Analysis
-
max time kernel
292s -
max time network
336s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 16:54
Static task
static1
Behavioral task
behavioral1
Sample
d8eaf76f6b75f4b4b7a38712ad9a4174.exe
Resource
win7-20221111-en
General
-
Target
d8eaf76f6b75f4b4b7a38712ad9a4174.exe
-
Size
232KB
-
MD5
d8eaf76f6b75f4b4b7a38712ad9a4174
-
SHA1
aa74ec9a6f5c543b5464359a6244d14048d83405
-
SHA256
48c1869ef95bc7164e5e185ea4c4124ee90d7bddbb6326b37718dc59a84042b1
-
SHA512
880abb93dcb9df0a6e23b6c8f78e1848f3ad94ff0fb592eaba57ebf53d0f238a12af272c9eaa5c0c57a6d0b5960317ada63b95d3a00d41154b1f872a4f2220f5
-
SSDEEP
3072:jR/lxNqg0bujxHo5+KaAcLfbFHc6d17vFdf70pb4nIFr2cTjno8JiXTkt7H:9syN/Hld17vFdf7Isq2gjo4iGH
Malware Config
Extracted
amadey
3.50
193.56.146.194/h49vlBP/index.php
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
rovwer.exepid process 4172 rovwer.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
d8eaf76f6b75f4b4b7a38712ad9a4174.exerovwer.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation d8eaf76f6b75f4b4b7a38712ad9a4174.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation rovwer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3680 3204 WerFault.exe d8eaf76f6b75f4b4b7a38712ad9a4174.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
d8eaf76f6b75f4b4b7a38712ad9a4174.exerovwer.exedescription pid process target process PID 3204 wrote to memory of 4172 3204 d8eaf76f6b75f4b4b7a38712ad9a4174.exe rovwer.exe PID 3204 wrote to memory of 4172 3204 d8eaf76f6b75f4b4b7a38712ad9a4174.exe rovwer.exe PID 3204 wrote to memory of 4172 3204 d8eaf76f6b75f4b4b7a38712ad9a4174.exe rovwer.exe PID 4172 wrote to memory of 3632 4172 rovwer.exe schtasks.exe PID 4172 wrote to memory of 3632 4172 rovwer.exe schtasks.exe PID 4172 wrote to memory of 3632 4172 rovwer.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d8eaf76f6b75f4b4b7a38712ad9a4174.exe"C:\Users\Admin\AppData\Local\Temp\d8eaf76f6b75f4b4b7a38712ad9a4174.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe" /F3⤵
- Creates scheduled task(s)
PID:3632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3204 -s 8962⤵
- Program crash
PID:3680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3204 -ip 32041⤵PID:4188
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD5d8eaf76f6b75f4b4b7a38712ad9a4174
SHA1aa74ec9a6f5c543b5464359a6244d14048d83405
SHA25648c1869ef95bc7164e5e185ea4c4124ee90d7bddbb6326b37718dc59a84042b1
SHA512880abb93dcb9df0a6e23b6c8f78e1848f3ad94ff0fb592eaba57ebf53d0f238a12af272c9eaa5c0c57a6d0b5960317ada63b95d3a00d41154b1f872a4f2220f5
-
Filesize
232KB
MD5d8eaf76f6b75f4b4b7a38712ad9a4174
SHA1aa74ec9a6f5c543b5464359a6244d14048d83405
SHA25648c1869ef95bc7164e5e185ea4c4124ee90d7bddbb6326b37718dc59a84042b1
SHA512880abb93dcb9df0a6e23b6c8f78e1848f3ad94ff0fb592eaba57ebf53d0f238a12af272c9eaa5c0c57a6d0b5960317ada63b95d3a00d41154b1f872a4f2220f5