Analysis
-
max time kernel
89s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
24-02-2021 21:25
Static task
static1
Behavioral task
behavioral1
Sample
Adj_Proceso77727212556164025699106096354430573416984700123904824645273838987440239601743035.exe
Resource
win7v20201028
0 signatures
0 seconds
General
-
Target
Adj_Proceso77727212556164025699106096354430573416984700123904824645273838987440239601743035.exe
-
Size
325KB
-
MD5
f8bdaa4de9861b0d490490deaa372625
-
SHA1
f72e8b2d815af12760656339adb7f9ca6f633e2a
-
SHA256
2f1103e99fb464143a58c654763fe9c8ea25dfa84d04cfa9a1557fcb891330f5
-
SHA512
e5c61deed4df89f3fcfa3671ba3ddaa9fe8ef8f32815160e51f233dd400dbc8fd19716f4e04edd482ffe0a47577bb6b627464d7c1d8156547d988b07e4013875
Malware Config
Extracted
Family
amadey
Version
2.07
C2
91.241.19.159/m7vvsw2dsQ/index.php
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2840 bween.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 416 wrote to memory of 2840 416 Adj_Proceso77727212556164025699106096354430573416984700123904824645273838987440239601743035.exe 75 PID 416 wrote to memory of 2840 416 Adj_Proceso77727212556164025699106096354430573416984700123904824645273838987440239601743035.exe 75 PID 416 wrote to memory of 2840 416 Adj_Proceso77727212556164025699106096354430573416984700123904824645273838987440239601743035.exe 75 PID 2840 wrote to memory of 3756 2840 bween.exe 78 PID 2840 wrote to memory of 3756 2840 bween.exe 78 PID 2840 wrote to memory of 3756 2840 bween.exe 78 PID 3756 wrote to memory of 2108 3756 cmd.exe 80 PID 3756 wrote to memory of 2108 3756 cmd.exe 80 PID 3756 wrote to memory of 2108 3756 cmd.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\Adj_Proceso77727212556164025699106096354430573416984700123904824645273838987440239601743035.exe"C:\Users\Admin\AppData\Local\Temp\Adj_Proceso77727212556164025699106096354430573416984700123904824645273838987440239601743035.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:416 -
C:\ProgramData\8ad2f1a034\bween.exe"C:\ProgramData\8ad2f1a034\bween.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\ProgramData\8ad2f1a034\3⤵
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\ProgramData\8ad2f1a034\4⤵PID:2108
-
-
-