Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/01/2023, 05:40
Static task
static1
Behavioral task
behavioral1
Sample
d2a7c5d0009a9e382295763e4f62ef22ea064a5877d1e78750e0a17c8d938b70.exe
Resource
win7-20221111-en
General
-
Target
d2a7c5d0009a9e382295763e4f62ef22ea064a5877d1e78750e0a17c8d938b70.exe
-
Size
324KB
-
MD5
abf699474de0d2f67c6a86b17070f79f
-
SHA1
ce1e2d038e1806081ac2efee8a6c92cf5af43f8f
-
SHA256
d2a7c5d0009a9e382295763e4f62ef22ea064a5877d1e78750e0a17c8d938b70
-
SHA512
acb89e5413bdb6c6c10ea3f4ccbe28e4f7c114a0220e3e1a5b7a1c8fe4e7e54815e0a976be9d8b48a3c53e425c780bc1df15375c368cc3ef174bd4e70866fb2b
-
SSDEEP
3072:Y/cql+amAgTt5NFI1/Cf+o2CEGoRbUQx3Tibu0TRUmGr0ch6lokfMMjm/s4E:/qoTt6o2CEpRbhx3QlAZUNM
Malware Config
Extracted
amadey
3.50
193.56.146.243/h8V2cQlbd3/index.php
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1216 rovwer.exe 852 rovwer.exe 2012 rovwer.exe 560 rovwer.exe -
Loads dropped DLL 2 IoCs
pid Process 1192 d2a7c5d0009a9e382295763e4f62ef22ea064a5877d1e78750e0a17c8d938b70.exe 1192 d2a7c5d0009a9e382295763e4f62ef22ea064a5877d1e78750e0a17c8d938b70.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1056 schtasks.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1192 wrote to memory of 1216 1192 d2a7c5d0009a9e382295763e4f62ef22ea064a5877d1e78750e0a17c8d938b70.exe 28 PID 1192 wrote to memory of 1216 1192 d2a7c5d0009a9e382295763e4f62ef22ea064a5877d1e78750e0a17c8d938b70.exe 28 PID 1192 wrote to memory of 1216 1192 d2a7c5d0009a9e382295763e4f62ef22ea064a5877d1e78750e0a17c8d938b70.exe 28 PID 1192 wrote to memory of 1216 1192 d2a7c5d0009a9e382295763e4f62ef22ea064a5877d1e78750e0a17c8d938b70.exe 28 PID 1216 wrote to memory of 1056 1216 rovwer.exe 29 PID 1216 wrote to memory of 1056 1216 rovwer.exe 29 PID 1216 wrote to memory of 1056 1216 rovwer.exe 29 PID 1216 wrote to memory of 1056 1216 rovwer.exe 29 PID 1856 wrote to memory of 852 1856 taskeng.exe 34 PID 1856 wrote to memory of 852 1856 taskeng.exe 34 PID 1856 wrote to memory of 852 1856 taskeng.exe 34 PID 1856 wrote to memory of 852 1856 taskeng.exe 34 PID 1856 wrote to memory of 2012 1856 taskeng.exe 35 PID 1856 wrote to memory of 2012 1856 taskeng.exe 35 PID 1856 wrote to memory of 2012 1856 taskeng.exe 35 PID 1856 wrote to memory of 2012 1856 taskeng.exe 35 PID 1856 wrote to memory of 560 1856 taskeng.exe 37 PID 1856 wrote to memory of 560 1856 taskeng.exe 37 PID 1856 wrote to memory of 560 1856 taskeng.exe 37 PID 1856 wrote to memory of 560 1856 taskeng.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2a7c5d0009a9e382295763e4f62ef22ea064a5877d1e78750e0a17c8d938b70.exe"C:\Users\Admin\AppData\Local\Temp\d2a7c5d0009a9e382295763e4f62ef22ea064a5877d1e78750e0a17c8d938b70.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe" /F3⤵
