Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2023 05:51
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
General
-
Target
file.exe
-
Size
352KB
-
MD5
b1146ec9318c55479bd80be9ae6410ad
-
SHA1
3b73d97d82c088c9b9e4343b1eb231b3097b146d
-
SHA256
fcaa3b47fc9a61baf5e8317fb8bd62028bb6c5190702d21c3645c346a4b66d53
-
SHA512
9bd3c136c40c2858fda2eeab233f07271d975b539efb35d88c3a6a609c0a0e8a0396b0b315e9f97365b9261a8edab01d2debf1f35424a02c8325d158a5af018c
-
SSDEEP
6144:T/LomuF9DSbA2q8tL9mrDhvW6UvSCXK/o9/CJTk637eQfnd5SCyHCB:jGFI28ahvPUXXko9CJb7d5S
Malware Config
Extracted
amadey
3.66
193.233.20.2/Bn89hku/index.php
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
mnolyk.exemnolyk.exemnolyk.exepid process 4376 mnolyk.exe 4040 mnolyk.exe 3020 mnolyk.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
file.exemnolyk.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 26 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1036 4604 WerFault.exe file.exe 1100 4604 WerFault.exe file.exe 1356 4604 WerFault.exe file.exe 1744 4604 WerFault.exe file.exe 2736 4604 WerFault.exe file.exe 4244 4604 WerFault.exe file.exe 1532 4604 WerFault.exe file.exe 3844 4376 WerFault.exe mnolyk.exe 1652 4376 WerFault.exe mnolyk.exe 204 4376 WerFault.exe mnolyk.exe 8 4376 WerFault.exe mnolyk.exe 3480 4376 WerFault.exe mnolyk.exe 1376 4376 WerFault.exe mnolyk.exe 3636 4376 WerFault.exe mnolyk.exe 4600 4376 WerFault.exe mnolyk.exe 720 4376 WerFault.exe mnolyk.exe 3648 4376 WerFault.exe mnolyk.exe 3940 4376 WerFault.exe mnolyk.exe 3176 4376 WerFault.exe mnolyk.exe 2028 4376 WerFault.exe mnolyk.exe 2676 4376 WerFault.exe mnolyk.exe 1744 4376 WerFault.exe mnolyk.exe 1280 4040 WerFault.exe mnolyk.exe 1496 4376 WerFault.exe mnolyk.exe 2580 3020 WerFault.exe mnolyk.exe 116 4376 WerFault.exe mnolyk.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
file.exemnolyk.execmd.exedescription pid process target process PID 4604 wrote to memory of 4376 4604 file.exe mnolyk.exe PID 4604 wrote to memory of 4376 4604 file.exe mnolyk.exe PID 4604 wrote to memory of 4376 4604 file.exe mnolyk.exe PID 4376 wrote to memory of 1900 4376 mnolyk.exe schtasks.exe PID 4376 wrote to memory of 1900 4376 mnolyk.exe schtasks.exe PID 4376 wrote to memory of 1900 4376 mnolyk.exe schtasks.exe PID 4376 wrote to memory of 3692 4376 mnolyk.exe cmd.exe PID 4376 wrote to memory of 3692 4376 mnolyk.exe cmd.exe PID 4376 wrote to memory of 3692 4376 mnolyk.exe cmd.exe PID 3692 wrote to memory of 3784 3692 cmd.exe cmd.exe PID 3692 wrote to memory of 3784 3692 cmd.exe cmd.exe PID 3692 wrote to memory of 3784 3692 cmd.exe cmd.exe PID 3692 wrote to memory of 4676 3692 cmd.exe cacls.exe PID 3692 wrote to memory of 4676 3692 cmd.exe cacls.exe PID 3692 wrote to memory of 4676 3692 cmd.exe cacls.exe PID 3692 wrote to memory of 3876 3692 cmd.exe cacls.exe PID 3692 wrote to memory of 3876 3692 cmd.exe cacls.exe PID 3692 wrote to memory of 3876 3692 cmd.exe cacls.exe PID 3692 wrote to memory of 1796 3692 cmd.exe cmd.exe PID 3692 wrote to memory of 1796 3692 cmd.exe cmd.exe PID 3692 wrote to memory of 1796 3692 cmd.exe cmd.exe PID 3692 wrote to memory of 2424 3692 cmd.exe cacls.exe PID 3692 wrote to memory of 2424 3692 cmd.exe cacls.exe PID 3692 wrote to memory of 2424 3692 cmd.exe cacls.exe PID 3692 wrote to memory of 2812 3692 cmd.exe cacls.exe PID 3692 wrote to memory of 2812 3692 cmd.exe cacls.exe PID 3692 wrote to memory of 2812 3692 cmd.exe cacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 8962⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 9722⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 9802⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 11042⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 10762⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 10922⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 5883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 7763⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 7683⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 9483⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 9483⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 9483⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 10123⤵
- Program crash
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe" /F3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 8923⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 6203⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\4b9a106e76" /P "Admin:N"&&CACLS "..