Analysis
-
max time kernel
120s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 16:16
Static task
static1
Behavioral task
behavioral1
Sample
53f54f7688b7becf3f68ca1ac3cb3565.exe
Resource
win7-20220414-en
General
-
Target
53f54f7688b7becf3f68ca1ac3cb3565.exe
-
Size
336KB
-
MD5
53f54f7688b7becf3f68ca1ac3cb3565
-
SHA1
b99a8ee9253186f3a19e750e4b9a7cecedb30136
-
SHA256
74e1d92213c0f1cad8c5387f8ec54f7c901a76596afb9e88c30fdd6bca4f005b
-
SHA512
a94b97891ae3e7c202746e13912737e9047ba0f5e344ad22c6eba54e15178935db2b3e9b94eb2759294de171588a6cd42ade38dc1bdb98fd16ddafccec6591ad
Malware Config
Extracted
amadey
3.10
185.215.113.35/d2VxjasuwS_old/index.php
Signatures
-
suricata: ET MALWARE Amadey CnC Check-In
suricata: ET MALWARE Amadey CnC Check-In
-
Executes dropped EXE 3 IoCs
Processes:
orxds.exeorxds.exeorxds.exepid process 1276 orxds.exe 1744 orxds.exe 1528 orxds.exe -
Loads dropped DLL 2 IoCs
Processes:
53f54f7688b7becf3f68ca1ac3cb3565.exepid process 1712 53f54f7688b7becf3f68ca1ac3cb3565.exe 1712 53f54f7688b7becf3f68ca1ac3cb3565.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
53f54f7688b7becf3f68ca1ac3cb3565.exeorxds.execmd.exetaskeng.exedescription pid process target process PID 1712 wrote to memory of 1276 1712 53f54f7688b7becf3f68ca1ac3cb3565.exe orxds.exe PID 1712 wrote to memory of 1276 1712 53f54f7688b7becf3f68ca1ac3cb3565.exe orxds.exe PID 1712 wrote to memory of 1276 1712 53f54f7688b7becf3f68ca1ac3cb3565.exe orxds.exe PID 1712 wrote to memory of 1276 1712 53f54f7688b7becf3f68ca1ac3cb3565.exe orxds.exe PID 1276 wrote to memory of 1828 1276 orxds.exe cmd.exe PID 1276 wrote to memory of 1828 1276 orxds.exe cmd.exe PID 1276 wrote to memory of 1828 1276 orxds.exe cmd.exe PID 1276 wrote to memory of 1828 1276 orxds.exe cmd.exe PID 1276 wrote to memory of 964 1276 orxds.exe schtasks.exe PID 1276 wrote to memory of 964 1276 orxds.exe schtasks.exe PID 1276 wrote to memory of 964 1276 orxds.exe schtasks.exe PID 1276 wrote to memory of 964 1276 orxds.exe schtasks.exe PID 1828 wrote to memory of 792 1828 cmd.exe reg.exe PID 1828 wrote to memory of 792 1828 cmd.exe reg.exe PID 1828 wrote to memory of 792 1828 cmd.exe reg.exe PID 1828 wrote to memory of 792 1828 cmd.exe reg.exe PID 1996 wrote to memory of 1744 1996 taskeng.exe orxds.exe PID 1996 wrote to memory of 1744 1996 taskeng.exe orxds.exe PID 1996 wrote to memory of 1744 1996 taskeng.exe orxds.exe PID 1996 wrote to memory of 1744 1996 taskeng.exe orxds.exe PID 1996 wrote to memory of 1528 1996 taskeng.exe orxds.exe PID 1996 wrote to memory of 1528 1996 taskeng.exe orxds.exe PID 1996 wrote to memory of 1528 1996 taskeng.exe orxds.exe PID 1996 wrote to memory of 1528 1996 taskeng.exe orxds.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\53f54f7688b7becf3f68ca1ac3cb3565.exe"C:\Users\Admin\AppData\Local\Temp\53f54f7688b7becf3f68ca1ac3cb3565.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\d273120da5\orxds.exe"C:\Users\Admin\AppData\Local\Temp\d273120da5\orxds.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\d273120da5\3⤵
