Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2023 04:35
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
General
-
Target
file.exe
-
Size
273KB
-
MD5
766683884bbe6a2c0e0ea7d76b6b13ea
-
SHA1
793d7b457f36a560d7094e4d0fee7270cc0e6842
-
SHA256
4ed06a694ba1832bb5526f2a5d52f6455f7ed317191f910d2e01d35bd8fba136
-
SHA512
52bc438968e68e967c1513e9bb1376cf55987a3f1976cd4eb0c463bfc30eb34220c3cfb38713c24d0d6513df3823d1b18aa24857eb8010537cf986ffde6bb12a
-
SSDEEP
6144:vlr2XLlX3MjWzpuXgs8edJwibHbCJfAg:vlr8RX3S+AXew7bHeY
Malware Config
Extracted
amadey
3.66
193.233.20.2/Bn89hku/index.php
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
mnolyk.exemnolyk.exemnolyk.exepid process 4232 mnolyk.exe 3900 mnolyk.exe 2752 mnolyk.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
file.exemnolyk.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 27 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4696 448 WerFault.exe file.exe 3864 448 WerFault.exe file.exe 2252 448 WerFault.exe file.exe 2960 448 WerFault.exe file.exe 1332 448 WerFault.exe file.exe 2616 448 WerFault.exe file.exe 2772 448 WerFault.exe file.exe 3364 448 WerFault.exe file.exe 3264 4232 WerFault.exe mnolyk.exe 4288 4232 WerFault.exe mnolyk.exe 1368 4232 WerFault.exe mnolyk.exe 4628 4232 WerFault.exe mnolyk.exe 2372 4232 WerFault.exe mnolyk.exe 1788 4232 WerFault.exe mnolyk.exe 1396 4232 WerFault.exe mnolyk.exe 2644 4232 WerFault.exe mnolyk.exe 3880 4232 WerFault.exe mnolyk.exe 3708 4232 WerFault.exe mnolyk.exe 5012 4232 WerFault.exe mnolyk.exe 1316 4232 WerFault.exe mnolyk.exe 4408 4232 WerFault.exe mnolyk.exe 2720 4232 WerFault.exe mnolyk.exe 724 3900 WerFault.exe mnolyk.exe 4056 4232 WerFault.exe mnolyk.exe 2576 2752 WerFault.exe mnolyk.exe 4212 4232 WerFault.exe mnolyk.exe 4280 4232 WerFault.exe mnolyk.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
file.exemnolyk.execmd.exedescription pid process target process PID 448 wrote to memory of 4232 448 file.exe mnolyk.exe PID 448 wrote to memory of 4232 448 file.exe mnolyk.exe PID 448 wrote to memory of 4232 448 file.exe mnolyk.exe PID 4232 wrote to memory of 2076 4232 mnolyk.exe schtasks.exe PID 4232 wrote to memory of 2076 4232 mnolyk.exe schtasks.exe PID 4232 wrote to memory of 2076 4232 mnolyk.exe schtasks.exe PID 4232 wrote to memory of 4040 4232 mnolyk.exe cmd.exe PID 4232 wrote to memory of 4040 4232 mnolyk.exe cmd.exe PID 4232 wrote to memory of 4040 4232 mnolyk.exe cmd.exe PID 4040 wrote to memory of 5056 4040 cmd.exe cmd.exe PID 4040 wrote to memory of 5056 4040 cmd.exe cmd.exe PID 4040 wrote to memory of 5056 4040 cmd.exe cmd.exe PID 4040 wrote to memory of 5080 4040 cmd.exe cacls.exe PID 4040 wrote to memory of 5080 4040 cmd.exe cacls.exe PID 4040 wrote to memory of 5080 4040 cmd.exe cacls.exe PID 4040 wrote to memory of 5076 4040 cmd.exe cacls.exe PID 4040 wrote to memory of 5076 4040 cmd.exe cacls.exe PID 4040 wrote to memory of 5076 4040 cmd.exe cacls.exe PID 4040 wrote to memory of 4364 4040 cmd.exe cmd.exe PID 4040 wrote to memory of 4364 4040 cmd.exe cmd.exe PID 4040 wrote to memory of 4364 4040 cmd.exe cmd.exe PID 4040 wrote to memory of 4448 4040 cmd.exe cacls.exe PID 4040 wrote to memory of 4448 4040 cmd.exe cacls.exe PID 4040 wrote to memory of 4448 4040 cmd.exe cacls.exe PID 4040 wrote to memory of 2116 4040 cmd.exe cacls.exe PID 4040 wrote to memory of 2116 4040 cmd.exe cacls.exe PID 4040 wrote to memory of 2116 4040 cmd.exe cacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 8482⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 9402⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 11002⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 9362⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 9482⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 11242⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 9362⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 5843⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 7443⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 7443⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 9523⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 9723⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 9523⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 9403⤵
- Program crash
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe" /F3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 9203⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 6683⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\4b9a106e76" /P "Admin:N"&&CACLS "..