Analysis

  • max time kernel
    135s
  • max time network
    187s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 10:38

General

  • Target

    SoftwareSetupFile/SoftwareSetupFile.exe

  • Size

    555.0MB

  • MD5

    333b7deed15376b0a605c2ab033e7fda

  • SHA1

    8b38e9ee0711207d3281f0bc0e3ef1ff8c0b155c

  • SHA256

    142647df2b4e3dcf256dee7618b86a4d205bc7196147c3e6cb9b653bb00aa74f

  • SHA512

    02ede71f39dec29203ab563abc4b67f6119ec3de6287b2083ec15984f181e38ae00acd250b28f7218fd2d80b7fffd12793ae3c9ae724b5223593b87d91099787

  • SSDEEP

    98304:lp/262qMObXa0z2WLEO1gcdB9w2CAPHyVuTFz:lpFau2SE8h9nnTZ

Malware Config

Extracted

Family

amadey

Version

3.50

C2

31.41.244.158/Mb1sDv3/index.php

Extracted

Family

laplas

C2

clipper.guru

Attributes
  • api_key

    b208717c54146010ab89e628591e2a7b11493ef1c593e7b3f15b1c06b1778d59

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Laplas Clipper

    Laplas is a crypto wallet stealer with two variants written in Golang and C#.

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 23 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SoftwareSetupFile\SoftwareSetupFile.exe
    "C:\Users\Admin\AppData\Local\Temp\SoftwareSetupFile\SoftwareSetupFile.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQA1AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1356
    • C:\Users\Admin\AppData\Local\Temp\SoftwareSetupFile\SoftwareSetupFile.exe
      C:\Users\Admin\AppData\Local\Temp\SoftwareSetupFile\SoftwareSetupFile.exe
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1180
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Decoder.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Decoder.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1384
        • C:\Users\Admin\AppData\Local\Temp\f03fb0fdc0\rovwer.exe
          "C:\Users\Admin\AppData\Local\Temp\f03fb0fdc0\rovwer.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of SetThreadContext
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1952
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\f03fb0fdc0\rovwer.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:944
          • C:\Users\Admin\AppData\Local\Temp\f03fb0fdc0\rovwer.exe
            "C:\Users\Admin\AppData\Local\Temp\f03fb0fdc0\rovwer.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1940
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=rovwer.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:948
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:948 CREDAT:275457 /prefetch:2
                7⤵
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:2004
          • C:\Users\Admin\AppData\Local\Temp\1000005001\3333.exe
            "C:\Users\Admin\AppData\Local\Temp\1000005001\3333.exe"
            5⤵
            • Executes dropped EXE
            PID:1720

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\1000005001\3333.exe

          Filesize

          4.6MB

          MD5

          10c4eb50adca0b5e5c38ae0fdfa422fc

          SHA1

          204fa092bd55f6c999733807115dbc5817fd2fa8

          SHA256

          4fb85146079a6ad27e94e913e2302d6a47f8f5409f55f174aecdd8c99ab372ed

          SHA512

          552fd54a83ba2bb2b64d25890aa1336ca397669fd3dbdf8bc64a3edc2bb4e71aa4207b54b09e3ca050acaf2d4cb4b56740b22152abd047e1627874a8ec968636

        • C:\Users\Admin\AppData\Local\Temp\1000005001\3333.exe

          Filesize

          4.6MB

          MD5

          10c4eb50adca0b5e5c38ae0fdfa422fc

          SHA1

          204fa092bd55f6c999733807115dbc5817fd2fa8

          SHA256

          4fb85146079a6ad27e94e913e2302d6a47f8f5409f55f174aecdd8c99ab372ed

          SHA512

          552fd54a83ba2bb2b64d25890aa1336ca397669fd3dbdf8bc64a3edc2bb4e71aa4207b54b09e3ca050acaf2d4cb4b56740b22152abd047e1627874a8ec968636

