Analysis
-
max time kernel
109s -
max time network
78s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
23-06-2022 20:52
Static task
static1
Behavioral task
behavioral1
Sample
9ec768096c47d40c016a474b8b6dfec950673dfde82fcbd1a0c08dc0318b44ad.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
9ec768096c47d40c016a474b8b6dfec950673dfde82fcbd1a0c08dc0318b44ad.exe
Resource
win10v2004-20220414-en
General
-
Target
9ec768096c47d40c016a474b8b6dfec950673dfde82fcbd1a0c08dc0318b44ad.exe
-
Size
250KB
-
MD5
b58edea3459e74011c931739ad7345f3
-
SHA1
6b11a3c10e081dd63201abbf65bacb206e054240
-
SHA256
9ec768096c47d40c016a474b8b6dfec950673dfde82fcbd1a0c08dc0318b44ad
-
SHA512
ff781b5c94e92fcd06e84958cefd5ad63db0f0db1ff7fe02ec23a95fcf70ebbb04cec7a6e790b334050efbf2296b6cb3e1c6b619fe39a1f17227a298e2c6c132
Malware Config
Extracted
amadey
3.21
antispam-screen.com/fjgD555c3/index.php
soul-kissed.org/fjgD555c3/index.php
rupeika.info/fjgD555c3/index.php
Signatures
-
suricata: ET MALWARE Amadey CnC Check-In
suricata: ET MALWARE Amadey CnC Check-In
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
bguuwe.exebguuwe.exebguuwe.exepid Process 1012 bguuwe.exe 1512 bguuwe.exe 1624 bguuwe.exe -
Loads dropped DLL 4 IoCs
Processes:
9ec768096c47d40c016a474b8b6dfec950673dfde82fcbd1a0c08dc0318b44ad.exeWerFault.exepid Process 2024 9ec768096c47d40c016a474b8b6dfec950673dfde82fcbd1a0c08dc0318b44ad.exe 1180 WerFault.exe 1180 WerFault.exe 1180 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 1180 1012 WerFault.exe 27 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
9ec768096c47d40c016a474b8b6dfec950673dfde82fcbd1a0c08dc0318b44ad.exebguuwe.execmd.exetaskeng.exedescription pid Process procid_target PID 2024 wrote to memory of 1012 2024 9ec768096c47d40c016a474b8b6dfec950673dfde82fcbd1a0c08dc0318b44ad.exe 27 PID 2024 wrote to memory of 1012 2024 9ec768096c47d40c016a474b8b6dfec950673dfde82fcbd1a0c08dc0318b44ad.exe 27 PID 2024 wrote to memory of 1012 2024 9ec768096c47d40c016a474b8b6dfec950673dfde82fcbd1a0c08dc0318b44ad.exe 27 PID 2024 wrote to memory of 1012 2024 9ec768096c47d40c016a474b8b6dfec950673dfde82fcbd1a0c08dc0318b44ad.exe 27 PID 1012 wrote to memory of 1684 1012 bguuwe.exe 28 PID 1012 wrote to memory of 1684 1012 bguuwe.exe 28 PID 1012 wrote to memory of 1684 1012 bguuwe.exe 28 PID 1012 wrote to memory of 1684 1012 bguuwe.exe 28 PID 1012 wrote to memory of 1300 1012 bguuwe.exe 30 PID 1012 wrote to memory of 1300 1012 bguuwe.exe 30 PID 1012 wrote to memory of 1300 1012 bguuwe.exe 30 PID 1012 wrote to memory of 1300 1012 bguuwe.exe 30 PID 1684 wrote to memory of 1152 1684 cmd.exe 32 PID 1684 wrote to memory of 1152 1684 cmd.exe 32 PID 1684 wrote to memory of 1152 1684 cmd.exe 32 PID 1684 wrote to memory of 1152 1684 cmd.exe 32 PID 1012 wrote to memory of 1180 1012 bguuwe.exe 35 PID 1012 wrote to memory of 1180 1012 bguuwe.exe 35 PID 1012 wrote to memory of 1180 1012 bguuwe.exe 35 PID 1012 wrote to memory of 1180 1012 bguuwe.exe 35 PID 804 wrote to memory of 1512 804 taskeng.exe 37 PID 804 wrote to memory of 1512 804 taskeng.exe 37 PID 804 wrote to memory of 1512 804 taskeng.exe 37 PID 804 wrote to memory of 1512 804 taskeng.exe 37 PID 804 wrote to memory of 1624 804 taskeng.exe 38 PID 804 wrote to memory of 1624 804 taskeng.exe 38 PID 804 wrote to memory of 1624 804 taskeng.exe 38 PID 804 wrote to memory of 1624 804 taskeng.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ec768096c47d40c016a474b8b6dfec950673dfde82fcbd1a0c08dc0318b44ad.exe"C:\Users\Admin\AppData\Local\Temp\9ec768096c47d40c016a474b8b6dfec950673dfde82fcbd1a0c08dc0318b44ad.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\74480db1f5\bguuwe.exe"C:\Users\Admin\AppData\Local\Temp\74480db1f5\bguuwe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\74480db1f5\3⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\74480db1f5\4⤵PID:1152
