Analysis
-
max time kernel
151s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 21:25
Static task
static1
Behavioral task
behavioral1
Sample
470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e.exe
Resource
win7-20221111-en
General
-
Target
470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e.exe
-
Size
244KB
-
MD5
0906eebf6f5fd1f9029e4bc6f81a636d
-
SHA1
938df93f0f7ebb8f31a2d2e57c2447d17a0737b8
-
SHA256
470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e
-
SHA512
dad5fbcb96ebfb5c29d3fc3f46528ad46dce70acd67ee257b288ad58224117f90919ebce2693b4df9db7ba86f79fa417ff6b6b21c27a837e4d36d7c2b8ef7af6
-
SSDEEP
6144:wuh1kLkzOqq8CW1V8Hcc9JOkbztWp4vW677CNZwVLL:wuh1kxqq8HrIDvHfCNW
Malware Config
Extracted
amadey
3.50
193.56.146.174/g84kvj4jck/index.php
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
rovwer.exerovwer.exerovwer.exerovwer.exepid process 4688 rovwer.exe 4200 rovwer.exe 1992 rovwer.exe 2612 rovwer.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e.exerovwer.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation rovwer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4332 3540 WerFault.exe 470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e.exe 2024 4200 WerFault.exe rovwer.exe 4592 1992 WerFault.exe rovwer.exe 2692 2612 WerFault.exe rovwer.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e.exerovwer.execmd.exedescription pid process target process PID 3540 wrote to memory of 4688 3540 470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e.exe rovwer.exe PID 3540 wrote to memory of 4688 3540 470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e.exe rovwer.exe PID 3540 wrote to memory of 4688 3540 470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e.exe rovwer.exe PID 4688 wrote to memory of 4524 4688 rovwer.exe schtasks.exe PID 4688 wrote to memory of 4524 4688 rovwer.exe schtasks.exe PID 4688 wrote to memory of 4524 4688 rovwer.exe schtasks.exe PID 4688 wrote to memory of 4284 4688 rovwer.exe cmd.exe PID 4688 wrote to memory of 4284 4688 rovwer.exe cmd.exe PID 4688 wrote to memory of 4284 4688 rovwer.exe cmd.exe PID 4284 wrote to memory of 2488 4284 cmd.exe cmd.exe PID 4284 wrote to memory of 2488 4284 cmd.exe cmd.exe PID 4284 wrote to memory of 2488 4284 cmd.exe cmd.exe PID 4284 wrote to memory of 1256 4284 cmd.exe cacls.exe PID 4284 wrote to memory of 1256 4284 cmd.exe cacls.exe PID 4284 wrote to memory of 1256 4284 cmd.exe cacls.exe PID 4284 wrote to memory of 1556 4284 cmd.exe cacls.exe PID 4284 wrote to memory of 1556 4284 cmd.exe cacls.exe PID 4284 wrote to memory of 1556 4284 cmd.exe cacls.exe PID 4284 wrote to memory of 2296 4284 cmd.exe cmd.exe PID 4284 wrote to memory of 2296 4284 cmd.exe cmd.exe PID 4284 wrote to memory of 2296 4284 cmd.exe cmd.exe PID 4284 wrote to memory of 892 4284 cmd.exe cacls.exe PID 4284 wrote to memory of 892 4284 cmd.exe cacls.exe PID 4284 wrote to memory of 892 4284 cmd.exe cacls.exe PID 4284 wrote to memory of 2600 4284 cmd.exe cacls.exe PID 4284 wrote to memory of 2600 4284 cmd.exe cacls.exe PID 4284 wrote to memory of 2600 4284 cmd.exe cacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e.exe"C:\Users\Admin\AppData\Local\Temp\470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe" /F3⤵
- Creates scheduled task(s)
PID:4524 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rovwer.exe" /P "Admin:N"&&CACLS "rovwer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\99e342142d" /P "Admin:N"&&CACLS "..\99e342142d" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2488
-
C:\Windows\SysWOW64\cacls.exeCACLS "rovwer.exe" /P "Admin:N"4⤵PID:1256
-
C:\Windows\SysWOW64\cacls.exeCACLS "rovwer.exe" /P "Admin:R" /E4⤵PID:1556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2296
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\99e342142d" /P "Admin:N"4⤵PID:892
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\99e342142d" /P "Admin:R" /E4⤵PID:2600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3540 -s 12162⤵
- Program crash
PID:4332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3540 -ip 35401⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe1⤵
- Executes dropped EXE
PID:4200 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 4162⤵
- Program crash
PID:2024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4200 -ip 42001⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe1⤵
- Executes dropped EXE
PID:1992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1992 -s 4162⤵
- Program crash
PID:4592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1992 -ip 19921⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe1⤵
- Executes dropped EXE
PID:2612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 4162⤵
- Program crash
PID:2692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2612 -ip 26121⤵PID:4884
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD50906eebf6f5fd1f9029e4bc6f81a636d
SHA1938df93f0f7ebb8f31a2d2e57c2447d17a0737b8
SHA256470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e
SHA512dad5fbcb96ebfb5c29d3fc3f46528ad46dce70acd67ee257b288ad58224117f90919ebce2693b4df9db7ba86f79fa417ff6b6b21c27a837e4d36d7c2b8ef7af6
-
Filesize
244KB
MD50906eebf6f5fd1f9029e4bc6f81a636d
SHA1938df93f0f7ebb8f31a2d2e57c2447d17a0737b8
SHA256470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e
SHA512dad5fbcb96ebfb5c29d3fc3f46528ad46dce70acd67ee257b288ad58224117f90919ebce2693b4df9db7ba86f79fa417ff6b6b21c27a837e4d36d7c2b8ef7af6
-
Filesize
244KB
MD50906eebf6f5fd1f9029e4bc6f81a636d
SHA1938df93f0f7ebb8f31a2d2e57c2447d17a0737b8
SHA256470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e
SHA512dad5fbcb96ebfb5c29d3fc3f46528ad46dce70acd67ee257b288ad58224117f90919ebce2693b4df9db7ba86f79fa417ff6b6b21c27a837e4d36d7c2b8ef7af6
-
Filesize
244KB
MD50906eebf6f5fd1f9029e4bc6f81a636d
SHA1938df93f0f7ebb8f31a2d2e57c2447d17a0737b8
SHA256470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e
SHA512dad5fbcb96ebfb5c29d3fc3f46528ad46dce70acd67ee257b288ad58224117f90919ebce2693b4df9db7ba86f79fa417ff6b6b21c27a837e4d36d7c2b8ef7af6
-
Filesize
244KB
MD50906eebf6f5fd1f9029e4bc6f81a636d
SHA1938df93f0f7ebb8f31a2d2e57c2447d17a0737b8
SHA256470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e
SHA512dad5fbcb96ebfb5c29d3fc3f46528ad46dce70acd67ee257b288ad58224117f90919ebce2693b4df9db7ba86f79fa417ff6b6b21c27a837e4d36d7c2b8ef7af6