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Decoder.exe

          Filesize

          234.4MB

          MD5

          b44f1f3dfa2a2077cc093571ab062bd1

          SHA1

          e3b6a7a3c8744ef180bf08954efe8236c81674e6

          SHA256

          d3df39ac52686a8f8ccf3efeea6be4854a36dc52623e0c10ddf7a4740b8922e1

          SHA512

          168912fb5b0fb70718e5b99f1ea68054c7aa243b4e1d2264689cbf069ea75b4202ce3beb9c5e99d0793a5a01070c978818ecd78254f9a2c6dfd227a4bbc7ba73

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Decoder.exe

          Filesize

          182.9MB

          MD5

          61ccdf1876e997f15d5df72192632c1b

          SHA1

          e8f6499a30ae7e09ee44c184a1d65d17bc6ceace

          SHA256

          83d077bce61a7e45aa260fa50c4bc46a706cf673ddb960031d06559bafc7d7b3

          SHA512

          332e653f51fec15b378bbabd908bc7b33c6424233f9c4638674cbcd6ae7906460098021f5b991056a9963159b9912d74bb77d4cc37ee77d562eb9dd6600422dc

        • C:\Users\Admin\AppData\Local\Temp\f03fb0fdc0\rovwer.exe

          Filesize

          66.2MB

          MD5

          d30baaab5fc92ccfda51c63c7179dec3

          SHA1

          5efb3b208fd0fca5067324a5b3033a7b4d3be81b

          SHA256

          2c10a088f55206c3d8fbbf8fe5fa43a03d3cc6d423f36c635a0a63cecff3ad23

          SHA512

          52b71359b8c552fd3110437a42d71ea510a4377528b5e1ea7fe50a06db793589dff73a437267795c4b9e110febc9a463947a02988dbfad41fc4f700e41f04e4a

        • C:\Users\Admin\AppData\Local\Temp\f03fb0fdc0\rovwer.exe

          Filesize

          101.1MB

          MD5

          d6b712e32696126cea099ef06bba4b2a

          SHA1

          8e029d40c0c3956c8929639889c30e7b0363ce7d

          SHA256

          c5ac44569a77760c7adfbc597a9dea2e7f142c7964d130925719bb92da915510

          SHA512

          eaa7765fe9ec5e230bc9d71e3c04946d404feb7ce8a6e13d2d0911e480381e6bf48f616b41c1a36a75ff3cf75dc17cc5bdeb91d7876c1d4400cad493c40f11de

        • C:\Users\Admin\AppData\Local\Temp\f03fb0fdc0\rovwer.exe

          Filesize

          102.1MB

          MD5

          d03a481af39a55aee22b086d3019bcae

          SHA1

          cbed7b329357dd94d47df917420d93c3756626df

          SHA256

          4c3a449c4134f50083d6b5e3474044cce4be3230ed4b49681ea116ae5a1d2b66

          SHA512

          254cfb5db81fe7c0a873ce366fca6bc01d3afc69262305e79d094a5eeddcfb83eaa105eac447fa3be61f459d6b2c68cd0a0a55dad0b97e5a5a096463c8250f74

        • \Users\Admin\AppData\Local\Temp\1000005001\3333.exe

          Filesize

          4.6MB

          MD5

          10c4eb50adca0b5e5c38ae0fdfa422fc

          SHA1

          204fa092bd55f6c999733807115dbc5817fd2fa8

          SHA256

          4fb85146079a6ad27e94e913e2302d6a47f8f5409f55f174aecdd8c99ab372ed

          SHA512

          552fd54a83ba2bb2b64d25890aa1336ca397669fd3dbdf8bc64a3edc2bb4e71aa4207b54b09e3ca050acaf2d4cb4b56740b22152abd047e1627874a8ec968636

