Analysis
-
max time kernel
114s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06-02-2023 11:05
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20221111-en
General
-
Target
tmp.exe
-
Size
235KB
-
MD5
ebd584e9c1a400cd5d4bafa0e7936468
-
SHA1
d263c62902326425ed17855d49d35003abcd797b
-
SHA256
ad1d5475d737c09e3c48f7996cd407c992c1bb5601bcc6c6287eb80cde3d852b
-
SHA512
e94b7bca0258e2f2fd374898c87196587311af4aa20f1197ef8d0fddcdc098fdd0096152d27b49cbe21a3527624339fe0c806c7aa4ea6c80b76764ee2245a010
-
SSDEEP
6144:pLUoeyDABOdDubDXqgraG0JzSRuVyL+VYLQqgE:plu0LgwJ4uVyaVqJ
Malware Config
Extracted
amadey
3.66
62.204.41.88/9vdVVVjsw/index.php
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
nbveek.exenbveek.exenbveek.exepid process 2024 nbveek.exe 552 nbveek.exe 1196 nbveek.exe -
Loads dropped DLL 11 IoCs
Processes:
tmp.exerundll32.exerundll32.exeWerFault.exepid process 840 tmp.exe 1544 rundll32.exe 1544 rundll32.exe 1544 rundll32.exe 1544 rundll32.exe 960 rundll32.exe 960 rundll32.exe 960 rundll32.exe 960 rundll32.exe 1508 WerFault.exe 1508 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1508 960 WerFault.exe rundll32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
tmp.exenbveek.execmd.exetaskeng.exerundll32.exerundll32.exedescription pid process target process PID 840 wrote to memory of 2024 840 tmp.exe nbveek.exe PID 840 wrote to memory of 2024 840 tmp.exe nbveek.exe PID 840 wrote to memory of 2024 840 tmp.exe nbveek.exe PID 840 wrote to memory of 2024 840 tmp.exe nbveek.exe PID 2024 wrote to memory of 568 2024 nbveek.exe schtasks.exe PID 2024 wrote to memory of 568 2024 nbveek.exe schtasks.exe PID 2024 wrote to memory of 568 2024 nbveek.exe schtasks.exe PID 2024 wrote to memory of 568 2024 nbveek.exe schtasks.exe PID 2024 wrote to memory of 1212 2024 nbveek.exe cmd.exe PID 2024 wrote to memory of 1212 2024 nbveek.exe cmd.exe PID 2024 wrote to memory of 1212 2024 nbveek.exe cmd.exe PID 2024 wrote to memory of 1212 2024 nbveek.exe cmd.exe PID 1212 wrote to memory of 1696 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1696 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1696 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1696 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1920 1212 cmd.exe cacls.exe PID 1212 wrote to memory of 1920 1212 cmd.exe cacls.exe PID 1212 wrote to memory of 1920 1212 cmd.exe cacls.exe PID 1212 wrote to memory of 1920 1212 cmd.exe cacls.exe PID 1212 wrote to memory of 1780 1212 cmd.exe cacls.exe PID 1212 wrote to memory of 1780 1212 cmd.exe cacls.exe PID 1212 wrote to memory of 1780 1212 cmd.exe cacls.exe PID 1212 wrote to memory of 1780 1212 cmd.exe cacls.exe PID 1212 wrote to memory of 1776 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1776 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1776 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1776 