Analysis
-
max time kernel
110s -
max time network
114s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
11-05-2021 07:14
Static task
static1
Behavioral task
behavioral1
Sample
2e0d574bf00170bb5a448510c2226408.exe
Resource
win7v20210410
General
-
Target
2e0d574bf00170bb5a448510c2226408.exe
-
Size
1021KB
-
MD5
2e0d574bf00170bb5a448510c2226408
-
SHA1
05c599f0ffc3a7474a51ecbda9de51f8dce0ba62
-
SHA256
7110725acbacccb5dc022fc2eb1b1b7c9e30f2a6b24ef77abfed8cea3d297966
-
SHA512
7363d04e59ba5c2c1c5765d56e6656294847c3115e4caf37340d9b65fe3025bd26e113fedfca4661c69d9fb90b1021dfb81ba204289330f2782203b46c00c505
Malware Config
Extracted
amadey
2.15
185.215.113.49/fT5G42s/index.php
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
jmgas.exepid process 2400 jmgas.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
2e0d574bf00170bb5a448510c2226408.exedescription pid process target process PID 2204 set thread context of 3960 2204 2e0d574bf00170bb5a448510c2226408.exe 2e0d574bf00170bb5a448510c2226408.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
2e0d574bf00170bb5a448510c2226408.exepowershell.exepid process 2204 2e0d574bf00170bb5a448510c2226408.exe 2204 2e0d574bf00170bb5a448510c2226408.exe 2204 2e0d574bf00170bb5a448510c2226408.exe 2204 2e0d574bf00170bb5a448510c2226408.exe 2204 2e0d574bf00170bb5a448510c2226408.exe 4076 powershell.exe 4076 powershell.exe 4076 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2e0d574bf00170bb5a448510c2226408.exepowershell.exedescription pid process Token: SeDebugPrivilege 2204 2e0d574bf00170bb5a448510c2226408.exe Token: SeDebugPrivilege 4076 powershell.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
2e0d574bf00170bb5a448510c2226408.exe2e0d574bf00170bb5a448510c2226408.exedescription pid process target process PID 2204 wrote to memory of 4076 2204 2e0d574bf00170bb5a448510c2226408.exe powershell.exe PID 2204 wrote to memory of 4076 2204 2e0d574bf00170bb5a448510c2226408.exe powershell.exe PID 2204 wrote to memory of 4076 2204 2e0d574bf00170bb5a448510c2226408.exe powershell.exe PID 2204 wrote to memory of 1504 2204 2e0d574bf00170bb5a448510c2226408.exe 2e0d574bf00170bb5a448510c2226408.exe PID 2204 wrote to memory of 1504 2204 2e0d574bf00170bb5a448510c2226408.exe 2e0d574bf00170bb5a448510c2226408.exe PID 2204 wrote to memory of 1504 2204 2e0d574bf00170bb5a448510c2226408.exe 2e0d574bf00170bb5a448510c2226408.exe PID 2204 wrote to memory of 3960 2204 2e0d574bf00170bb5a448510c2226408.exe 2e0d574bf00170bb5a448510c2226408.exe PID 2204 wrote to memory of 3960 2204 2e0d574bf00170bb5a448510c2226408.exe 2e0d574bf00170bb5a448510c2226408.exe PID 2204 wrote to memory of 3960 2204 2e0d574bf00170bb5a448510c2226408.exe 2e0d574bf00170bb5a448510c2226408.exe PID 2204 wrote to memory of 3960 2204 2e0d574bf00170bb5a448510c2226408.exe 2e0d574bf00170bb5a448510c2226408.exe PID 2204 wrote to memory of 3960 2204 2e0d574bf00170bb5a448510c2226408.exe 2e0d574bf00170bb5a448510c2226408.exe PID 2204 wrote to memory of 3960 2204 2e0d574bf00170bb5a448510c2226408.exe 2e0d574bf00170bb5a448510c2226408.exe PID 2204 wrote to memory of 3960 2204 2e0d574bf00170bb5a448510c2226408.exe 2e0d574bf00170bb5a448510c2226408.exe PID 2204 wrote to memory of 3960 2204 2e0d574bf00170bb5a448510c2226408.exe 2e0d574bf00170bb5a448510c2226408.exe PID 2204 wrote to memory of 3960 2204 2e0d574bf00170bb5a448510c2226408.exe 2e0d574bf00170bb5a448510c2226408.exe PID 2204 wrote to memory of 3960 2204 2e0d574bf00170bb5a448510c2226408.exe 2e0d574bf00170bb5a448510c2226408.exe PID 3960 wrote to memory of 2400 3960 2e0d574bf00170bb5a448510c2226408.exe jmgas.exe PID 3960 wrote to memory of 2400 3960 2e0d574bf00170bb5a448510c2226408.exe jmgas.exe PID 3960 wrote to memory of 2400 3960 2e0d574bf00170bb5a448510c2226408.exe jmgas.