Analysis
-
max time kernel
202s -
max time network
202s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:13
Static task
static1
General
-
Target
470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e.exe
-
Size
244KB
-
MD5
0906eebf6f5fd1f9029e4bc6f81a636d
-
SHA1
938df93f0f7ebb8f31a2d2e57c2447d17a0737b8
-
SHA256
470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e
-
SHA512
dad5fbcb96ebfb5c29d3fc3f46528ad46dce70acd67ee257b288ad58224117f90919ebce2693b4df9db7ba86f79fa417ff6b6b21c27a837e4d36d7c2b8ef7af6
-
SSDEEP
6144:wuh1kLkzOqq8CW1V8Hcc9JOkbztWp4vW677CNZwVLL:wuh1kxqq8HrIDvHfCNW
Malware Config
Extracted
amadey
3.50
193.56.146.174/g84kvj4jck/index.php
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
rovwer.exerovwer.exepid process 4668 rovwer.exe 3084 rovwer.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e.exerovwer.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation rovwer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3640 4160 WerFault.exe 470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e.exe 3732 3084 WerFault.exe rovwer.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e.exerovwer.execmd.exedescription pid process target process PID 4160 wrote to memory of 4668 4160 470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e.exe rovwer.exe PID 4160 wrote to memory of 4668 4160 470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e.exe rovwer.exe PID 4160 wrote to memory of 4668 4160 470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e.exe rovwer.exe PID 4668 wrote to memory of 3516 4668 rovwer.exe schtasks.exe PID 4668 wrote to memory of 3516 4668 rovwer.exe schtasks.exe PID 4668 wrote to memory of 3516 4668 rovwer.exe schtasks.exe PID 4668 wrote to memory of 4272 4668 rovwer.exe cmd.exe PID 4668 wrote to memory of 4272 4668 rovwer.exe cmd.exe PID 4668 wrote to memory of 4272 4668 rovwer.exe cmd.exe PID 4272 wrote to memory of 1280 4272 cmd.exe cmd.exe PID 4272 wrote to memory of 1280 4272 cmd.exe cmd.exe PID 4272 wrote to memory of 1280 4272 cmd.exe cmd.exe PID 4272 wrote to memory of 4780 4272 cmd.exe cacls.exe PID 4272 wrote to memory of 4780 4272 cmd.exe cacls.exe PID 4272 wrote to memory of 4780 4272 cmd.exe cacls.exe PID 4272 wrote to memory of 1340 4272 cmd.exe cacls.exe PID 4272 wrote to memory of 1340 4272 cmd.exe cacls.exe PID 4272 wrote to memory of 1340 4272 cmd.exe cacls.exe PID 4272 wrote to memory of 3076 4272 cmd.exe cmd.exe PID 4272 wrote to memory of 3076 4272 cmd.exe cmd.exe PID 4272 wrote to memory of 3076 4272 cmd.exe cmd.exe PID 4272 wrote to memory of 4204 4272 cmd.exe cacls.exe PID 4272 wrote to memory of 4204 4272 cmd.exe cacls.exe PID 4272 wrote to memory of 4204 4272 cmd.exe cacls.exe PID 4272 wrote to memory of 2792 4272 cmd.exe cacls.exe PID 4272 wrote to memory of 2792 4272 cmd.exe cacls.exe PID 4272 wrote to memory of 2792 4272 cmd.exe cacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e.exe"C:\Users\Admin\AppData\Local\Temp\470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe" /F3⤵
- Creates scheduled task(s)
PID:3516
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rovwer.exe" /P "Admin:N"&&CACLS "rovwer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\99e342142d" /P "Admin:N"&&CACLS "..\99e342142d" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1280
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rovwer.exe" /P "Admin:N"4⤵PID:4780
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rovwer.exe" /P "Admin:R" /E4⤵PID:1340
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:3076
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\99e342142d" /P "Admin:N"4⤵PID:4204
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\99e342142d" /P "Admin:R" /E4⤵PID:2792
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 11362⤵
- Program crash
PID:3640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4160 -ip 41601⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe1⤵
- Executes dropped EXE
PID:3084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 4162⤵
- Program crash
PID:3732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3084 -ip 30841⤵PID:2804
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD50906eebf6f5fd1f9029e4bc6f81a636d
SHA1938df93f0f7ebb8f31a2d2e57c2447d17a0737b8
SHA256470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e
SHA512dad5fbcb96ebfb5c29d3fc3f46528ad46dce70acd67ee257b288ad58224117f90919ebce2693b4df9db7ba86f79fa417ff6b6b21c27a837e4d36d7c2b8ef7af6
-
Filesize
244KB
MD50906eebf6f5fd1f9029e4bc6f81a636d
SHA1938df93f0f7ebb8f31a2d2e57c2447d17a0737b8
SHA256470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e
SHA512dad5fbcb96ebfb5c29d3fc3f46528ad46dce70acd67ee257b288ad58224117f90919ebce2693b4df9db7ba86f79fa417ff6b6b21c27a837e4d36d7c2b8ef7af6
-
Filesize
244KB
MD50906eebf6f5fd1f9029e4bc6f81a636d
SHA1938df93f0f7ebb8f31a2d2e57c2447d17a0737b8
SHA256470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e
SHA512dad5fbcb96ebfb5c29d3fc3f46528ad46dce70acd67ee257b288ad58224117f90919ebce2693b4df9db7ba86f79fa417ff6b6b21c27a837e4d36d7c2b8ef7af6