        • \Users\Admin\AppData\Local\Temp\1000005001\3333.exe

          Filesize

          4.6MB

          MD5

          10c4eb50adca0b5e5c38ae0fdfa422fc

          SHA1

          204fa092bd55f6c999733807115dbc5817fd2fa8

          SHA256

          4fb85146079a6ad27e94e913e2302d6a47f8f5409f55f174aecdd8c99ab372ed

          SHA512

          552fd54a83ba2bb2b64d25890aa1336ca397669fd3dbdf8bc64a3edc2bb4e71aa4207b54b09e3ca050acaf2d4cb4b56740b22152abd047e1627874a8ec968636

        • \Users\Admin\AppData\Local\Temp\f03fb0fdc0\rovwer.exe

          Filesize

          63.9MB

          MD5

          88ad3ba2af8f5d1e183dee916829872c

          SHA1

          da924090852800d1e41bb120685af99290a61e25

          SHA256

          09a06048963dbb11e05f5205887282c14773a9812e7aedc02dc6b62e962ac550

          SHA512

          da20d9e5c546c3556cdbb48a492eed9f5ecb14a1bcd33c62c2a67d77bc76a4836fb62a7a6cd77e0733795e871a1d132611c146aa3a262641d15f3c730f0249a1

        • \Users\Admin\AppData\Local\Temp\f03fb0fdc0\rovwer.exe

          Filesize

          99.9MB

          MD5

          61aa20ac2d09128f3435f69822e7858b

          SHA1

          c2a1111ea20b97b67388754747c3b3bcd28cda00

          SHA256

          e761198ba66348fbdb5e50d1dfcc5fa7053300c9b69ddbe5ba12cb5c4c5a3292

          SHA512

          39df36990a5eb9af5bc9aff5db7f1d35083a8bd29ae739b78b1ec6f0faba24dc7a5d997abdfda66d0a32ee36c3a339fdea5db9baabd0e7a53914e357cdde03fa