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1328 1212 cmd.exe cacls.exe PID 1212 wrote to memory of 1328 1212 cmd.exe cacls.exe PID 1212 wrote to memory of 1328 1212 cmd.exe cacls.exe PID 1212 wrote to memory of 1328 1212 cmd.exe cacls.exe PID 1212 wrote to memory of 1732 1212 cmd.exe cacls.exe PID 1212 wrote to memory of 1732 1212 cmd.exe cacls.exe PID 1212 wrote to memory of 1732 1212 cmd.exe cacls.exe PID 1212 wrote to memory of 1732 1212 cmd.exe cacls.exe PID 800 wrote to memory of 552 800 taskeng.exe nbveek.exe PID 800 wrote to memory of 552 800 taskeng.exe nbveek.exe PID 800 wrote to memory of 552 800 taskeng.exe nbveek.exe PID 800 wrote to memory of 552 800 taskeng.exe nbveek.exe PID 2024 wrote to memory of 1544 2024 nbveek.exe rundll32.exe PID 2024 wrote to memory of 1544 2024 nbveek.exe rundll32.exe PID 2024 wrote to memory of 1544 2024 nbveek.exe rundll32.exe PID 2024 wrote to memory of 1544 2024 nbveek.exe rundll32.exe PID 2024 wrote to memory of 1544 2024 nbveek.exe rundll32.exe PID 2024 wrote to memory of 1544 2024 nbveek.exe rundll32.exe PID 2024 wrote to memory of 1544 2024 nbveek.exe rundll32.exe PID 1544 wrote to memory of 960 1544 rundll32.exe rundll32.exe PID 1544 wrote to memory of 960 1544 rundll32.exe rundll32.exe PID 1544 wrote to memory of 960 1544 rundll32.exe rundll32.exe PID 1544 wrote to memory of 960 1544 rundll32.exe rundll32.exe PID 2024 wrote to memory of 1648 2024 nbveek.exe rundll32.exe PID 2024 wrote to memory of 1648 2024 nbveek.exe rundll32.exe PID 2024 wrote to memory of 1648 2024 nbveek.exe rundll32.exe PID 2024 wrote to memory of 1648 2024 nbveek.exe rundll32.exe PID 2024 wrote to memory of 1648 2024 nbveek.exe rundll32.exe PID 2024 wrote to memory of 1648 2024 nbveek.exe rundll32.exe PID 2024 wrote to memory of 1648 2024 nbveek.exe rundll32.exe PID 960 wrote to memory of 1508 960 rundll32.exe WerFault.exe PID 960 wrote to memory of 1508 960 rundll32.exe WerFault.exe PID 960 wrote to memory of 1508 960 rundll32.exe WerFault.exe PID 800 wrote to memory of 1196 800 taskeng.exe nbveek.exe PID 800 wrote to memory of 1196 800 taskeng.exe nbveek.exe PID 800 wrote to memory of 1196 800 taskeng.exe nbveek.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\9e0894bcc4\nbveek.exe"C:\Users\Admin\AppData\Local\Temp\9e0894bcc4\nbveek.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nbveek.exe /TR "C:\Users\Admin\AppData\Local\Temp\9e0894bcc4\nbveek.exe" /F3⤵
- Creates scheduled task(s)
PID:568
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "nbveek.exe" /P "Admin:N"&&CACLS "nbveek.exe" /P "Admin:R" /E&&echo Y|CACLS "..\9e0894bcc4" /P "Admin:N"&&CACLS "..\9e0894bcc4" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1696
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "nbveek.exe" /P "Admin:N"4⤵PID:1920
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "nbveek.exe" /P "Admin:R" /E4⤵PID:1780
