Analysis
-
max time kernel
184s -
max time network
183s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
16-05-2022 13:53
Static task
static1
Behavioral task
behavioral1
Sample
4d4fa36151d3330036cdae11a434af0b5e5cc3403f60c15d968561fd3c41e9a7.exe
Resource
win7-20220414-en
General
-
Target
4d4fa36151d3330036cdae11a434af0b5e5cc3403f60c15d968561fd3c41e9a7.exe
-
Size
218KB
-
MD5
a9c62f3c2b7bf88433746c06a7196a92
-
SHA1
020c23eb4a3a4df8c6c1e5450127fa9383095378
-
SHA256
4d4fa36151d3330036cdae11a434af0b5e5cc3403f60c15d968561fd3c41e9a7
-
SHA512
342aed8d60985831565fdaffb3d02243fb64caa9bdcc93f6114378ca99513ef4f03289d6988a5e85c7d1dd351fea352fb65b0f65893df52837574311a51b2e80
Malware Config
Extracted
amadey
3.08
190.123.44.195/d2VxjasuwS/index.php
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
ftewk.exeftewk.exeftewk.exeftewk.exepid process 1736 ftewk.exe 1876 ftewk.exe 536 ftewk.exe 928 ftewk.exe -
Loads dropped DLL 1 IoCs
Processes:
4d4fa36151d3330036cdae11a434af0b5e5cc3403f60c15d968561fd3c41e9a7.exepid process 1108 4d4fa36151d3330036cdae11a434af0b5e5cc3403f60c15d968561fd3c41e9a7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
4d4fa36151d3330036cdae11a434af0b5e5cc3403f60c15d968561fd3c41e9a7.exeftewk.execmd.exetaskeng.exedescription pid process target process PID 1108 wrote to memory of 1736 1108 4d4fa36151d3330036cdae11a434af0b5e5cc3403f60c15d968561fd3c41e9a7.exe ftewk.exe PID 1108 wrote to memory of 1736 1108 4d4fa36151d3330036cdae11a434af0b5e5cc3403f60c15d968561fd3c41e9a7.exe ftewk.exe PID 1108 wrote to memory of 1736 1108 4d4fa36151d3330036cdae11a434af0b5e5cc3403f60c15d968561fd3c41e9a7.exe ftewk.exe PID 1108 wrote to memory of 1736 1108 4d4fa36151d3330036cdae11a434af0b5e5cc3403f60c15d968561fd3c41e9a7.exe ftewk.exe PID 1736 wrote to memory of 1704 1736 ftewk.exe cmd.exe PID 1736 wrote to memory of 1704 1736 ftewk.exe cmd.exe PID 1736 wrote to memory of 1704 1736 ftewk.exe cmd.exe PID 1736 wrote to memory of 1704 1736 ftewk.exe cmd.exe PID 1736 wrote to memory of 1156 1736 ftewk.exe schtasks.exe PID 1736 wrote to memory of 1156 1736 ftewk.exe schtasks.exe PID 1736 wrote to memory of 1156 1736 ftewk.exe schtasks.exe PID 1736 wrote to memory of 1156 1736 ftewk.exe schtasks.exe PID 1704 wrote to memory of 2004 1704 cmd.exe reg.exe PID 1704 wrote to memory of 2004 1704 cmd.exe reg.exe PID 1704 wrote to memory of 2004 1704 cmd.exe reg.exe PID 1704 wrote to memory of 2004 1704 cmd.exe reg.exe PID 1136 wrote to memory of 1876 1136 taskeng.exe ftewk.exe PID 1136 wrote to memory of 1876 1136 taskeng.exe ftewk.exe PID 1136 wrote to memory of 1876 1136 taskeng.exe ftewk.exe PID 1136 wrote to memory of 1876 1136 taskeng.exe ftewk.exe PID 1136 wrote to memory of 536 1136 taskeng.exe ftewk.exe PID 1136 wrote to memory of 536 1136 taskeng.exe ftewk.exe PID 1136 wrote to memory of 536 1136 taskeng.exe ftewk.exe PID 1136 wrote to memory of 536 1136 taskeng.exe ftewk.exe PID 1136 wrote to memory of 928 1136 taskeng.exe ftewk.exe PID 1136 wrote to memory of 928 1136 taskeng.exe ftewk.exe PID 1136 wrote to memory of 928 1136 taskeng.exe ftewk.exe PID 1136 wrote to memory of 928 1136 taskeng.exe ftewk.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d4fa36151d3330036cdae11a434af0b5e5cc3403f60c15d968561fd3c41e9a7.exe"C:\Users\Admin\AppData\Local\Temp\4d4fa36151d3330036cdae11a434af0b5e5cc3403f60c15d968561fd3c41e9a7.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\dd7e303766\ftewk.exe"C:\Users\Admin\AppData\Local\Temp\dd7e303766\ftewk.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\dd7e303766\3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\dd7e303766\4⤵
