Analysis
-
max time kernel
373s -
max time network
431s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 21:25
Static task
static1
General
-
Target
f8f3395ef0fc0e5b1ef8b8fc4ef092f81e52db621f2e0f450b478922054f5d45.exe
-
Size
202KB
-
MD5
e2c521712e5715ad7e0e15b5ddcd1857
-
SHA1
21bcbe9079e6a2ba6e6ef9976cd77106578669e3
-
SHA256
f8f3395ef0fc0e5b1ef8b8fc4ef092f81e52db621f2e0f450b478922054f5d45
-
SHA512
862e2a3829ffea1eb5d88bf0934714f08beabdf3cdeb23908661dd6239dccd1ca194870cd8301885e7cb494dcfbd7478116ae9870748fa3ea1c152e7aa3c6eec
-
SSDEEP
3072:ELgcUgDwJwv+5MMi1Av2fhIoHp8KdU2llPlF9iF1naI2L0jfY43dmEU12Nw:vcpwJw1tEmHHCKq2hEaHL0jfY47Vw
Malware Config
Extracted
amadey
3.50
31.41.244.17/hfk3vK9/index.php
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 5108 gntuud.exe 976 gntuud.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation f8f3395ef0fc0e5b1ef8b8fc4ef092f81e52db621f2e0f450b478922054f5d45.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation gntuud.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2200 1080 WerFault.exe 79 3000 976 WerFault.exe 88 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3464 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1080 wrote to memory of 5108 1080 f8f3395ef0fc0e5b1ef8b8fc4ef092f81e52db621f2e0f450b478922054f5d45.exe 81 PID 1080 wrote to memory of 5108 1080 f8f3395ef0fc0e5b1ef8b8fc4ef092f81e52db621f2e0f450b478922054f5d45.exe 81 PID 1080 wrote to memory of 5108 1080 f8f3395ef0fc0e5b1ef8b8fc4ef092f81e52db621f2e0f450b478922054f5d45.exe 81 PID 5108 wrote to memory of 3464 5108 gntuud.exe 84 PID 5108 wrote to memory of 3464 5108 gntuud.exe 84 PID 5108 wrote to memory of 3464 5108 gntuud.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8f3395ef0fc0e5b1ef8b8fc4ef092f81e52db621f2e0f450b478922054f5d45.exe"C:\Users\Admin\AppData\Local\Temp\f8f3395ef0fc0e5b1ef8b8fc4ef092f81e52db621f2e0f450b478922054f5d45.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe" /F3⤵
- Creates scheduled task(s)
PID:3464
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1080 -s 8762⤵
- Program crash
PID:2200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1080 -ip 10801⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exeC:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe1⤵
- Executes dropped EXE
PID:976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 976 -s 4202⤵
- Program crash
PID:3000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 976 -ip 9761⤵PID:228
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202KB
MD5e2c521712e5715ad7e0e15b5ddcd1857
SHA121bcbe9079e6a2ba6e6ef9976cd77106578669e3
SHA256f8f3395ef0fc0e5b1ef8b8fc4ef092f81e52db621f2e0f450b478922054f5d45
SHA512862e2a3829ffea1eb5d88bf0934714f08beabdf3cdeb23908661dd6239dccd1ca194870cd8301885e7cb494dcfbd7478116ae9870748fa3ea1c152e7aa3c6eec
-
Filesize
202KB
MD5e2c521712e5715ad7e0e15b5ddcd1857
SHA121bcbe9079e6a2ba6e6ef9976cd77106578669e3
SHA256f8f3395ef0fc0e5b1ef8b8fc4ef092f81e52db621f2e0f450b478922054f5d45
SHA512862e2a3829ffea1eb5d88bf0934714f08beabdf3cdeb23908661dd6239dccd1ca194870cd8301885e7cb494dcfbd7478116ae9870748fa3ea1c152e7aa3c6eec
-
Filesize
202KB
MD5e2c521712e5715ad7e0e15b5ddcd1857
SHA121bcbe9079e6a2ba6e6ef9976cd77106578669e3
SHA256f8f3395ef0fc0e5b1ef8b8fc4ef092f81e52db621f2e0f450b478922054f5d45
SHA512862e2a3829ffea1eb5d88bf0934714f08beabdf3cdeb23908661dd6239dccd1ca194870cd8301885e7cb494dcfbd7478116ae9870748fa3ea1c152e7aa3c6eec