Analysis
-
max time kernel
187s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 11:42
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
General
-
Target
file.exe
-
Size
205KB
-
MD5
329efa3db8a908218487fc3607b73df6
-
SHA1
72a8b995f97eab399ccb22601fb3cf6df57e8a3b
-
SHA256
ac1b14a61b42f49c95ef6e893877bec973d3108d827535ab4885b051e9fed090
-
SHA512
058d418bab2b27612d840b52a1746ec88477326c02aeeeb200e40568a2e400219bf0ad42c9adeed8426dd55104843894699ee7e0d46a0417a978b4d5c1257e9a
-
SSDEEP
3072:j5DwZqXmYh5wI1vmnN4zgQB8XnlWOi5tYPh65pYQ1:JyqXmPI1v8IBBQlDi5gYT
Malware Config
Extracted
amadey
3.50
31.41.244.17/hfk3vK9/index.php
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
gntuud.exegntuud.exegntuud.exepid process 3684 gntuud.exe 4904 gntuud.exe 2612 gntuud.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
file.exegntuud.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation gntuud.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 380 2972 WerFault.exe file.exe 1500 4904 WerFault.exe gntuud.exe 3064 2612 WerFault.exe gntuud.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
file.exegntuud.exedescription pid process target process PID 2972 wrote to memory of 3684 2972 file.exe gntuud.exe PID 2972 wrote to memory of 3684 2972 file.exe gntuud.exe PID 2972 wrote to memory of 3684 2972 file.exe gntuud.exe PID 3684 wrote to memory of 372 3684 gntuud.exe schtasks.exe PID 3684 wrote to memory of 372 3684 gntuud.exe schtasks.exe PID 3684 wrote to memory of 372 3684 gntuud.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe" /F3⤵
- Creates scheduled task(s)
PID:372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 12642⤵
- Program crash
PID:380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2972 -ip 29721⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exeC:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe1⤵
- Executes dropped EXE
PID:4904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4904 -s 4162⤵
- Program crash
PID:1500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4904 -ip 49041⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exeC:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe1⤵
- Executes dropped EXE
PID:2612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 4202⤵
- Program crash
PID:3064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2612 -ip 26121⤵PID:4064
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD5329efa3db8a908218487fc3607b73df6
SHA172a8b995f97eab399ccb22601fb3cf6df57e8a3b
SHA256ac1b14a61b42f49c95ef6e893877bec973d3108d827535ab4885b051e9fed090
SHA512058d418bab2b27612d840b52a1746ec88477326c02aeeeb200e40568a2e400219bf0ad42c9adeed8426dd55104843894699ee7e0d46a0417a978b4d5c1257e9a
-
Filesize
205KB
MD5329efa3db8a908218487fc3607b73df6
SHA172a8b995f97eab399ccb22601fb3cf6df57e8a3b
SHA256ac1b14a61b42f49c95ef6e893877bec973d3108d827535ab4885b051e9fed090
SHA512058d418bab2b27612d840b52a1746ec88477326c02aeeeb200e40568a2e400219bf0ad42c9adeed8426dd55104843894699ee7e0d46a0417a978b4d5c1257e9a
-
Filesize
205KB
MD5329efa3db8a908218487fc3607b73df6
SHA172a8b995f97eab399ccb22601fb3cf6df57e8a3b
SHA256ac1b14a61b42f49c95ef6e893877bec973d3108d827535ab4885b051e9fed090
SHA512058d418bab2b27612d840b52a1746ec88477326c02aeeeb200e40568a2e400219bf0ad42c9adeed8426dd55104843894699ee7e0d46a0417a978b4d5c1257e9a
-
Filesize
205KB
MD5329efa3db8a908218487fc3607b73df6
SHA172a8b995f97eab399ccb22601fb3cf6df57e8a3b
SHA256ac1b14a61b42f49c95ef6e893877bec973d3108d827535ab4885b051e9fed090
SHA512058d418bab2b27612d840b52a1746ec88477326c02aeeeb200e40568a2e400219bf0ad42c9adeed8426dd55104843894699ee7e0d46a0417a978b4d5c1257e9a