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN ftewk.exe /TR "C:\Users\Admin\AppData\Local\Temp\dd7e303766\ftewk.exe" /F3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\taskeng.exetaskeng.exe {FDDC052F-DDD0-4659-96B2-E4BDA79DE8BA} S-1-5-21-1083475884-596052423-1669053738-1000:WYZSGDWS\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\dd7e303766\ftewk.exeC:\Users\Admin\AppData\Local\Temp\dd7e303766\ftewk.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\dd7e303766\ftewk.exeC:\Users\Admin\AppData\Local\Temp\dd7e303766\ftewk.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\dd7e303766\ftewk.exeC:\Users\Admin\AppData\Local\Temp\dd7e303766\ftewk.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\dd7e303766\ftewk.exeFilesize
218KB
MD5a9c62f3c2b7bf88433746c06a7196a92
SHA1020c23eb4a3a4df8c6c1e5450127fa9383095378
SHA2564d4fa36151d3330036cdae11a434af0b5e5cc3403f60c15d968561fd3c41e9a7
SHA512342aed8d60985831565fdaffb3d02243fb64caa9bdcc93f6114378ca99513ef4f03289d6988a5e85c7d1dd351fea352fb65b0f65893df52837574311a51b2e80
-
C:\Users\Admin\AppData\Local\Temp\dd7e303766\ftewk.exeFilesize
218KB
MD5a9c62f3c2b7bf88433746c06a7196a92
SHA1020c23eb4a3a4df8c6c1e5450127fa9383095378
SHA2564d4fa36151d3330036cdae11a434af0b5e5cc3403f60c15d968561fd3c41e9a7
SHA512342aed8d60985831565fdaffb3d02243fb64caa9bdcc93f6114378ca99513ef4f03289d6988a5e85c7d1dd351fea352fb65b0f65893df52837574311a51b2e80
-
C:\Users\Admin\AppData\Local\Temp\dd7e303766\ftewk.exeFilesize
218KB
MD5a9c62f3c2b7bf88433746c06a7196a92
SHA1020c23eb4a3a4df8c6c1e5450127fa9383095378
SHA2564d4fa36151d3330036cdae11a434af0b5e5cc3403f60c15d968561fd3c41e9a7
SHA512342aed8d60985831565fdaffb3d02243fb64caa9bdcc93f6114378ca99513ef4f03289d6988a5e85c7d1dd351fea352fb65b0f65893df52837574311a51b2e80
-
C:\Users\Admin\AppData\Local\Temp\dd7e303766\ftewk.exeFilesize
218KB
MD5a9c62f3c2b7bf88433746c06a7196a92
SHA1020c23eb4a3a4df8c6c1e5450127fa9383095378
SHA2564d4fa36151d3330036cdae11a434af0b5e5cc3403f60c15d968561fd3c41e9a7
SHA512342aed8d60985831565fdaffb3d02243fb64caa9bdcc93f6114378ca99513ef4f03289d6988a5e85c7d1dd351fea352fb65b0f65893df52837574311a51b2e80
-
C:\Users\Admin\AppData\Local\Temp\dd7e303766\ftewk.exeFilesize
200KB
MD50efd430b3eb7104519c0f97c9b223ce9
SHA1cd889ae784060a4c23bd91d12ef128d7a87b70fa
SHA25632f5f6aa3c50ac245168771a7039080f983c43eb44eb954921dddb6bdda89ff4
SHA512a6e6d5a4102423c9870b2609b438164ce2f45adc4a17119927d1a9bd467252bcb598a6539fd60fddffa871b36c5644a50bb8f92d9ceac09b02e45f548d306a5e
-
\Users\Admin\AppData\Local\Temp\dd7e303766\ftewk.exeFilesize
218KB
MD5a9c62f3c2b7bf88433746c06a7196a92
SHA1020c23eb4a3a4df8c6c1e5450127fa9383095378
SHA2564d4fa36151d3330036cdae11a434af0b5e5cc3403f60c15d968561fd3c41e9a7
SHA512342aed8d60985831565fdaffb3d02243fb64caa9bdcc93f6114378ca99513ef4f03289d6988a5e85c7d1dd351fea352fb65b0f65893df52837574311a51b2e80
-
memory/536-66-0x0000000000000000-mapping.dmp
-
memory/928-69-0x0000000000000000-mapping.dmp
-
memory/1108-54-0x0000000076431000-0x0000000076433000-memory.dmpFilesize
8KB
-
memory/1156-60-0x0000000000000000-mapping.dmp
-
memory/1704-59-0x0000000000000000-mapping.dmp
-
memory/1736-56-0x0000000000000000-mapping.dmp
-
memory/1876-63-0x0000000000000000-mapping.dmp
-
memory/2004-61-0x0000000000000000-mapping.dmp