Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/02/2023, 04:00
Static task
static1
Behavioral task
behavioral1
Sample
60083716802ea0eca381467ca37fe7f6de685b533ffeb657b3632d1e1c98f7ba.exe
Resource
win10v2004-20221111-en
General
-
Target
60083716802ea0eca381467ca37fe7f6de685b533ffeb657b3632d1e1c98f7ba.exe
-
Size
526KB
-
MD5
eab353fb0eed8959df4c61302ba7965f
-
SHA1
429cd4aa2e8df4b1f90a116ba0cebcec20237066
-
SHA256
60083716802ea0eca381467ca37fe7f6de685b533ffeb657b3632d1e1c98f7ba
-
SHA512
9623b0517857b182c3a3768f65112049150a86224dd78d65dcb8157f264b77b75262054e6248a53417cd616d22af05c99eddfb6db6db00b9b6d67ad73f63a627
-
SSDEEP
12288:xMryy90UKY34W7YmhAyC6GvKgCOp9RZyJa7HEyIs933bO:Ty93plAF6Y1pp9RZyykyIsx3S
Malware Config
Extracted
amadey
3.66
62.204.41.4/Gol478Ns/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" aycf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" nika.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" nika.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" nika.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" nika.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection aycf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" aycf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" aycf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" nika.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" aycf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" aycf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection nika.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation xriv.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 8 IoCs
pid Process 4860 zhiga.exe 4056 aycf.exe 2176 nika.exe 2212 xriv.exe 3528 mnolyk.exe 2464 mnolyk.exe 4560 mnolyk.exe 548 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 3276 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" aycf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" nika.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features aycf.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 60083716802ea0eca381467ca37fe7f6de685b533ffeb657b3632d1e1c98f7ba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 60083716802ea0eca381467ca37fe7f6de685b533ffeb657b3632d1e1c98f7ba.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zhiga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zhiga.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4572 4056 WerFault.exe 83 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4288 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4056 aycf.exe 4056 aycf.exe 2176 nika.exe 2176 nika.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4056 aycf.exe Token: SeDebugPrivilege 2176 nika.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 4916 wrote to memory of 4860 4916 60083716802ea0eca381467ca37fe7f6de685b533ffeb657b3632d1e1c98f7ba.exe 82 PID 4916 wrote to memory of 4860 4916 60083716802ea0eca381467ca37fe7f6de685b533ffeb657b3632d1e1c98f7ba.exe 82 PID 4916 wrote to memory of 4860 4916 60083716802ea0eca381467ca37fe7f6de685b533ffeb657b3632d1e1c98f7ba.exe 82 PID 4860 wrote to memory of 4056 4860 zhiga.exe 83 PID 4860 wrote to memory of 4056 4860 zhiga.exe 83 PID 4860 wrote to memory of 4056 4860 zhiga.exe 83 PID 4860 wrote to memory of 2176 4860 zhiga.exe 86 PID 4860 wrote to memory of 2176 4860 zhiga.exe 86 PID 4916 wrote to memory of 2212 4916 60083716802ea0eca381467ca37fe7f6de685b533ffeb657b3632d1e1c98f7ba.exe 87 PID 4916 wrote to memory of 2212 4916 60083716802ea0eca381467ca37fe7f6de685b533ffeb657b3632d1e1c98f7ba.exe 87 PID 4916 wrote to memory of 2212 4916 60083716802ea0eca381467ca37fe7f6de685b533ffeb657b3632d1e1c98f7ba.exe 87 PID 2212 wrote to memory of 3528 2212 xriv.exe 88 PID 2212 wrote to memory of 3528 2212 xriv.exe 88 PID 2212 wrote to memory of 3528 2212 xriv.exe 88 PID 3528 wrote to memory of 4288 3528 mnolyk.exe 89 PID 3528 wrote to memory of 4288 3528 mnolyk.exe 89 PID 3528 wrote to memory of 4288 3528 mnolyk.exe 89 PID 3528 wrote to memory of 2720 3528 mnolyk.exe 91 PID 3528 wrote to memory of 2720 3528 mnolyk.exe 91 PID 3528 wrote to memory of 2720 3528 mnolyk.exe 91 PID 2720 wrote to memory of 4504 2720 cmd.exe 93 PID 2720 wrote to memory of 4504 2720 cmd.exe 93 PID 2720 wrote to memory of 4504 2720 cmd.exe 93 PID 2720 wrote to memory of 2988 2720 cmd.exe 94 PID 2720 wrote to memory of 2988 2720 cmd.exe 94 PID 2720 wrote to memory of 2988 2720 cmd.exe 94 PID 2720 wrote to