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1776
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\9e0894bcc4" /P "Admin:N"4⤵PID:1328
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\9e0894bcc4" /P "Admin:R" /E4⤵PID:1732
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 960 -s 3445⤵
- Loads dropped DLL
- Program crash
PID:1508
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main3⤵PID:1648
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {40ADF585-B0DF-4A7F-9016-8FCF24D38AE8} S-1-5-21-3406023954-474543476-3319432036-1000:VUIIVLGQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Users\Admin\AppData\Local\Temp\9e0894bcc4\nbveek.exeC:\Users\Admin\AppData\Local\Temp\9e0894bcc4\nbveek.exe2⤵
- Executes dropped EXE
PID:552
-
-
C:\Users\Admin\AppData\Local\Temp\9e0894bcc4\nbveek.exeC:\Users\Admin\AppData\Local\Temp\9e0894bcc4\nbveek.exe2⤵
- Executes dropped EXE
PID:1196
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
235KB
MD5ebd584e9c1a400cd5d4bafa0e7936468
SHA1d263c62902326425ed17855d49d35003abcd797b
SHA256ad1d5475d737c09e3c48f7996cd407c992c1bb5601bcc6c6287eb80cde3d852b
SHA512e94b7bca0258e2f2fd374898c87196587311af4aa20f1197ef8d0fddcdc098fdd0096152d27b49cbe21a3527624339fe0c806c7aa4ea6c80b76764ee2245a010
-
Filesize
235KB
MD5ebd584e9c1a400cd5d4bafa0e7936468
SHA1d263c62902326425ed17855d49d35003abcd797b
SHA256ad1d5475d737c09e3c48f7996cd407c992c1bb5601bcc6c6287eb80cde3d852b
SHA512e94b7bca0258e2f2fd374898c87196587311af4aa20f1197ef8d0fddcdc098fdd0096152d27b49cbe21a3527624339fe0c806c7aa4ea6c80b76764ee2245a010
-
Filesize
235KB
MD5ebd584e9c1a400cd5d4bafa0e7936468
SHA1d263c62902326425ed17855d49d35003abcd797b
SHA256ad1d5475d737c09e3c48f7996cd407c992c1bb5601bcc6c6287eb80cde3d852b
SHA512e94b7bca0258e2f2fd374898c87196587311af4aa20f1197ef8d0fddcdc098fdd0096152d27b49cbe21a3527624339fe0c806c7aa4ea6c80b76764ee2245a010
-
Filesize
235KB
MD5ebd584e9c1a400cd5d4bafa0e7936468
SHA1d263c62902326425ed17855d49d35003abcd797b
SHA256ad1d5475d737c09e3c48f7996cd407c992c1bb5601bcc6c6287eb80cde3d852b
SHA512e94b7bca0258e2f2fd374898c87196587311af4aa20f1197ef8d0fddcdc098fdd0096152d27b49cbe21a3527624339fe0c806c7aa4ea6c80b76764ee2245a010
-
Filesize
1.0MB
MD5d1eb5caae43e95e1f369ca373a5e192d
SHA1bafa865f8f2cb5bddf951357e70af9fb011d6ac2
SHA256cdd4072239d8a62bf134e9884ef2829d831efaf3f6f7f71b7266af29df145dd0
SHA512e4f4fd7b4cfa15f5de203601e5317be2245df7cf1cb05eb9fac0a90fb2a01c42be9b6e31662d76b678c1bea731c467bed1aae61fe0c1cbb6fea3c159677b691a
-
Filesize
235KB
MD5ebd584e9c1a400cd5d4bafa0e7936468
SHA1d263c62902326425ed17855d49d35003abcd797b
SHA256ad1d5475d737c09e3c48f7996cd407c992c1bb5601bcc6c6287eb80cde3d852b
SHA512e94b7bca0258e2f2fd374898c87196587311af4aa20f1197ef8d0fddcdc098fdd0096152d27b49cbe21a3527624339fe0c806c7aa4ea6c80b76764ee2245a010
-
Filesize
1.0MB
MD5d1eb5caae43e95e1f369ca373a5e192d
SHA1bafa865f8f2cb5bddf951357e70af9fb011d6ac2
SHA256cdd4072239d8a62bf134e9884ef2829d831efaf3f6f7f71b7266af29df145dd0