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\d273120da5\4⤵PID:792
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN orxds.exe /TR "C:\Users\Admin\AppData\Local\Temp\d273120da5\orxds.exe" /F3⤵
- Creates scheduled task(s)
PID:964
-
C:\Windows\system32\taskeng.exetaskeng.exe {9F5CF20E-9D1B-4C1C-9F5B-1CC35E57EDE0} S-1-5-21-1083475884-596052423-1669053738-1000:WYZSGDWS\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\d273120da5\orxds.exeC:\Users\Admin\AppData\Local\Temp\d273120da5\orxds.exe2⤵
- Executes dropped EXE
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\d273120da5\orxds.exeC:\Users\Admin\AppData\Local\Temp\d273120da5\orxds.exe2⤵
- Executes dropped EXE
PID:1528
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336KB
MD553f54f7688b7becf3f68ca1ac3cb3565
SHA1b99a8ee9253186f3a19e750e4b9a7cecedb30136
SHA25674e1d92213c0f1cad8c5387f8ec54f7c901a76596afb9e88c30fdd6bca4f005b
SHA512a94b97891ae3e7c202746e13912737e9047ba0f5e344ad22c6eba54e15178935db2b3e9b94eb2759294de171588a6cd42ade38dc1bdb98fd16ddafccec6591ad
-
Filesize
336KB
MD553f54f7688b7becf3f68ca1ac3cb3565
SHA1b99a8ee9253186f3a19e750e4b9a7cecedb30136
SHA25674e1d92213c0f1cad8c5387f8ec54f7c901a76596afb9e88c30fdd6bca4f005b
SHA512a94b97891ae3e7c202746e13912737e9047ba0f5e344ad22c6eba54e15178935db2b3e9b94eb2759294de171588a6cd42ade38dc1bdb98fd16ddafccec6591ad
-
Filesize
336KB
MD553f54f7688b7becf3f68ca1ac3cb3565
SHA1b99a8ee9253186f3a19e750e4b9a7cecedb30136
SHA25674e1d92213c0f1cad8c5387f8ec54f7c901a76596afb9e88c30fdd6bca4f005b
SHA512a94b97891ae3e7c202746e13912737e9047ba0f5e344ad22c6eba54e15178935db2b3e9b94eb2759294de171588a6cd42ade38dc1bdb98fd16ddafccec6591ad
-
Filesize
336KB
MD553f54f7688b7becf3f68ca1ac3cb3565
SHA1b99a8ee9253186f3a19e750e4b9a7cecedb30136
SHA25674e1d92213c0f1cad8c5387f8ec54f7c901a76596afb9e88c30fdd6bca4f005b
SHA512a94b97891ae3e7c202746e13912737e9047ba0f5e344ad22c6eba54e15178935db2b3e9b94eb2759294de171588a6cd42ade38dc1bdb98fd16ddafccec6591ad
-
Filesize
336KB
MD553f54f7688b7becf3f68ca1ac3cb3565
SHA1b99a8ee9253186f3a19e750e4b9a7cecedb30136
SHA25674e1d92213c0f1cad8c5387f8ec54f7c901a76596afb9e88c30fdd6bca4f005b
SHA512a94b97891ae3e7c202746e13912737e9047ba0f5e344ad22c6eba54e15178935db2b3e9b94eb2759294de171588a6cd42ade38dc1bdb98fd16ddafccec6591ad
-
Filesize
336KB
MD553f54f7688b7becf3f68ca1ac3cb3565
SHA1b99a8ee9253186f3a19e750e4b9a7cecedb30136
SHA25674e1d92213c0f1cad8c5387f8ec54f7c901a76596afb9e88c30fdd6bca4f005b
SHA512a94b97891ae3e7c202746e13912737e9047ba0f5e344ad22c6eba54e15178935db2b3e9b94eb2759294de171588a6cd42ade38dc1bdb98fd16ddafccec6591ad