memory of 2544 2720 cmd.exe 95 PID 2720 wrote to memory of 2544 2720 cmd.exe 95 PID 2720 wrote to memory of 2544 2720 cmd.exe 95 PID 2720 wrote to memory of 2636 2720 cmd.exe 96 PID 2720 wrote to memory of 2636 2720 cmd.exe 96 PID 2720 wrote to memory of 2636 2720 cmd.exe 96 PID 2720 wrote to memory of 4196 2720 cmd.exe 97 PID 2720 wrote to memory of 4196 2720 cmd.exe 97 PID 2720 wrote to memory of 4196 2720 cmd.exe 97 PID 2720 wrote to memory of 4216 2720 cmd.exe 98 PID 2720 wrote to memory of 4216 2720 cmd.exe 98 PID 2720 wrote to memory of 4216 2720 cmd.exe 98 PID 3528 wrote to memory of 3276 3528 mnolyk.exe 101 PID 3528 wrote to memory of 3276 3528 mnolyk.exe 101 PID 3528 wrote to memory of 3276 3528 mnolyk.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\60083716802ea0eca381467ca37fe7f6de685b533ffeb657b3632d1e1c98f7ba.exe"C:\Users\Admin\AppData\Local\Temp\60083716802ea0eca381467ca37fe7f6de685b533ffeb657b3632d1e1c98f7ba.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zhiga.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zhiga.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aycf.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aycf.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 10804⤵
- Program crash
PID:4572
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nika.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nika.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xriv.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xriv.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe" /F4⤵
- Creates scheduled task(s)
PID:4288
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\4b9a106e76" /P "Admin:N"&&CACLS "..\4b9a106e76" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4504
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"5⤵PID:2988
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E5⤵PID:2544
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2636
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4b9a106e76" /P "Admin:N"5⤵PID:4196
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4b9a106e76" /P "Admin:R" /E5⤵PID:4216
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3276
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4056 -ip 40561⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe1⤵
- Executes dropped EXE
PID:2464
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe1⤵
- Executes dropped EXE
PID:4560
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe1⤵
- Executes dropped EXE
PID:548
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
339KB
MD52700383ce339b55f827af163eb426e27
SHA1894a09480120f3a327bb453911616db5036eeae8
SHA256e256d7f6ed1ab7cabc94b5023b2248a692abb8ea6d3bffda98cfd45fa5b8ea9b
SHA5121caa9dbebe336b06f3a9d8a7887bd52fd7ac82cb21e570c5c8479278ec5356dd2c26f0bd2279aeae08236f863f048faa2950fa9334752b58a7a9d8ae39314970
-
Filesize
339KB
MD52700383ce339b55f827af163eb426e27
SHA1894a09480120f3a327bb453911616db5036eeae8
SHA256e256d7f6ed1ab7cabc94b5023b2248a692abb8ea6d3bffda98cfd45fa5b8ea9b
SHA5121caa9dbebe336b06f3a9d8a7887bd52fd7ac82cb21e570c5c8479278ec5356dd2c26f0bd2279aeae08236f863f048faa2950fa9334752b58a7a9d8ae39314970
-
Filesize
246KB
MD524ab2efc7ddeff06ffdf4731a7e28310
SHA1fbe7df99bff91292c70b8e9fcdacbdbc3408fcd9
SHA256ec4bb16de307088bbf1673784a45ea4676310a6afd918494cccced0bc871c473
SHA51212da4aee03a13f9947af92351ea8f42a978e1bd2e2513db52fa1a9d0475bb35348f9320356c9f1f7ee8f378fad667161847ba845a02de0288609383770b7095f
-
Filesize
246KB
MD524ab2efc7ddeff06ffdf4731a7e28310
SHA1fbe7df99bff91292c70b8e9fcdacbdbc3408fcd9
SHA256ec4bb16de307088bbf1673784a45ea4676310a6afd918494cccced0bc871c473
SHA51212da4aee03a13f9947af92351ea8f42a978e1bd2e2513db52fa1a9d0475bb35348f9320356c9f1f7ee8f378fad667161847ba845a02de0288609383770b7095f
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
89KB
MD5c79b74d8fec5e7e2ba2f1789fd582a15
SHA178a1e5d99dbaccc5e07b125e1dfb280112cb3128
SHA256b5bd049d32f0faeea6ce65a0f0d326de5bc4427a7c1ad24bfb0ea050c1dec7d3
SHA5120debfc54904fd538cfb1fc648d18f90a991337200b3decf74b28ac2f341843fb3bab4f45bc92cfec333b18dfff9cc136854462e79054a39926a7bd8ee2e057ba
-
Filesize
89KB
MD5c79b74d8fec5e7e2ba2f1789fd582a15
SHA178a1e5d99dbaccc5e07b125e1dfb280112cb3128
SHA256b5bd049d32f0faeea6ce65a0f0d326de5bc4427a7c1ad24bfb0ea050c1dec7d3
SHA5120debfc54904fd538cfb1fc648d18f90a991337200b3decf74b28ac2f341843fb3bab4f45bc92cfec333b18dfff9cc136854462e79054a39926a7bd8ee2e057ba