- Creates scheduled task(s)
PID:1056
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {E39091D3-55C5-4939-B567-BF8182333B1E} S-1-5-21-3406023954-474543476-3319432036-1000:VUIIVLGQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe2⤵
- Executes dropped EXE
PID:852
-
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe2⤵
- Executes dropped EXE
PID:2012
-
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe2⤵
- Executes dropped EXE
PID:560
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
324KB
MD5abf699474de0d2f67c6a86b17070f79f
SHA1ce1e2d038e1806081ac2efee8a6c92cf5af43f8f
SHA256d2a7c5d0009a9e382295763e4f62ef22ea064a5877d1e78750e0a17c8d938b70
SHA512acb89e5413bdb6c6c10ea3f4ccbe28e4f7c114a0220e3e1a5b7a1c8fe4e7e54815e0a976be9d8b48a3c53e425c780bc1df15375c368cc3ef174bd4e70866fb2b
-
Filesize
324KB
MD5abf699474de0d2f67c6a86b17070f79f
SHA1ce1e2d038e1806081ac2efee8a6c92cf5af43f8f
SHA256d2a7c5d0009a9e382295763e4f62ef22ea064a5877d1e78750e0a17c8d938b70
SHA512acb89e5413bdb6c6c10ea3f4ccbe28e4f7c114a0220e3e1a5b7a1c8fe4e7e54815e0a976be9d8b48a3c53e425c780bc1df15375c368cc3ef174bd4e70866fb2b
-
Filesize
324KB
MD5abf699474de0d2f67c6a86b17070f79f
SHA1ce1e2d038e1806081ac2efee8a6c92cf5af43f8f
SHA256d2a7c5d0009a9e382295763e4f62ef22ea064a5877d1e78750e0a17c8d938b70
SHA512acb89e5413bdb6c6c10ea3f4ccbe28e4f7c114a0220e3e1a5b7a1c8fe4e7e54815e0a976be9d8b48a3c53e425c780bc1df15375c368cc3ef174bd4e70866fb2b
-
Filesize
324KB
MD5abf699474de0d2f67c6a86b17070f79f
SHA1ce1e2d038e1806081ac2efee8a6c92cf5af43f8f
SHA256d2a7c5d0009a9e382295763e4f62ef22ea064a5877d1e78750e0a17c8d938b70
SHA512acb89e5413bdb6c6c10ea3f4ccbe28e4f7c114a0220e3e1a5b7a1c8fe4e7e54815e0a976be9d8b48a3c53e425c780bc1df15375c368cc3ef174bd4e70866fb2b
-
Filesize
324KB
MD5abf699474de0d2f67c6a86b17070f79f
SHA1ce1e2d038e1806081ac2efee8a6c92cf5af43f8f
SHA256d2a7c5d0009a9e382295763e4f62ef22ea064a5877d1e78750e0a17c8d938b70
SHA512acb89e5413bdb6c6c10ea3f4ccbe28e4f7c114a0220e3e1a5b7a1c8fe4e7e54815e0a976be9d8b48a3c53e425c780bc1df15375c368cc3ef174bd4e70866fb2b
-
Filesize
324KB
MD5abf699474de0d2f67c6a86b17070f79f
SHA1ce1e2d038e1806081ac2efee8a6c92cf5af43f8f
SHA256d2a7c5d0009a9e382295763e4f62ef22ea064a5877d1e78750e0a17c8d938b70
SHA512acb89e5413bdb6c6c10ea3f4ccbe28e4f7c114a0220e3e1a5b7a1c8fe4e7e54815e0a976be9d8b48a3c53e425c780bc1df15375c368cc3ef174bd4e70866fb2b
-
Filesize
324KB
MD5abf699474de0d2f67c6a86b17070f79f
SHA1ce1e2d038e1806081ac2efee8a6c92cf5af43f8f
SHA256d2a7c5d0009a9e382295763e4f62ef22ea064a5877d1e78750e0a17c8d938b70
SHA512acb89e5413bdb6c6c10ea3f4ccbe28e4f7c114a0220e3e1a5b7a1c8fe4e7e54815e0a976be9d8b48a3c53e425c780bc1df15375c368cc3ef174bd4e70866fb2b