        • memory/1180-71-0x0000000140000000-0x0000000140147000-memory.dmp

          Filesize

          1.3MB

        • memory/1180-81-0x0000000140000000-0x0000000140147000-memory.dmp

          Filesize

          1.3MB

        • memory/1180-68-0x0000000140000000-0x0000000140147000-memory.dmp

          Filesize

          1.3MB

        • memory/1180-70-0x0000000140000000-0x0000000140147000-memory.dmp

          Filesize

          1.3MB

        • memory/1180-93-0x0000000140000000-0x0000000140147000-memory.dmp

          Filesize

          1.3MB

        • memory/1180-72-0x0000000140000000-0x0000000140147000-memory.dmp

          Filesize

          1.3MB

        • memory/1180-74-0x0000000140000000-0x0000000140147000-memory.dmp

          Filesize

          1.3MB

        • memory/1180-76-0x0000000140000000-0x0000000140147000-memory.dmp

          Filesize

          1.3MB

        • memory/1180-77-0x0000000140000000-0x0000000140147000-memory.dmp

          Filesize

          1.3MB

        • memory/1180-80-0x0000000140000000-0x0000000140147000-memory.dmp

          Filesize

          1.3MB

        • memory/1180-67-0x0000000140000000-0x0000000140147000-memory.dmp

          Filesize

          1.3MB

        • memory/1180-101-0x0000000140000000-0x0000000140147000-memory.dmp

          Filesize

          1.3MB

        • memory/1356-65-0x00000000025A4000-0x00000000025A7000-memory.dmp

          Filesize

          12KB

        • memory/1356-63-0x00000000025AB000-0x00000000025CA000-memory.dmp

          Filesize

          124KB

        • memory/1356-62-0x000000001B770000-0x000000001BA6F000-memory.dmp

          Filesize

          3.0MB

        • memory/1356-60-0x000007FEEA3A0000-0x000007FEEAEFD000-memory.dmp

          Filesize

          11.4MB

        • memory/1356-61-0x00000000025A4000-0x00000000025A7000-memory.dmp

          Filesize

          12KB

        • memory/1356-66-0x00000000025AB000-0x00000000025CA000-memory.dmp

          Filesize

          124KB

        • memory/1356-59-0x000007FEEAF00000-0x000007FEEB923000-memory.dmp

          Filesize

          10.1MB

        • memory/1356-57-0x000007FEFB871000-0x000007FEFB873000-memory.dmp

          Filesize

          8KB

        • memory/1384-91-0x0000000075FC1000-0x0000000075FC3000-memory.dmp

          Filesize

          8KB

        • memory/1384-87-0x00000000012E0000-0x00000000013B8000-memory.dmp

          Filesize

          864KB

        • memory/1384-90-0x00000000012E0000-0x00000000013B8000-memory.dmp

          Filesize

          864KB

        • memory/1384-99-0x0000000000240000-0x0000000000283000-memory.dmp

          Filesize

          268KB

        • memory/1384-89-0x00000000012E0000-0x00000000013B8000-memory.dmp

          Filesize

          864KB

        • memory/1384-97-0x00000000012E0000-0x00000000013B8000-memory.dmp

          Filesize

          864KB

        • memory/1384-88-0x00000000012E0000-0x00000000013B8000-memory.dmp

          Filesize

          864KB

        • memory/1384-92-0x00000000012E0000-0x00000000013B8000-memory.dmp

          Filesize

          864KB

        • memory/1384-84-0x00000000012E0000-0x00000000013B8000-memory.dmp

          Filesize

          864KB

        • memory/1384-86-0x0000000000240000-0x0000000000283000-memory.dmp

          Filesize

          268KB

        • memory/1940-123-0x0000000000810000-0x00000000008E8000-memory.dmp

          Filesize

          864KB

        • memory/1940-121-0x0000000000400000-0x000000000044A000-memory.dmp

          Filesize

          296KB

        • memory/1940-119-0x0000000000400000-0x000000000044A000-memory.dmp

          Filesize

          296KB

        • memory/1940-109-0x0000000000400000-0x000000000044A000-memory.dmp

          Filesize

          296KB

        • memory/1940-115-0x0000000000400000-0x000000000044A000-memory.dmp

          Filesize

          296KB

        • memory/1940-110-0x0000000000400000-0x000000000044A000-memory.dmp

          Filesize

          296KB

        • memory/1940-114-0x0000000000400000-0x000000000044A000-memory.dmp

          Filesize

          296KB

        • memory/1940-112-0x0000000000400000-0x000000000044A000-memory.dmp

          Filesize

          296KB

        • memory/1952-124-0x0000000000810000-0x00000000008E8000-memory.dmp

          Filesize

          864KB

        • memory/1952-125-0x00000000002C0000-0x0000000000303000-memory.dmp

          Filesize

          268KB

        • memory/1952-106-0x00000000002C0000-0x0000000000303000-memory.dmp

          Filesize

          268KB

        • memory/1952-105-0x0000000000810000-0x00000000008E8000-memory.dmp

          Filesize

          864KB

        • memory/1952-102-0x0000000000810000-0x00000000008E8000-memory.dmp

          Filesize

          864KB

        • memory/1952-122-0x00000000081D0000-0x00000000082A8000-memory.dmp

          Filesize

          864KB

        • memory/1952-100-0x0000000000810000-0x00000000008E8000-memory.dmp

          Filesize

          864KB

        • memory/1952-103-0x0000000000810000-0x00000000008E8000-memory.dmp

          Filesize

          864KB

        • memory/1952-132-0x00000000081D0000-0x00000000082A8000-memory.dmp

          Filesize

          864KB

        • memory/2032-55-0x000000001E820000-0x000000001EAB2000-memory.dmp

          Filesize

          2.6MB

        • memory/2032-58-0x00000000006C0000-0x0000000000740000-memory.dmp

          Filesize

          512KB

        • memory/2032-54-0x0000000000840000-0x0000000000B5E000-memory.dmp

          Filesize

          3.1MB

        • memory/2032-64-0x00000000006C0000-0x0000000000740000-memory.dmp

          Filesize

          512KB