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e0d574bf00170bb5a448510c2226408.exe"C:\Users\Admin\AppData\Local\Temp\2e0d574bf00170bb5a448510c2226408.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\2e0d574bf00170bb5a448510c2226408.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\2e0d574bf00170bb5a448510c2226408.exe"C:\Users\Admin\AppData\Local\Temp\2e0d574bf00170bb5a448510c2226408.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\2e0d574bf00170bb5a448510c2226408.exe"C:\Users\Admin\AppData\Local\Temp\2e0d574bf00170bb5a448510c2226408.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\c3a72be100\jmgas.exe"C:\ProgramData\c3a72be100\jmgas.exe"3⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\c3a72be100\jmgas.exeMD5
2e0d574bf00170bb5a448510c2226408
SHA105c599f0ffc3a7474a51ecbda9de51f8dce0ba62
SHA2567110725acbacccb5dc022fc2eb1b1b7c9e30f2a6b24ef77abfed8cea3d297966
SHA5127363d04e59ba5c2c1c5765d56e6656294847c3115e4caf37340d9b65fe3025bd26e113fedfca4661c69d9fb90b1021dfb81ba204289330f2782203b46c00c505
-
C:\ProgramData\c3a72be100\jmgas.exeMD5
2e0d574bf00170bb5a448510c2226408
SHA105c599f0ffc3a7474a51ecbda9de51f8dce0ba62
SHA2567110725acbacccb5dc022fc2eb1b1b7c9e30f2a6b24ef77abfed8cea3d297966
SHA5127363d04e59ba5c2c1c5765d56e6656294847c3115e4caf37340d9b65fe3025bd26e113fedfca4661c69d9fb90b1021dfb81ba204289330f2782203b46c00c505
-
memory/2204-123-0x0000000005B40000-0x0000000005BAE000-memory.dmpFilesize
440KB
-
memory/2204-119-0x0000000004E80000-0x0000000004E81000-memory.dmpFilesize
4KB
-
memory/2204-121-0x0000000004F50000-0x0000000004F5C000-memory.dmpFilesize
48KB
-
memory/2204-122-0x0000000004F40000-0x000000000543E000-memory.dmpFilesize
5.0MB
-
memory/2204-114-0x0000000000560000-0x0000000000561000-memory.dmpFilesize
4KB
-
memory/2204-124-0x00000000053F0000-0x0000000005427000-memory.dmpFilesize
220KB
-
memory/2204-120-0x0000000005140000-0x0000000005141000-memory.dmpFilesize
4KB
-
memory/2204-118-0x0000000004FE0000-0x0000000004FE1000-memory.dmpFilesize
4KB
-
memory/2204-116-0x0000000004EA0000-0x0000000004EA1000-memory.dmpFilesize
4KB
-
memory/2204-117-0x0000000005440000-0x0000000005441000-memory.dmpFilesize
4KB
-
memory/2400-130-0x0000000000000000-mapping.dmp
-
memory/2400-145-0x00000000055A0000-0x0000000005A9E000-memory.dmpFilesize
5.0MB
-
memory/3960-126-0x0000000000400000-0x0000000000436000-memory.dmpFilesize
216KB
-
memory/3960-141-0x0000000000400000-0x0000000000436000-memory.dmpFilesize
216KB
-
memory/3960-127-0x000000000040F0BB-mapping.dmp
-
memory/4076-150-0x00000000081A0000-0x00000000081A1000-memory.dmpFilesize
4KB
-
memory/4076-151-0x0000000007A00000-0x0000000007A01000-memory.dmpFilesize
4KB
-
memory/4076-143-0x0000000004BD0000-0x0000000004BD1000-memory.dmpFilesize
4KB
-
memory/4076-133-0x0000000004C20000-0x0000000004C21000-memory.dmpFilesize
4KB
-
memory/4076-138-0x0000000007A90000-0x0000000007A91000-memory.dmpFilesize
4KB
-
memory/4076-147-0x0000000007670000-0x0000000007671000-memory.dmpFilesize
4KB
-
memory/4076-148-0x0000000007710000-0x0000000007711000-memory.dmpFilesize
4KB
-
memory/4076-149-0x0000000008130000-0x0000000008131000-memory.dmpFilesize
4KB
-
memory/4076-144-0x0000000004BD2000-0x0000000004BD3000-memory.dmpFilesize
4KB
-
memory/4076-125-0x0000000000000000-mapping.dmp
-
memory/4076-152-0x0000000008870000-0x0000000008871000-memory.dmpFilesize
4KB
-
memory/4076-153-0x00000000086C0000-0x00000000086C1000-memory.dmpFilesize
4KB
-
memory/4076-161-0x00000000096E0000-0x0000000009713000-memory.dmpFilesize
204KB
-
memory/4076-168-0x00000000094A0000-0x00000000094A1000-memory.dmpFilesize
4KB
-
memory/4076-173-0x0000000009810000-0x0000000009811000-memory.dmpFilesize
4KB
-
memory/4076-174-0x000000007EA20000-0x000000007EA21000-memory.dmpFilesize
4KB
-
memory/4076-175-0x00000000099D0000-0x00000000099D1000-memory.dmpFilesize
4KB
-
memory/4076-189-0x0000000004BD3000-0x0000000004BD4000-memory.dmpFilesize
4KB