Analysis
-
max time kernel
194s -
max time network
209s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 17:11
Static task
static1
Behavioral task
behavioral1
Sample
3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe
Resource
win7-20221111-en
General
-
Target
3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe
-
Size
244KB
-
MD5
529dd7d863272e41eb4e8319861ac846
-
SHA1
3efb8f465ebcbfe0ea2b36aa4e0021f1c26a9a38
-
SHA256
3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7
-
SHA512
89892f6afabbd558fc84787e2f2aee93ddf048997b343150ed9e0fe8c033236d8f0ac2c167685a48fa5dd686ba2f8a1394b02a875b6e3e3b7cc31e611c16d740
-
SSDEEP
6144:wuTL+CSPjWEbvxm4XHLNOcWPfJnj7zIo3B2:wuT7SP/bvYE51WPfVjwIB2
Malware Config
Extracted
amadey
3.50
193.56.146.174/g84kvj4jck/index.php
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
rovwer.exerovwer.exerovwer.exepid process 3800 rovwer.exe 880 rovwer.exe 1620 rovwer.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exerovwer.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Control Panel\International\Geo\Nation 3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe Key value queried \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Control Panel\International\Geo\Nation rovwer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4292 3612 WerFault.exe 3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe 4480 880 WerFault.exe rovwer.exe 4340 1620 WerFault.exe rovwer.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exerovwer.execmd.exedescription pid process target process PID 3612 wrote to memory of 3800 3612 3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe rovwer.exe PID 3612 wrote to memory of 3800 3612 3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe rovwer.exe PID 3612 wrote to memory of 3800 3612 3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe rovwer.exe PID 3800 wrote to memory of 4504 3800 rovwer.exe schtasks.exe PID 3800 wrote to memory of 4504 3800 rovwer.exe schtasks.exe PID 3800 wrote to memory of 4504 3800 rovwer.exe schtasks.exe PID 3800 wrote to memory of 784 3800 rovwer.exe cmd.exe PID 3800 wrote to memory of 784 3800 rovwer.exe cmd.exe PID 3800 wrote to memory of 784 3800 rovwer.exe cmd.exe PID 784 wrote to memory of 4216 784 cmd.exe cmd.exe PID 784 wrote to memory of 4216 784 cmd.exe cmd.exe PID 784 wrote to memory of 4216 784 cmd.exe cmd.exe PID 784 wrote to memory of 3132 784 cmd.exe cacls.exe PID 784 wrote to memory of 3132 784 cmd.exe cacls.exe PID 784 wrote to memory of 3132 784 cmd.exe cacls.exe PID 784 wrote to memory of 4188 784 cmd.exe cacls.exe PID 784 wrote to memory of 4188 784 cmd.exe cacls.exe PID 784 wrote to memory of 4188 784 cmd.exe cacls.exe PID 784 wrote to memory of 4496 784 cmd.exe cmd.exe PID 784 wrote to memory of 4496 784 cmd.exe cmd.exe PID 784 wrote to memory of 4496 784 cmd.exe cmd.exe PID 784 wrote to memory of 3792 784 cmd.exe cacls.exe PID 784 wrote to memory of 3792 784 cmd.exe cacls.exe PID 784 wrote to memory of 3792 784 cmd.exe cacls.exe PID 784 wrote to memory of 1000 784 cmd.exe cacls.exe PID 784 wrote to memory of 1000 784 cmd.exe cacls.exe PID 784 wrote to memory of 1000 784 cmd.exe cacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe"C:\Users\Admin\AppData\Local\Temp\3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe" /F3⤵
- Creates scheduled task(s)
PID:4504 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rovwer.exe" /P "Admin:N"&&CACLS "rovwer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\99e342142d" /P "Admin:N"&&CACLS "..\99e342142d" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:4216
-
C:\Windows\SysWOW64\cacls.exeCACLS "rovwer.exe" /P "Admin:N"4⤵PID:3132
-
C:\Windows\SysWOW64\cacls.exeCACLS "rovwer.exe" /P "Admin:R" /E4⤵PID:4188
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:4496
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\99e342142d" /P "Admin:N"4⤵PID:3792
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\99e342142d" /P "Admin:R" /E4⤵PID:1000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3612 -s 8882⤵
- Program crash
PID:4292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3612 -ip 36121⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe1⤵
- Executes dropped EXE
PID:880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 880 -s 4162⤵
- Program crash
PID:4480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 880 -ip 8801⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe1⤵
- Executes dropped EXE
PID:1620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1620 -s 4162⤵
- Program crash
PID:4340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1620 -ip 16201⤵PID:3932
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5529dd7d863272e41eb4e8319861ac846
SHA13efb8f465ebcbfe0ea2b36aa4e0021f1c26a9a38
SHA2563cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7
SHA51289892f6afabbd558fc84787e2f2aee93ddf048997b343150ed9e0fe8c033236d8f0ac2c167685a48fa5dd686ba2f8a1394b02a875b6e3e3b7cc31e611c16d740
-
Filesize
244KB
MD5529dd7d863272e41eb4e8319861ac846
SHA13efb8f465ebcbfe0ea2b36aa4e0021f1c26a9a38
SHA2563cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7
SHA51289892f6afabbd558fc84787e2f2aee93ddf048997b343150ed9e0fe8c033236d8f0ac2c167685a48fa5dd686ba2f8a1394b02a875b6e3e3b7cc31e611c16d740
-
Filesize
244KB
MD5529dd7d863272e41eb4e8319861ac846
SHA13efb8f465ebcbfe0ea2b36aa4e0021f1c26a9a38
SHA2563cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7
SHA51289892f6afabbd558fc84787e2f2aee93ddf048997b343150ed9e0fe8c033236d8f0ac2c167685a48fa5dd686ba2f8a1394b02a875b6e3e3b7cc31e611c16d740
-
Filesize
244KB
MD5529dd7d863272e41eb4e8319861ac846
SHA13efb8f465ebcbfe0ea2b36aa4e0021f1c26a9a38
SHA2563cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7
SHA51289892f6afabbd558fc84787e2f2aee93ddf048997b343150ed9e0fe8c033236d8f0ac2c167685a48fa5dd686ba2f8a1394b02a875b6e3e3b7cc31e611c16d740