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN bguuwe.exe /TR "C:\Users\Admin\AppData\Local\Temp\74480db1f5\bguuwe.exe" /F3⤵
- Creates scheduled task(s)
PID:1300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1012 -s 10203⤵
- Loads dropped DLL
- Program crash
PID:1180
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {695D2647-FCDE-4D24-AE71-A8ED1CD9F882} S-1-5-21-790309383-526510583-3802439154-1000:TVHJCWMH\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Users\Admin\AppData\Local\Temp\74480db1f5\bguuwe.exeC:\Users\Admin\AppData\Local\Temp\74480db1f5\bguuwe.exe2⤵
- Executes dropped EXE
PID:1512
-
-
C:\Users\Admin\AppData\Local\Temp\74480db1f5\bguuwe.exeC:\Users\Admin\AppData\Local\Temp\74480db1f5\bguuwe.exe2⤵
- Executes dropped EXE
PID:1624
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
250KB
MD5b58edea3459e74011c931739ad7345f3
SHA16b11a3c10e081dd63201abbf65bacb206e054240
SHA2569ec768096c47d40c016a474b8b6dfec950673dfde82fcbd1a0c08dc0318b44ad
SHA512ff781b5c94e92fcd06e84958cefd5ad63db0f0db1ff7fe02ec23a95fcf70ebbb04cec7a6e790b334050efbf2296b6cb3e1c6b619fe39a1f17227a298e2c6c132
-
Filesize
250KB
MD5b58edea3459e74011c931739ad7345f3
SHA16b11a3c10e081dd63201abbf65bacb206e054240
SHA2569ec768096c47d40c016a474b8b6dfec950673dfde82fcbd1a0c08dc0318b44ad
SHA512ff781b5c94e92fcd06e84958cefd5ad63db0f0db1ff7fe02ec23a95fcf70ebbb04cec7a6e790b334050efbf2296b6cb3e1c6b619fe39a1f17227a298e2c6c132
-
Filesize
250KB
MD5b58edea3459e74011c931739ad7345f3
SHA16b11a3c10e081dd63201abbf65bacb206e054240
SHA2569ec768096c47d40c016a474b8b6dfec950673dfde82fcbd1a0c08dc0318b44ad
SHA512ff781b5c94e92fcd06e84958cefd5ad63db0f0db1ff7fe02ec23a95fcf70ebbb04cec7a6e790b334050efbf2296b6cb3e1c6b619fe39a1f17227a298e2c6c132
-
Filesize
250KB
MD5b58edea3459e74011c931739ad7345f3
SHA16b11a3c10e081dd63201abbf65bacb206e054240
SHA2569ec768096c47d40c016a474b8b6dfec950673dfde82fcbd1a0c08dc0318b44ad
SHA512ff781b5c94e92fcd06e84958cefd5ad63db0f0db1ff7fe02ec23a95fcf70ebbb04cec7a6e790b334050efbf2296b6cb3e1c6b619fe39a1f17227a298e2c6c132
-
Filesize
250KB
MD5b58edea3459e74011c931739ad7345f3
SHA16b11a3c10e081dd63201abbf65bacb206e054240
SHA2569ec768096c47d40c016a474b8b6dfec950673dfde82fcbd1a0c08dc0318b44ad
SHA512ff781b5c94e92fcd06e84958cefd5ad63db0f0db1ff7fe02ec23a95fcf70ebbb04cec7a6e790b334050efbf2296b6cb3e1c6b619fe39a1f17227a298e2c6c132
-
Filesize
250KB
MD5b58edea3459e74011c931739ad7345f3
SHA16b11a3c10e081dd63201abbf65bacb206e054240
SHA2569ec768096c47d40c016a474b8b6dfec950673dfde82fcbd1a0c08dc0318b44ad
SHA512ff781b5c94e92fcd06e84958cefd5ad63db0f0db1ff7fe02ec23a95fcf70ebbb04cec7a6e790b334050efbf2296b6cb3e1c6b619fe39a1f17227a298e2c6c132
-
Filesize
250KB
MD5b58edea3459e74011c931739ad7345f3
SHA16b11a3c10e081dd63201abbf65bacb206e054240
SHA2569ec768096c47d40c016a474b8b6dfec950673dfde82fcbd1a0c08dc0318b44ad
SHA512ff781b5c94e92fcd06e84958cefd5ad63db0f0db1ff7fe02ec23a95fcf70ebbb04cec7a6e790b334050efbf2296b6cb3e1c6b619fe39a1f17227a298e2c6c132
-
Filesize
250KB
MD5b58edea3459e74011c931739ad7345f3
SHA16b11a3c10e081dd63201abbf65bacb206e054240
SHA2569ec768096c47d40c016a474b8b6dfec950673dfde82fcbd1a0c08dc0318b44ad
SHA512ff781b5c94e92fcd06e84958cefd5ad63db0f0db1ff7fe02ec23a95fcf70ebbb04cec7a6e790b334050efbf2296b6cb3e1c6b619fe39a1f17227a298e2c6c132