Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06-02-2023 14:52
Static task
static1
Behavioral task
behavioral1
Sample
7596e5fb7ed87a05caad0c678228c0950221e028bc78918916e57b48dfdc847e.exe
Resource
win10v2004-20220901-en
General
-
Target
7596e5fb7ed87a05caad0c678228c0950221e028bc78918916e57b48dfdc847e.exe
-
Size
577KB
-
MD5
384f4b21c6f9bf3de48b516b0440397e
-
SHA1
2e0d9b47762b65c94e38e4019cec891683c599bf
-
SHA256
7596e5fb7ed87a05caad0c678228c0950221e028bc78918916e57b48dfdc847e
-
SHA512
316666a02a633a613a607b4a092addd122769c75a2413cdbdb13054e461477ef792c72134164517d1fdcdcc389e20477229c7cfae3cd1ab2b74d55adf4ab6413
-
SSDEEP
12288:cMrXy90dSVpL5JSbFgDPJaayoSFVKqGUDvizF1Q4:zyrpLw8P4Ya5GmI1Q4
Malware Config
Extracted
amadey
3.66
62.204.41.5/Bu58Ngs/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" arDx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" mika.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" mika.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection arDx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" arDx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" arDx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" mika.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" mika.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" mika.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" arDx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" arDx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection mika.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation vona.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 7 IoCs
pid Process 4924 crDn.exe 4820 arDx.exe 396 mika.exe 2268 vona.exe 2696 mnolyk.exe 3588 mnolyk.exe 1672 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 3176 rundll32.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features arDx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" arDx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" mika.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7596e5fb7ed87a05caad0c678228c0950221e028bc78918916e57b48dfdc847e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7596e5fb7ed87a05caad0c678228c0950221e028bc78918916e57b48dfdc847e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce crDn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" crDn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1868 4820 WerFault.exe 81 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3348 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4820 arDx.exe 4820 arDx.exe 396 mika.exe 396 mika.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4820 arDx.exe Token: SeDebugPrivilege 396 mika.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 4396 wrote to memory of 4924 4396 7596e5fb7ed87a05caad0c678228c0950221e028bc78918916e57b48dfdc847e.exe 80 PID 4396 wrote to memory of 4924 4396 7596e5fb7ed87a05caad0c678228c0950221e028bc78918916e57b48dfdc847e.exe 80 PID 4396 wrote to memory of 4924 4396 7596e5fb7ed87a05caad0c678228c0950221e028bc78918916e57b48dfdc847e.exe 80 PID 4924 wrote to memory of 4820 4924 crDn.exe 81 PID 4924 wrote to memory of 4820 4924 crDn.exe 81 PID 4924 wrote to memory of 4820 4924 crDn.exe 81 PID 4924 wrote to memory of 396 4924 crDn.exe 88 PID 4924 wrote to memory of 396 4924 crDn.exe 88 PID 4396 wrote to memory of 2268 4396 7596e5fb7ed87a05caad0c678228c0950221e028bc78918916e57b48dfdc847e.exe 89 PID 4396 wrote to memory of 2268 4396 7596e5fb7ed87a05caad0c678228c0950221e028bc78918916e57b48dfdc847e.exe 89 PID 4396 wrote to memory of 2268 4396 7596e5fb7ed87a05caad0c678228c0950221e028bc78918916e57b48dfdc847e.exe 89 PID 2268 wrote to memory of 2696 2268 vona.exe 90 PID 2268 wrote to memory of 2696 2268 vona.exe 90 PID 2268 wrote to memory of 2696 2268 vona.exe 90 PID 2696 wrote to memory of 3348 2696 mnolyk.exe 91 PID 2696 wrote to memory of 3348 2696 mnolyk.exe 91 PID 2696 wrote to memory of 3348 2696 mnolyk.exe 91 PID 2696 wrote to memory of 3964 2696 mnolyk.exe 93 PID 2696 wrote to memory of 3964 2696 mnolyk.exe 93 PID 2696 wrote to memory of 3964 2696 mnolyk.exe 93 PID 3964 wrote to memory of 2664 3964 cmd.exe 95 PID 3964 wrote to memory of 2664 3964 cmd.exe 95 PID 3964 wrote to memory of 2664 3964 cmd.exe 