Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 16:52
Static task
static1
Behavioral task
behavioral1
Sample
3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe
Resource
win7-20221111-en
General
-
Target
3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe
-
Size
244KB
-
MD5
529dd7d863272e41eb4e8319861ac846
-
SHA1
3efb8f465ebcbfe0ea2b36aa4e0021f1c26a9a38
-
SHA256
3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7
-
SHA512
89892f6afabbd558fc84787e2f2aee93ddf048997b343150ed9e0fe8c033236d8f0ac2c167685a48fa5dd686ba2f8a1394b02a875b6e3e3b7cc31e611c16d740
-
SSDEEP
6144:wuTL+CSPjWEbvxm4XHLNOcWPfJnj7zIo3B2:wuT7SP/bvYE51WPfVjwIB2
Malware Config
Extracted
amadey
3.50
193.56.146.174/g84kvj4jck/index.php
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
rovwer.exerovwer.exerovwer.exepid process 4268 rovwer.exe 5056 rovwer.exe 4472 rovwer.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
rovwer.exe3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation rovwer.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1148 892 WerFault.exe 3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe 2292 5056 WerFault.exe rovwer.exe 2896 4472 WerFault.exe rovwer.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exerovwer.execmd.exedescription pid process target process PID 892 wrote to memory of 4268 892 3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe rovwer.exe PID 892 wrote to memory of 4268 892 3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe rovwer.exe PID 892 wrote to memory of 4268 892 3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe rovwer.exe PID 4268 wrote to memory of 4772 4268 rovwer.exe schtasks.exe PID 4268 wrote to memory of 4772 4268 rovwer.exe schtasks.exe PID 4268 wrote to memory of 4772 4268 rovwer.exe schtasks.exe PID 4268 wrote to memory of 4464 4268 rovwer.exe cmd.exe PID 4268 wrote to memory of 4464 4268 rovwer.exe cmd.exe PID 4268 wrote to memory of 4464 4268 rovwer.exe cmd.exe PID 4464 wrote to memory of 2184 4464 cmd.exe cmd.exe PID 4464 wrote to memory of 2184 4464 cmd.exe cmd.exe PID 4464 wrote to memory of 2184 4464 cmd.exe cmd.exe PID 4464 wrote to memory of 3624 4464 cmd.exe cacls.exe PID 4464 wrote to memory of 3624 4464 cmd.exe cacls.exe PID 4464 wrote to memory of 3624 4464 cmd.exe cacls.exe PID 4464 wrote to memory of 4336 4464 cmd.exe cacls.exe PID 4464 wrote to memory of 4336 4464 cmd.exe cacls.exe PID 4464 wrote to memory of 4336 4464 cmd.exe cacls.exe PID 4464 wrote to memory of 3480 4464 cmd.exe cmd.exe PID 4464 wrote to memory of 3480 4464 cmd.exe cmd.exe PID 4464 wrote to memory of 3480 4464 cmd.exe cmd.exe PID 4464 wrote to memory of 4512 4464 cmd.exe cacls.exe PID 4464 wrote to memory of 4512 4464 cmd.exe cacls.exe PID 4464 wrote to memory of 4512 4464 cmd.exe cacls.exe PID 4464 wrote to memory of 3476 4464 cmd.exe cacls.exe PID 4464 wrote to memory of 3476 4464 cmd.exe cacls.exe PID 4464 wrote to memory of 3476 4464 cmd.exe cacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe"C:\Users\Admin\AppData\Local\Temp\3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe" /F3⤵
- Creates scheduled task(s)
PID:4772
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rovwer.exe" /P "Admin:N"&&CACLS "rovwer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\99e342142d" /P "Admin:N"&&CACLS "..\99e342142d" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2184
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rovwer.exe" /P "Admin:N"4⤵PID:3624
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rovwer.exe" /P "Admin:R" /E4⤵PID:4336
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:3480
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\99e342142d" /P "Admin:N"4⤵PID:4512
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\99e342142d" /P "Admin:R" /E4⤵PID:3476
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 12522⤵
- Program crash
PID:1148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 892 -ip 8921⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe1⤵
- Executes dropped EXE
PID:5056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 4162⤵
- Program crash
PID:2292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 5056 -ip 50561⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe1⤵
- Executes dropped EXE
PID:4472 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 3082⤵
- Program crash
PID:2896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4472 -ip 44721⤵PID:1636
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5529dd7d863272e41eb4e8319861ac846
SHA13efb8f465ebcbfe0ea2b36aa4e0021f1c26a9a38
SHA2563cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7
SHA51289892f6afabbd558fc84787e2f2aee93ddf048997b343150ed9e0fe8c033236d8f0ac2c167685a48fa5dd686ba2f8a1394b02a875b6e3e3b7cc31e611c16d740
-
Filesize
244KB
MD5529dd7d863272e41eb4e8319861ac846
SHA13efb8f465ebcbfe0ea2b36aa4e0021f1c26a9a38
SHA2563cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7
SHA51289892f6afabbd558fc84787e2f2aee93ddf048997b343150ed9e0fe8c033236d8f0ac2c167685a48fa5dd686ba2f8a1394b02a875b6e3e3b7cc31e611c16d740
-
Filesize
244KB
MD5529dd7d863272e41eb4e8319861ac846
SHA13efb8f465ebcbfe0ea2b36aa4e0021f1c26a9a38
SHA2563cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7
SHA51289892f6afabbd558fc84787e2f2aee93ddf048997b343150ed9e0fe8c033236d8f0ac2c167685a48fa5dd686ba2f8a1394b02a875b6e3e3b7cc31e611c16d740
-
Filesize
244KB
MD5529dd7d863272e41eb4e8319861ac846
SHA13efb8f465ebcbfe0ea2b36aa4e0021f1c26a9a38
SHA2563cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7
SHA51289892f6afabbd558fc84787e2f2aee93ddf048997b343150ed9e0fe8c033236d8f0ac2c167685a48fa5dd686ba2f8a1394b02a875b6e3e3b7cc31e611c16d740