Analysis
-
max time kernel
178s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 00:44
Static task
static1
Behavioral task
behavioral1
Sample
cc6573c4ad6f0700c00a02ed4bc305107eecd995f1612be99f07f318017efec8.exe
Resource
win7-20221111-en
General
-
Target
cc6573c4ad6f0700c00a02ed4bc305107eecd995f1612be99f07f318017efec8.exe
-
Size
226KB
-
MD5
cdd4c17bc79e0e111d637b515d7b20df
-
SHA1
6b644f1606f5a2af380ca1dc720c7eb2fd21b1fc
-
SHA256
cc6573c4ad6f0700c00a02ed4bc305107eecd995f1612be99f07f318017efec8
-
SHA512
d7f4ffad5cca735d073e0b4dff54635a62170015a109e18ff227f864654d9f0c7fed76ed3019fd1badc7eedd9046b9bc526d96a20c554e5f6e2480d886eb31ed
-
SSDEEP
6144:gpKes0N5fHjkaBQXjwwyJ4jmuv7nM12pzn:Xes0NtjNBNL4jV7n5
Malware Config
Extracted
amadey
3.50
193.56.146.194/h49vlBP/index.php
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
rovwer.exerovwer.exerovwer.exepid process 3660 rovwer.exe 4264 rovwer.exe 1336 rovwer.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cc6573c4ad6f0700c00a02ed4bc305107eecd995f1612be99f07f318017efec8.exerovwer.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation cc6573c4ad6f0700c00a02ed4bc305107eecd995f1612be99f07f318017efec8.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation rovwer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 528 4808 WerFault.exe cc6573c4ad6f0700c00a02ed4bc305107eecd995f1612be99f07f318017efec8.exe 388 4264 WerFault.exe rovwer.exe 1128 1336 WerFault.exe rovwer.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cc6573c4ad6f0700c00a02ed4bc305107eecd995f1612be99f07f318017efec8.exerovwer.exedescription pid process target process PID 4808 wrote to memory of 3660 4808 cc6573c4ad6f0700c00a02ed4bc305107eecd995f1612be99f07f318017efec8.exe rovwer.exe PID 4808 wrote to memory of 3660 4808 cc6573c4ad6f0700c00a02ed4bc305107eecd995f1612be99f07f318017efec8.exe rovwer.exe PID 4808 wrote to memory of 3660 4808 cc6573c4ad6f0700c00a02ed4bc305107eecd995f1612be99f07f318017efec8.exe rovwer.exe PID 3660 wrote to memory of 3736 3660 rovwer.exe schtasks.exe PID 3660 wrote to memory of 3736 3660 rovwer.exe schtasks.exe PID 3660 wrote to memory of 3736 3660 rovwer.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc6573c4ad6f0700c00a02ed4bc305107eecd995f1612be99f07f318017efec8.exe"C:\Users\Admin\AppData\Local\Temp\cc6573c4ad6f0700c00a02ed4bc305107eecd995f1612be99f07f318017efec8.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe" /F3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 12682⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4808 -ip 48081⤵
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 4242⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4264 -ip 42641⤵
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 4162⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1336 -ip 13361⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeFilesize
226KB
MD5cdd4c17bc79e0e111d637b515d7b20df
SHA16b644f1606f5a2af380ca1dc720c7eb2fd21b1fc
SHA256cc6573c4ad6f0700c00a02ed4bc305107eecd995f1612be99f07f318017efec8
SHA512d7f4ffad5cca735d073e0b4dff54635a62170015a109e18ff227f864654d9f0c7fed76ed3019fd1badc7eedd9046b9bc526d96a20c554e5f6e2480d886eb31ed
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeFilesize
226KB
MD5cdd4c17bc79e0e111d637b515d7b20df
SHA16b644f1606f5a2af380ca1dc720c7eb2fd21b1fc
SHA256cc6573c4ad6f0700c00a02ed4bc305107eecd995f1612be99f07f318017efec8
SHA512d7f4ffad5cca735d073e0b4dff54635a62170015a109e18ff227f864654d9f0c7fed76ed3019fd1badc7eedd9046b9bc526d96a20c554e5f6e2480d886eb31ed
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeFilesize
226KB
MD5cdd4c17bc79e0e111d637b515d7b20df
SHA16b644f1606f5a2af380ca1dc720c7eb2fd21b1fc
SHA256cc6573c4ad6f0700c00a02ed4bc305107eecd995f1612be99f07f318017efec8
SHA512d7f4ffad5cca735d073e0b4dff54635a62170015a109e18ff227f864654d9f0c7fed76ed3019fd1badc7eedd9046b9bc526d96a20c554e5f6e2480d886eb31ed
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeFilesize
226KB
MD5cdd4c17bc79e0e111d637b515d7b20df
SHA16b644f1606f5a2af380ca1dc720c7eb2fd21b1fc
SHA256cc6573c4ad6f0700c00a02ed4bc305107eecd995f1612be99f07f318017efec8
SHA512d7f4ffad5cca735d073e0b4dff54635a62170015a109e18ff227f864654d9f0c7fed76ed3019fd1badc7eedd9046b9bc526d96a20c554e5f6e2480d886eb31ed
-
memory/1336-149-0x0000000000400000-0x000000000071A000-memory.dmpFilesize
3.1MB
-
memory/1336-148-0x00000000009D0000-0x00000000009EF000-memory.dmpFilesize
124KB
-
memory/3660-138-0x00000000007BC000-0x00000000007DB000-memory.dmpFilesize
124KB
-
memory/3660-139-0x0000000002290000-0x00000000022CE000-memory.dmpFilesize
248KB
-
memory/3660-140-0x0000000000400000-0x000000000071A000-memory.dmpFilesize
3.1MB
-
memory/3660-135-0x0000000000000000-mapping.dmp
-
memory/3736-143-0x0000000000000000-mapping.dmp
-
memory/4264-145-0x0000000000940000-0x000000000095F000-memory.dmpFilesize
124KB
-
memory/4264-146-0x0000000000400000-0x000000000071A000-memory.dmpFilesize
3.1MB
-
memory/4808-141-0x00000000008FE000-0x000000000091D000-memory.dmpFilesize
124KB
-
memory/4808-132-0x00000000008FE000-0x000000000091D000-memory.dmpFilesize
124KB
-
memory/4808-142-0x0000000000400000-0x000000000071A000-memory.dmpFilesize
3.1MB
-
memory/4808-133-0x0000000002480000-0x00000000024BE000-memory.dmpFilesize
248KB
-
memory/4808-134-0x0000000000400000-0x000000000071A000-memory.dmpFilesize
3.1MB