
-
Filesize
3.8MB
MD55ad35e8ffa5c156c9d77c121d3bb18be
SHA1b5def8cd444ff3524fb458037bdecc782a128afc
SHA2564156817ea20a902aa3ff4b41f784c3764e2a572fdbccc1030de98901aa43629d
SHA51211b081c1230ab6cbc4701b6926ebb4c8165c1ffd3290fc81f3ca14caf87941270770fb1e361f1957e296a4168e2007721d36821b8b23839fb2f591b4e7e60d0f
-
Filesize
2.1MB
MD5f465833f4f6c1786e7b1fb87f0995c44
SHA14452630ffd1f9ec4e1420956126d2fd115c1ddfa
SHA256fcab315274fa4215f65d8b4410ee84fbd30af6e0a8987652d3ed6346cfde57e5
SHA51298609049400b625485b030d2d7dd18f73c1f2bdb80dfa6c4a0819d71fc6ca0bc6463c6d7e352a08a77d5d121d8840dc79e80d15a47bc776be201dec01de810cb
-
Filesize
1.8MB
MD5894b0a2a87577a155ab8de52cdced523
SHA1eda1e41eedbbd087af901ff6830510db946adcca
SHA256c188e6136e9563a1da832784e8715103ad2d4d2523fa606a21b60d784f2055ed
SHA51267da611e85c3ca98908e98d228659a3bd687b0fb7cc1c9591e35e9e08aaa6ec366e89070204446187199678edadd55279fe9f45eac7edeb61ec7994f967505d0