\4b9a106e76" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4b9a106e76" /P "Admin:N"4⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4b9a106e76" /P "Admin:R" /E4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 7763⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 5883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 11883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 8163⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 13883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 9963⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 9883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 12883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 9242⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4604 -ip 46041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4604 -ip 46041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4604 -ip 46041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4604 -ip 46041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4604 -ip 46041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4604 -ip 46041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4604 -ip 46041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4376 -ip 43761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4376 -ip 43761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4376 -ip 43761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4376 -ip 43761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4376 -ip 43761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4376 -ip 43761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4376 -ip 43761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4376 -ip 43761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4376 -ip 43761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4376 -ip 43761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4376 -ip 43761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4376 -ip 43761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4376 -ip 43761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4376 -ip 43761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4376 -ip 43761⤵
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4040 -s 3282⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4040 -ip 40401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4376 -ip 43761⤵
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 3162⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3020 -ip 30201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4376 -ip 43761⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exeFilesize
352KB
MD5b1146ec9318c55479bd80be9ae6410ad
SHA13b73d97d82c088c9b9e4343b1eb231b3097b146d
SHA256fcaa3b47fc9a61baf5e8317fb8bd62028bb6c5190702d21c3645c346a4b66d53
SHA5129bd3c136c40c2858fda2eeab233f07271d975b539efb35d88c3a6a609c0a0e8a0396b0b315e9f97365b9261a8edab01d2debf1f35424a02c8325d158a5af018c
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exeFilesize
352KB
MD5b1146ec9318c55479bd80be9ae6410ad
SHA13b73d97d82c088c9b9e4343b1eb231b3097b146d
SHA256fcaa3b47fc9a61baf5e8317fb8bd62028bb6c5190702d21c3645c346a4b66d53
SHA5129bd3c136c40c2858fda2eeab233f07271d975b539efb35d88c3a6a609c0a0e8a0396b0b315e9f97365b9261a8edab01d2debf1f35424a02c8325d158a5af018c
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exeFilesize
352KB
MD5b1146ec9318c55479bd80be9ae6410ad
SHA13b73d97d82c088c9b9e4343b1eb231b3097b146d
SHA256fcaa3b47fc9a61baf5e8317fb8bd62028bb6c5190702d21c3645c346a4b66d53
SHA5129bd3c136c40c2858fda2eeab233f07271d975b539efb35d88c3a6a609c0a0e8a0396b0b315e9f97365b9261a8edab01d2debf1f35424a02c8325d158a5af018c
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exeFilesize
352KB
MD5b1146ec9318c55479bd80be9ae6410ad
SHA13b73d97d82c088c9b9e4343b1eb231b3097b146d
SHA256fcaa3b47fc9a61baf5e8317fb8bd62028bb6c5190702d21c3645c346a4b66d53
SHA5129bd3c136c40c2858fda2eeab233f07271d975b539efb35d88c3a6a609c0a0e8a0396b0b315e9f97365b9261a8edab01d2debf1f35424a02c8325d158a5af018c
-
memory/1796-147-0x0000000000000000-mapping.dmp
-
memory/1900-142-0x0000000000000000-mapping.dmp
-
memory/2424-148-0x0000000000000000-mapping.dmp
-
memory/2812-149-0x0000000000000000-mapping.dmp
-
memory/3020-156-0x00000000005FF000-0x000000000061D000-memory.dmpFilesize
120KB
-
memory/3020-157-0x0000000000400000-0x0000000000473000-memory.dmpFilesize
460KB
-
memory/3692-143-0x0000000000000000-mapping.dmp
-
memory/3784-144-0x0000000000000000-mapping.dmp
-
memory/3876-146-0x0000000000000000-mapping.dmp
-
memory/4040-153-0x00000000004FF000-0x000000000051D000-memory.dmpFilesize
120KB
-
memory/4040-154-0x0000000000400000-0x0000000000473000-memory.dmpFilesize
460KB
-
memory/4376-150-0x00000000006BC000-0x00000000006DB000-memory.dmpFilesize
124KB
-
memory/4376-141-0x0000000000400000-0x0000000000473000-memory.dmpFilesize
460KB
-
memory/4376-151-0x0000000000400000-0x0000000000473000-memory.dmpFilesize
460KB
-
memory/4376-140-0x00000000006BC000-0x00000000006DB000-memory.dmpFilesize
124KB
-
memory/4376-135-0x0000000000000000-mapping.dmp
-
memory/4604-132-0x000000000072D000-0x000000000074C000-memory.dmpFilesize
124KB
-
memory/4604-138-0x000000000072D000-0x000000000074C000-memory.dmpFilesize
124KB
-
memory/4604-139-0x0000000000400000-0x0000000000473000-memory.dmpFilesize
460KB
-
memory/4604-134-0x0000000000400000-0x0000000000473000-memory.dmpFilesize
460KB
-
memory/4604-133-0x00000000021B0000-0x00000000021EC000-memory.dmpFilesize
240KB
-
memory/4676-145-0x0000000000000000-mapping.dmp