Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
29-09-2021 00:05
Static task
static1
Behavioral task
behavioral1
Sample
a26595e04bbad90731a04c1195c34d92.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
a26595e04bbad90731a04c1195c34d92.exe
-
Size
1.4MB
-
MD5
a26595e04bbad90731a04c1195c34d92
-
SHA1
0b295fa12e6bd596ba0071a58370966c6a4551c3
-
SHA256
c5e41abe14036a3331b4bd9e3bb24be2424439a8030b8dfbe1a61a3da6482573
-
SHA512
ad8682d0772bc0668fde3d7818a180b64da892e9c687332a960efa8c7ed5bdb12b5a1286d833c145c667d25373a7001ae320d24034c1f1fd089a1e1a273ff934
Malware Config
Extracted
Family
amadey
Version
2.61
C2
185.215.113.33/hBF6ds2D/index.php
Signatures
-
suricata: ET MALWARE Amadey CnC Check-In
suricata: ET MALWARE Amadey CnC Check-In
-
Executes dropped EXE 6 IoCs
pid Process 836 sqtvvs.exe 1116 sqtvvs.exe 1432 sqtvvs.exe 1768 sqtvvs.exe 1784 sqtvvs.exe 1416 sqtvvs.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 648 set thread context of 668 648 a26595e04bbad90731a04c1195c34d92.exe 68 PID 836 set thread context of 1116 836 sqtvvs.exe 70 PID 1432 set thread context of 1768 1432 sqtvvs.exe 84 PID 1784 set thread context of 1416 1784 sqtvvs.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1508 schtasks.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 648 wrote to memory of 668 648 a26595e04bbad90731a04c1195c34d92.exe 68 PID 648 wrote to memory of 668 648 a26595e04bbad90731a04c1195c34d92.exe 68 PID 648 wrote to memory of 668 648 a26595e04bbad90731a04c1195c34d92.exe 68 PID 648 wrote to memory of 668 648 a26595e04bbad90731a04c1195c34d92.exe 68 PID 648 wrote to memory of 668 648 a26595e04bbad90731a04c1195c34d92.exe 68 PID 668 wrote to memory of 836 668 a26595e04bbad90731a04c1195c34d92.exe 69 PID 668 wrote to memory of 836 668 a26595e04bbad90731a04c1195c34d92.exe 69 PID 668 wrote to memory of 836 668 a26595e04bbad90731a04c1195c34d92.exe 69 PID 836 wrote to memory of 1116 836 sqtvvs.exe 70 PID 836 wrote to memory of 1116 836 sqtvvs.exe 70 PID 836 wrote to memory of 1116 836 sqtvvs.exe 70 PID 836 wrote to memory of 1116 836 sqtvvs.exe 70 PID 836 wrote to memory of 1116 836 sqtvvs.exe 70 PID 1116 wrote to memory of 1416 1116 sqtvvs.exe 71 PID 1116 wrote to memory of 1416 1116 sqtvvs.exe 71 PID 1116 wrote to memory of 1416 1116 sqtvvs.exe 71 PID 1116 wrote to memory of 1508 1116 sqtvvs.exe 72 PID 1116 wrote to memory of 1508 1116 sqtvvs.exe 72 PID 1116 wrote to memory of 1508 1116 sqtvvs.exe 72 PID 1416 wrote to memory of 2144 1416 cmd.exe 75 PID 1416 wrote to memory of 2144 1416 cmd.exe 75 PID 1416 wrote to memory of 2144 1416 cmd.exe 75 PID 1432 wrote to memory of 1768 1432 sqtvvs.exe 84 PID 1432 wrote to memory of 1768 1432 sqtvvs.exe 84 PID 1432 wrote to memory of 1768 1432 sqtvvs.exe 84 PID 1432 wrote to memory of 1768 1432 sqtvvs.exe 84 PID 1432 wrote to memory of 1768 1432 sqtvvs.exe 84 PID 1784 wrote to memory of 1416 1784 sqtvvs.exe 86 PID 1784 wrote to memory of 1416 1784 sqtvvs.exe 86 PID 1784 wrote to memory of 1416 1784 sqtvvs.exe 86 PID 1784 wrote to memory of 1416 1784 sqtvvs.exe 86 PID 1784 wrote to memory of 1416 1784 sqtvvs.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\a26595e04bbad90731a04c1195c34d92.exe"C:\Users\Admin\AppData\Local\Temp\a26595e04bbad90731a04c1195c34d92.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Users\Admin\AppData\Local\Temp\a26595e04bbad90731a04c1195c34d92.exe"C:\Users\Admin\AppData\Local\Temp\a26595e04bbad90731a04c1195c34d92.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Users\Admin\AppData\Local\Temp\7ac441486f\sqtvvs.exe"C:\Users\Admin\AppData\Local\Temp\7ac441486f\sqtvvs.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Local\Temp\7ac441486f\sqtvvs.exe"C:\Users\Admin\AppData\Local\Temp\7ac441486f\sqtvvs.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\7ac441486f\5⤵
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\7ac441486f\6⤵PID:2144
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN sqtvvs.exe /TR "C:\Users\Admin\AppData\Local\Temp\7ac441486f\sqtvvs.exe" /F5⤵
- Creates scheduled task(s)
PID:1508
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7ac441486f\sqtvvs.exeC:\Users\Admin\AppData\Local\Temp\7ac441486f\sqtvvs.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\7ac441486f\sqtvvs.exeC:\Users\Admin\AppData\Local\Temp\7ac441486f\sqtvvs.exe2⤵
- Executes dropped EXE
PID:1768
-
-
C:\Users\Admin\AppData\Local\Temp\7ac441486f\sqtvvs.exeC:\Users\Admin\AppData\Local\Temp\7ac441486f\sqtvvs.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\7ac441486f\sqtvvs.exeC:\Users\Admin\AppData\Local\Temp\7ac441486f\sqtvvs.exe2⤵
- Executes dropped EXE
PID:1416
-