Analysis
-
max time kernel
285s -
max time network
309s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 16:55
Static task
static1
Behavioral task
behavioral1
Sample
b656d2dfb1646d77a60799c56814a7d6.exe
Resource
win7-20220812-en
General
-
Target
b656d2dfb1646d77a60799c56814a7d6.exe
-
Size
247KB
-
MD5
b656d2dfb1646d77a60799c56814a7d6
-
SHA1
1364be44ee074ffbec0b0c992a917920c580f948
-
SHA256
54eac531f0ca8495f2c3ddbb73e29280200a6635c0b35ca094e65b48a6cffe64
-
SHA512
c3d72adbccd49f3dc3c32a2c2dd281acfcf1af68fdcc4f3ed4920d64d6250ea0f001e5ba64f1c776d483b109d20c6ab1ffa8f8ac64ef335433cd03b922ecbdc1
-
SSDEEP
3072:zg3sOgVS6iOK7LaeaAVHKi5WxSCxkOWMpSmIPkfcl0oS+yzCvSgBX3XQsPR:E3LbLaeaWQxmqp7KkfcLSNCvSU3X9J
Malware Config
Extracted
amadey
3.50
193.56.146.194/h49vlBP/index.php
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
rovwer.exepid process 4360 rovwer.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
b656d2dfb1646d77a60799c56814a7d6.exerovwer.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation b656d2dfb1646d77a60799c56814a7d6.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation rovwer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3496 3792 WerFault.exe b656d2dfb1646d77a60799c56814a7d6.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
b656d2dfb1646d77a60799c56814a7d6.exerovwer.exedescription pid process target process PID 3792 wrote to memory of 4360 3792 b656d2dfb1646d77a60799c56814a7d6.exe rovwer.exe PID 3792 wrote to memory of 4360 3792 b656d2dfb1646d77a60799c56814a7d6.exe rovwer.exe PID 3792 wrote to memory of 4360 3792 b656d2dfb1646d77a60799c56814a7d6.exe rovwer.exe PID 4360 wrote to memory of 4676 4360 rovwer.exe schtasks.exe PID 4360 wrote to memory of 4676 4360 rovwer.exe schtasks.exe PID 4360 wrote to memory of 4676 4360 rovwer.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b656d2dfb1646d77a60799c56814a7d6.exe"C:\Users\Admin\AppData\Local\Temp\b656d2dfb1646d77a60799c56814a7d6.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe" /F3⤵
- Creates scheduled task(s)
PID:4676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 11442⤵
- Program crash
PID:3496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3792 -ip 37921⤵PID:4996
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
247KB
MD5b656d2dfb1646d77a60799c56814a7d6
SHA11364be44ee074ffbec0b0c992a917920c580f948
SHA25654eac531f0ca8495f2c3ddbb73e29280200a6635c0b35ca094e65b48a6cffe64
SHA512c3d72adbccd49f3dc3c32a2c2dd281acfcf1af68fdcc4f3ed4920d64d6250ea0f001e5ba64f1c776d483b109d20c6ab1ffa8f8ac64ef335433cd03b922ecbdc1
-
Filesize
247KB
MD5b656d2dfb1646d77a60799c56814a7d6
SHA11364be44ee074ffbec0b0c992a917920c580f948
SHA25654eac531f0ca8495f2c3ddbb73e29280200a6635c0b35ca094e65b48a6cffe64
SHA512c3d72adbccd49f3dc3c32a2c2dd281acfcf1af68fdcc4f3ed4920d64d6250ea0f001e5ba64f1c776d483b109d20c6ab1ffa8f8ac64ef335433cd03b922ecbdc1