Analysis
-
max time kernel
191s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 20:34
Static task
static1
Behavioral task
behavioral1
Sample
3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe
Resource
win7-20221111-en
General
-
Target
3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe
-
Size
244KB
-
MD5
529dd7d863272e41eb4e8319861ac846
-
SHA1
3efb8f465ebcbfe0ea2b36aa4e0021f1c26a9a38
-
SHA256
3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7
-
SHA512
89892f6afabbd558fc84787e2f2aee93ddf048997b343150ed9e0fe8c033236d8f0ac2c167685a48fa5dd686ba2f8a1394b02a875b6e3e3b7cc31e611c16d740
-
SSDEEP
6144:wuTL+CSPjWEbvxm4XHLNOcWPfJnj7zIo3B2:wuT7SP/bvYE51WPfVjwIB2
Malware Config
Extracted
amadey
3.50
193.56.146.174/g84kvj4jck/index.php
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
rovwer.exerovwer.exerovwer.exepid process 3648 rovwer.exe 1404 rovwer.exe 5048 rovwer.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exerovwer.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation rovwer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4476 1768 WerFault.exe 3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe 2876 1404 WerFault.exe rovwer.exe 1084 5048 WerFault.exe rovwer.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exerovwer.execmd.exedescription pid process target process PID 1768 wrote to memory of 3648 1768 3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe rovwer.exe PID 1768 wrote to memory of 3648 1768 3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe rovwer.exe PID 1768 wrote to memory of 3648 1768 3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe rovwer.exe PID 3648 wrote to memory of 2708 3648 rovwer.exe schtasks.exe PID 3648 wrote to memory of 2708 3648 rovwer.exe schtasks.exe PID 3648 wrote to memory of 2708 3648 rovwer.exe schtasks.exe PID 3648 wrote to memory of 4308 3648 rovwer.exe cmd.exe PID 3648 wrote to memory of 4308 3648 rovwer.exe cmd.exe PID 3648 wrote to memory of 4308 3648 rovwer.exe cmd.exe PID 4308 wrote to memory of 1112 4308 cmd.exe cmd.exe PID 4308 wrote to memory of 1112 4308 cmd.exe cmd.exe PID 4308 wrote to memory of 1112 4308 cmd.exe cmd.exe PID 4308 wrote to memory of 3580 4308 cmd.exe cacls.exe PID 4308 wrote to memory of 3580 4308 cmd.exe cacls.exe PID 4308 wrote to memory of 3580 4308 cmd.exe cacls.exe PID 4308 wrote to memory of 4688 4308 cmd.exe cacls.exe PID 4308 wrote to memory of 4688 4308 cmd.exe cacls.exe PID 4308 wrote to memory of 4688 4308 cmd.exe cacls.exe PID 4308 wrote to memory of 2432 4308 cmd.exe cmd.exe PID 4308 wrote to memory of 2432 4308 cmd.exe cmd.exe PID 4308 wrote to memory of 2432 4308 cmd.exe cmd.exe PID 4308 wrote to memory of 1704 4308 cmd.exe cacls.exe PID 4308 wrote to memory of 1704 4308 cmd.exe cacls.exe PID 4308 wrote to memory of 1704 4308 cmd.exe cacls.exe PID 4308 wrote to memory of 4572 4308 cmd.exe cacls.exe PID 4308 wrote to memory of 4572 4308 cmd.exe cacls.exe PID 4308 wrote to memory of 4572 4308 cmd.exe cacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe"C:\Users\Admin\AppData\Local\Temp\3cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe" /F3⤵
- Creates scheduled task(s)
PID:2708
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rovwer.exe" /P "Admin:N"&&CACLS "rovwer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\99e342142d" /P "Admin:N"&&CACLS "..\99e342142d" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1112
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rovwer.exe" /P "Admin:N"4⤵PID:3580
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rovwer.exe" /P "Admin:R" /E4⤵PID:4688
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2432
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\99e342142d" /P "Admin:N"4⤵PID:1704
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\99e342142d" /P "Admin:R" /E4⤵PID:4572
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 11402⤵
- Program crash
PID:4476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1768 -ip 17681⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe1⤵
- Executes dropped EXE
PID:1404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1404 -s 4162⤵
- Program crash
PID:2876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1404 -ip 14041⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe1⤵
- Executes dropped EXE
PID:5048 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5048 -s 4242⤵
- Program crash
PID:1084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 5048 -ip 50481⤵PID:3684
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5529dd7d863272e41eb4e8319861ac846
SHA13efb8f465ebcbfe0ea2b36aa4e0021f1c26a9a38
SHA2563cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7
SHA51289892f6afabbd558fc84787e2f2aee93ddf048997b343150ed9e0fe8c033236d8f0ac2c167685a48fa5dd686ba2f8a1394b02a875b6e3e3b7cc31e611c16d740
-
Filesize
244KB
MD5529dd7d863272e41eb4e8319861ac846
SHA13efb8f465ebcbfe0ea2b36aa4e0021f1c26a9a38
SHA2563cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7
SHA51289892f6afabbd558fc84787e2f2aee93ddf048997b343150ed9e0fe8c033236d8f0ac2c167685a48fa5dd686ba2f8a1394b02a875b6e3e3b7cc31e611c16d740
-
Filesize
244KB
MD5529dd7d863272e41eb4e8319861ac846
SHA13efb8f465ebcbfe0ea2b36aa4e0021f1c26a9a38
SHA2563cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7
SHA51289892f6afabbd558fc84787e2f2aee93ddf048997b343150ed9e0fe8c033236d8f0ac2c167685a48fa5dd686ba2f8a1394b02a875b6e3e3b7cc31e611c16d740
-
Filesize
244KB
MD5529dd7d863272e41eb4e8319861ac846
SHA13efb8f465ebcbfe0ea2b36aa4e0021f1c26a9a38
SHA2563cf6f5f638bb25f273f23bfd61f6e421a840be57d0f9f7507613615761f10ba7
SHA51289892f6afabbd558fc84787e2f2aee93ddf048997b343150ed9e0fe8c033236d8f0ac2c167685a48fa5dd686ba2f8a1394b02a875b6e3e3b7cc31e611c16d740