Analysis
-
max time kernel
207s -
max time network
253s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 16:47
Static task
static1
Behavioral task
behavioral1
Sample
1e3386190d8323958a031a015f563ba3b99b4b57c7cdbc995a50d6bf56005d62.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1e3386190d8323958a031a015f563ba3b99b4b57c7cdbc995a50d6bf56005d62.exe
Resource
win10v2004-20220901-en
General
-
Target
1e3386190d8323958a031a015f563ba3b99b4b57c7cdbc995a50d6bf56005d62.exe
-
Size
244KB
-
MD5
ee1e865bb346ca034571540c7f7a985b
-
SHA1
fd9ce830e59dbf847f051ea5af5945ab2e7bc1b6
-
SHA256
1e3386190d8323958a031a015f563ba3b99b4b57c7cdbc995a50d6bf56005d62
-
SHA512
5beb175ae3e19a5e1bf2486b1a692e0a44daed8373b1330b642daa6b2e9d7efbd23d0746c775ea2b56aeed7483474b5f1745001e74edea41c5589c2dab7ad1fd
-
SSDEEP
6144:3ycZLC8LC3A14AwKnyWXNvJaayuLnvYm:3yY1LC3AFwKykbR9
Malware Config
Extracted
amadey
3.50
193.56.146.194/h49vlBP/index.php
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
rovwer.exepid process 520 rovwer.exe -
Loads dropped DLL 2 IoCs
Processes:
1e3386190d8323958a031a015f563ba3b99b4b57c7cdbc995a50d6bf56005d62.exepid process 1660 1e3386190d8323958a031a015f563ba3b99b4b57c7cdbc995a50d6bf56005d62.exe 1660 1e3386190d8323958a031a015f563ba3b99b4b57c7cdbc995a50d6bf56005d62.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
1e3386190d8323958a031a015f563ba3b99b4b57c7cdbc995a50d6bf56005d62.exerovwer.exedescription pid process target process PID 1660 wrote to memory of 520 1660 1e3386190d8323958a031a015f563ba3b99b4b57c7cdbc995a50d6bf56005d62.exe rovwer.exe PID 1660 wrote to memory of 520 1660 1e3386190d8323958a031a015f563ba3b99b4b57c7cdbc995a50d6bf56005d62.exe rovwer.exe PID 1660 wrote to memory of 520 1660 1e3386190d8323958a031a015f563ba3b99b4b57c7cdbc995a50d6bf56005d62.exe rovwer.exe PID 1660 wrote to memory of 520 1660 1e3386190d8323958a031a015f563ba3b99b4b57c7cdbc995a50d6bf56005d62.exe rovwer.exe PID 520 wrote to memory of 1272 520 rovwer.exe schtasks.exe PID 520 wrote to memory of 1272 520 rovwer.exe schtasks.exe PID 520 wrote to memory of 1272 520 rovwer.exe schtasks.exe PID 520 wrote to memory of 1272 520 rovwer.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e3386190d8323958a031a015f563ba3b99b4b57c7cdbc995a50d6bf56005d62.exe"C:\Users\Admin\AppData\Local\Temp\1e3386190d8323958a031a015f563ba3b99b4b57c7cdbc995a50d6bf56005d62.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe" /F3⤵
- Creates scheduled task(s)
PID:1272
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5ee1e865bb346ca034571540c7f7a985b
SHA1fd9ce830e59dbf847f051ea5af5945ab2e7bc1b6
SHA2561e3386190d8323958a031a015f563ba3b99b4b57c7cdbc995a50d6bf56005d62
SHA5125beb175ae3e19a5e1bf2486b1a692e0a44daed8373b1330b642daa6b2e9d7efbd23d0746c775ea2b56aeed7483474b5f1745001e74edea41c5589c2dab7ad1fd
-
Filesize
244KB
MD5ee1e865bb346ca034571540c7f7a985b
SHA1fd9ce830e59dbf847f051ea5af5945ab2e7bc1b6
SHA2561e3386190d8323958a031a015f563ba3b99b4b57c7cdbc995a50d6bf56005d62
SHA5125beb175ae3e19a5e1bf2486b1a692e0a44daed8373b1330b642daa6b2e9d7efbd23d0746c775ea2b56aeed7483474b5f1745001e74edea41c5589c2dab7ad1fd
-
Filesize
244KB
MD5ee1e865bb346ca034571540c7f7a985b
SHA1fd9ce830e59dbf847f051ea5af5945ab2e7bc1b6
SHA2561e3386190d8323958a031a015f563ba3b99b4b57c7cdbc995a50d6bf56005d62
SHA5125beb175ae3e19a5e1bf2486b1a692e0a44daed8373b1330b642daa6b2e9d7efbd23d0746c775ea2b56aeed7483474b5f1745001e74edea41c5589c2dab7ad1fd
-
Filesize
244KB
MD5ee1e865bb346ca034571540c7f7a985b
SHA1fd9ce830e59dbf847f051ea5af5945ab2e7bc1b6
SHA2561e3386190d8323958a031a015f563ba3b99b4b57c7cdbc995a50d6bf56005d62
SHA5125beb175ae3e19a5e1bf2486b1a692e0a44daed8373b1330b642daa6b2e9d7efbd23d0746c775ea2b56aeed7483474b5f1745001e74edea41c5589c2dab7ad1fd