\4b9a106e76" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"4⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4b9a106e76" /P "Admin:N"4⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4b9a106e76" /P "Admin:R" /E4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 11483⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 6163⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 6483⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 7963⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 9963⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 9723⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 13123⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 9803⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 7682⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 448 -ip 4481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 448 -ip 4481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 448 -ip 4481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 448 -ip 4481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 448 -ip 4481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 448 -ip 4481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 448 -ip 4481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 448 -ip 4481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4232 -ip 42321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4232 -ip 42321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4232 -ip 42321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4232 -ip 42321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4232 -ip 42321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4232 -ip 42321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4232 -ip 42321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4232 -ip 42321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4232 -ip 42321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4232 -ip 42321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4232 -ip 42321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4232 -ip 42321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4232 -ip 42321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 4232 -ip 42321⤵
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 3162⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 3900 -ip 39001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4232 -ip 42321⤵
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 3122⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 2752 -ip 27521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 4232 -ip 42321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 4232 -ip 42321⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exeFilesize
273KB
MD5766683884bbe6a2c0e0ea7d76b6b13ea
SHA1793d7b457f36a560d7094e4d0fee7270cc0e6842
SHA2564ed06a694ba1832bb5526f2a5d52f6455f7ed317191f910d2e01d35bd8fba136
SHA51252bc438968e68e967c1513e9bb1376cf55987a3f1976cd4eb0c463bfc30eb34220c3cfb38713c24d0d6513df3823d1b18aa24857eb8010537cf986ffde6bb12a
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exeFilesize
273KB
MD5766683884bbe6a2c0e0ea7d76b6b13ea
SHA1793d7b457f36a560d7094e4d0fee7270cc0e6842
SHA2564ed06a694ba1832bb5526f2a5d52f6455f7ed317191f910d2e01d35bd8fba136
SHA51252bc438968e68e967c1513e9bb1376cf55987a3f1976cd4eb0c463bfc30eb34220c3cfb38713c24d0d6513df3823d1b18aa24857eb8010537cf986ffde6bb12a
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exeFilesize
273KB
MD5766683884bbe6a2c0e0ea7d76b6b13ea
SHA1793d7b457f36a560d7094e4d0fee7270cc0e6842
SHA2564ed06a694ba1832bb5526f2a5d52f6455f7ed317191f910d2e01d35bd8fba136
SHA51252bc438968e68e967c1513e9bb1376cf55987a3f1976cd4eb0c463bfc30eb34220c3cfb38713c24d0d6513df3823d1b18aa24857eb8010537cf986ffde6bb12a
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exeFilesize
273KB
MD5766683884bbe6a2c0e0ea7d76b6b13ea
SHA1793d7b457f36a560d7094e4d0fee7270cc0e6842
SHA2564ed06a694ba1832bb5526f2a5d52f6455f7ed317191f910d2e01d35bd8fba136
SHA51252bc438968e68e967c1513e9bb1376cf55987a3f1976cd4eb0c463bfc30eb34220c3cfb38713c24d0d6513df3823d1b18aa24857eb8010537cf986ffde6bb12a
-
memory/448-133-0x00000000048F0000-0x000000000492C000-memory.dmpFilesize
240KB
-
memory/448-134-0x0000000000400000-0x0000000002BAD000-memory.dmpFilesize
39.7MB
-
memory/448-132-0x0000000002D29000-0x0000000002D48000-memory.dmpFilesize
124KB
-
memory/448-138-0x0000000002D29000-0x0000000002D48000-memory.dmpFilesize
124KB
-
memory/448-139-0x0000000000400000-0x0000000002BAD000-memory.dmpFilesize
39.7MB
-
memory/2076-143-0x0000000000000000-mapping.dmp
-
memory/2116-150-0x0000000000000000-mapping.dmp
-
memory/2752-157-0x0000000002F4C000-0x0000000002F6A000-memory.dmpFilesize
120KB
-
memory/2752-158-0x0000000000400000-0x0000000002BAD000-memory.dmpFilesize
39.7MB
-
memory/3900-155-0x0000000000400000-0x0000000002BAD000-memory.dmpFilesize
39.7MB
-
memory/3900-154-0x0000000002DEC000-0x0000000002E0B000-memory.dmpFilesize
124KB
-
memory/4040-144-0x0000000000000000-mapping.dmp
-
memory/4232-151-0x0000000002BB0000-0x0000000002CB0000-memory.dmpFilesize
1024KB
-
memory/4232-152-0x0000000000400000-0x0000000002BAD000-memory.dmpFilesize
39.7MB
-
memory/4232-142-0x0000000000400000-0x0000000002BAD000-memory.dmpFilesize
39.7MB
-
memory/4232-141-0x0000000002BB0000-0x0000000002CB0000-memory.dmpFilesize
1024KB
-
memory/4232-135-0x0000000000000000-mapping.dmp
-
memory/4364-148-0x0000000000000000-mapping.dmp
-
memory/4448-149-0x0000000000000000-mapping.dmp
-
memory/5056-145-0x0000000000000000-mapping.dmp
-
memory/5076-147-0x0000000000000000-mapping.dmp
-
memory/5080-146-0x0000000000000000-mapping.dmp