SHA512e4f4fd7b4cfa15f5de203601e5317be2245df7cf1cb05eb9fac0a90fb2a01c42be9b6e31662d76b678c1bea731c467bed1aae61fe0c1cbb6fea3c159677b691a
-
Filesize
1.0MB
MD5d1eb5caae43e95e1f369ca373a5e192d
SHA1bafa865f8f2cb5bddf951357e70af9fb011d6ac2
SHA256cdd4072239d8a62bf134e9884ef2829d831efaf3f6f7f71b7266af29df145dd0
SHA512e4f4fd7b4cfa15f5de203601e5317be2245df7cf1cb05eb9fac0a90fb2a01c42be9b6e31662d76b678c1bea731c467bed1aae61fe0c1cbb6fea3c159677b691a
-
Filesize
1.0MB
MD5d1eb5caae43e95e1f369ca373a5e192d
SHA1bafa865f8f2cb5bddf951357e70af9fb011d6ac2
SHA256cdd4072239d8a62bf134e9884ef2829d831efaf3f6f7f71b7266af29df145dd0
SHA512e4f4fd7b4cfa15f5de203601e5317be2245df7cf1cb05eb9fac0a90fb2a01c42be9b6e31662d76b678c1bea731c467bed1aae61fe0c1cbb6fea3c159677b691a
-
Filesize
1.0MB
MD5d1eb5caae43e95e1f369ca373a5e192d
SHA1bafa865f8f2cb5bddf951357e70af9fb011d6ac2
SHA256cdd4072239d8a62bf134e9884ef2829d831efaf3f6f7f71b7266af29df145dd0
SHA512e4f4fd7b4cfa15f5de203601e5317be2245df7cf1cb05eb9fac0a90fb2a01c42be9b6e31662d76b678c1bea731c467bed1aae61fe0c1cbb6fea3c159677b691a
-
Filesize
1.0MB
MD5d1eb5caae43e95e1f369ca373a5e192d
SHA1bafa865f8f2cb5bddf951357e70af9fb011d6ac2
SHA256cdd4072239d8a62bf134e9884ef2829d831efaf3f6f7f71b7266af29df145dd0
SHA512e4f4fd7b4cfa15f5de203601e5317be2245df7cf1cb05eb9fac0a90fb2a01c42be9b6e31662d76b678c1bea731c467bed1aae61fe0c1cbb6fea3c159677b691a
-
Filesize
1.0MB
MD5d1eb5caae43e95e1f369ca373a5e192d
SHA1bafa865f8f2cb5bddf951357e70af9fb011d6ac2
SHA256cdd4072239d8a62bf134e9884ef2829d831efaf3f6f7f71b7266af29df145dd0
SHA512e4f4fd7b4cfa15f5de203601e5317be2245df7cf1cb05eb9fac0a90fb2a01c42be9b6e31662d76b678c1bea731c467bed1aae61fe0c1cbb6fea3c159677b691a
-
Filesize
1.0MB
MD5d1eb5caae43e95e1f369ca373a5e192d
SHA1bafa865f8f2cb5bddf951357e70af9fb011d6ac2
SHA256cdd4072239d8a62bf134e9884ef2829d831efaf3f6f7f71b7266af29df145dd0
SHA512e4f4fd7b4cfa15f5de203601e5317be2245df7cf1cb05eb9fac0a90fb2a01c42be9b6e31662d76b678c1bea731c467bed1aae61fe0c1cbb6fea3c159677b691a
-
Filesize
1.0MB
MD5d1eb5caae43e95e1f369ca373a5e192d
SHA1bafa865f8f2cb5bddf951357e70af9fb011d6ac2
SHA256cdd4072239d8a62bf134e9884ef2829d831efaf3f6f7f71b7266af29df145dd0
SHA512e4f4fd7b4cfa15f5de203601e5317be2245df7cf1cb05eb9fac0a90fb2a01c42be9b6e31662d76b678c1bea731c467bed1aae61fe0c1cbb6fea3c159677b691a
-
Filesize
1.0MB
MD5d1eb5caae43e95e1f369ca373a5e192d
SHA1bafa865f8f2cb5bddf951357e70af9fb011d6ac2
SHA256cdd4072239d8a62bf134e9884ef2829d831efaf3f6f7f71b7266af29df145dd0
SHA512e4f4fd7b4cfa15f5de203601e5317be2245df7cf1cb05eb9fac0a90fb2a01c42be9b6e31662d76b678c1bea731c467bed1aae61fe0c1cbb6fea3c159677b691a
-
Filesize
1.0MB
MD5d1eb5caae43e95e1f369ca373a5e192d
SHA1bafa865f8f2cb5bddf951357e70af9fb011d6ac2
SHA256cdd4072239d8a62bf134e9884ef2829d831efaf3f6f7f71b7266af29df145dd0
SHA512e4f4fd7b4cfa15f5de203601e5317be2245df7cf1cb05eb9fac0a90fb2a01c42be9b6e31662d76b678c1bea731c467bed1aae61fe0c1cbb6fea3c159677b691a