Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2022, 06:22
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
General
-
Target
file.exe
-
Size
354KB
-
MD5
2b8f7b49ea2a9e7bd94a238ce6bca52e
-
SHA1
5de3a09a828d623164f665d76c05e0950851667c
-
SHA256
9572466d622f71b0f623064d381d4a4a2df3582074f3b828e555162fff953c93
-
SHA512
87aaea88c50e58aa269c274c8e075c74f3e4278dc5c67bf8c154e55eead98cf56571bf63df38ab7520c7079c66eeb091579dfd725fb626565ebcaf0a1efba18f
-
SSDEEP
6144:cEeTy3DE3a9pUt9y1L7PN2L+eRpuE3pF6npCR4E3sMDmshnkf8+CwbG:4AI3lszN2L+s/anpG4E86zc8wG
Malware Config
Extracted
amadey
3.50
193.56.146.194/h49vlBP/index.php
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4468 rovwer.exe 4244 rovwer.exe 3648 rovwer.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation rovwer.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 448 4768 WerFault.exe 82 2288 4244 WerFault.exe 94 3468 3648 WerFault.exe 99 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1184 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4768 wrote to memory of 4468 4768 file.exe 83 PID 4768 wrote to memory of 4468 4768 file.exe 83 PID 4768 wrote to memory of 4468 4768 file.exe 83 PID 4468 wrote to memory of 1184 4468 rovwer.exe 87 PID 4468 wrote to memory of 1184 4468 rovwer.exe 87 PID 4468 wrote to memory of 1184 4468 rovwer.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe" /F3⤵
- Creates scheduled task(s)
PID:1184
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 12122⤵
- Program crash
PID:448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4768 -ip 47681⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵
- Executes dropped EXE
PID:4244 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4244 -s 4282⤵
- Program crash
PID:2288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4244 -ip 42441⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵
- Executes dropped EXE
PID:3648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3648 -s 4362⤵
- Program crash
PID:3468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3648 -ip 36481⤵PID:5084
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
354KB
MD52b8f7b49ea2a9e7bd94a238ce6bca52e
SHA15de3a09a828d623164f665d76c05e0950851667c
SHA2569572466d622f71b0f623064d381d4a4a2df3582074f3b828e555162fff953c93
SHA51287aaea88c50e58aa269c274c8e075c74f3e4278dc5c67bf8c154e55eead98cf56571bf63df38ab7520c7079c66eeb091579dfd725fb626565ebcaf0a1efba18f
-
Filesize
354KB
MD52b8f7b49ea2a9e7bd94a238ce6bca52e
SHA15de3a09a828d623164f665d76c05e0950851667c
SHA2569572466d622f71b0f623064d381d4a4a2df3582074f3b828e555162fff953c93
SHA51287aaea88c50e58aa269c274c8e075c74f3e4278dc5c67bf8c154e55eead98cf56571bf63df38ab7520c7079c66eeb091579dfd725fb626565ebcaf0a1efba18f
-
Filesize
354KB
MD52b8f7b49ea2a9e7bd94a238ce6bca52e
SHA15de3a09a828d623164f665d76c05e0950851667c
SHA2569572466d622f71b0f623064d381d4a4a2df3582074f3b828e555162fff953c93
SHA51287aaea88c50e58aa269c274c8e075c74f3e4278dc5c67bf8c154e55eead98cf56571bf63df38ab7520c7079c66eeb091579dfd725fb626565ebcaf0a1efba18f
-
Filesize
354KB
MD52b8f7b49ea2a9e7bd94a238ce6bca52e
SHA15de3a09a828d623164f665d76c05e0950851667c
SHA2569572466d622f71b0f623064d381d4a4a2df3582074f3b828e555162fff953c93
SHA51287aaea88c50e58aa269c274c8e075c74f3e4278dc5c67bf8c154e55eead98cf56571bf63df38ab7520c7079c66eeb091579dfd725fb626565ebcaf0a1efba18f