95 PID 3964 wrote to memory of 1272 3964 cmd.exe 96 PID 3964 wrote to memory of 1272 3964 cmd.exe 96 PID 3964 wrote to memory of 1272 3964 cmd.exe 96 PID 3964 wrote to memory of 1380 3964 cmd.exe 97 PID 3964 wrote to memory of 1380 3964 cmd.exe 97 PID 3964 wrote to memory of 1380 3964 cmd.exe 97 PID 3964 wrote to memory of 5096 3964 cmd.exe 98 PID 3964 wrote to memory of 5096 3964 cmd.exe 98 PID 3964 wrote to memory of 5096 3964 cmd.exe 98 PID 3964 wrote to memory of 1064 3964 cmd.exe 99 PID 3964 wrote to memory of 1064 3964 cmd.exe 99 PID 3964 wrote to memory of 1064 3964 cmd.exe 99 PID 3964 wrote to memory of 4204 3964 cmd.exe 100 PID 3964 wrote to memory of 4204 3964 cmd.exe 100 PID 3964 wrote to memory of 4204 3964 cmd.exe 100 PID 2696 wrote to memory of 3176 2696 mnolyk.exe 106 PID 2696 wrote to memory of 3176 2696 mnolyk.exe 106 PID 2696 wrote to memory of 3176 2696 mnolyk.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\7596e5fb7ed87a05caad0c678228c0950221e028bc78918916e57b48dfdc847e.exe"C:\Users\Admin\AppData\Local\Temp\7596e5fb7ed87a05caad0c678228c0950221e028bc78918916e57b48dfdc847e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crDn.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crDn.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\arDx.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\arDx.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4820 -s 10764⤵
- Program crash
PID:1868
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mika.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mika.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:396
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vona.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vona.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe" /F4⤵
- Creates scheduled task(s)
PID:3348
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5eb6b96734" /P "Admin:N"&&CACLS "..\5eb6b96734" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2664
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"5⤵PID:1272
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E5⤵PID:1380
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:5096
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:N"5⤵PID:1064
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:R" /E5⤵PID:4204
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3176
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4820 -ip 48201⤵PID:680
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:3588
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:1672
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
391KB
MD5cdea2b71e0716ba8f1a338696df06dc3
SHA1008f29f3f6abeb7e3428674ac4b46800562ce974
SHA256a325e0d7e09375df0223dd9cc0371b64c5dd92da709f0cf4eec50029570dc073
SHA5122d8c6bac7286f13d7cbdb9ed307ff4e9edeeb0cec166bcb15b0c0f1b13ce525eac8bc8862a99d8742bf7f89fb97482683a97c8e41e96cd235bcd6576660ee324
-
Filesize
391KB
MD5cdea2b71e0716ba8f1a338696df06dc3
SHA1008f29f3f6abeb7e3428674ac4b46800562ce974
SHA256a325e0d7e09375df0223dd9cc0371b64c5dd92da709f0cf4eec50029570dc073
SHA5122d8c6bac7286f13d7cbdb9ed307ff4e9edeeb0cec166bcb15b0c0f1b13ce525eac8bc8862a99d8742bf7f89fb97482683a97c8e41e96cd235bcd6576660ee324
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
363KB
MD5a1766f3464e706cabd3e6f6b5e476dfb
SHA1b8d413d50f3662963ae3f4c7f293a7ceb860055a
SHA2563da6c10c84ba21f105fdd1f753dabf249cf66c14ef9f786ee1215c7af1e23c84
SHA512178354c9ec0d4297a7ccfae7905c071081e9b4c1e032147f8281acb7212c14cc003a4a369848a62c16495c8aad63eaeaa0c94bf77da769f189bcc900742a89cd
-
Filesize
363KB
MD5a1766f3464e706cabd3e6f6b5e476dfb
SHA1b8d413d50f3662963ae3f4c7f293a7ceb860055a
SHA2563da6c10c84ba21f105fdd1f753dabf249cf66c14ef9f786ee1215c7af1e23c84
SHA512178354c9ec0d4297a7ccfae7905c071081e9b4c1e032147f8281acb7212c14cc003a4a369848a62c16495c8aad63eaeaa0c94bf77da769f189bcc900742a89cd
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
89KB
MD59221a421a3e777eb7d4ce55e474bcc4a
SHA1c96d7bd7ccbf9352d50527bff472595b3dc5298e
SHA25610ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8
SHA51263ac172cb19c7c020676937cb35e853710d08e99e06e8cdcb410c37e0c9056af409a50fdec0c90a3c532edcf5e0f128fa1e2181063e1208d4fc4643b1b5736f3
-
Filesize
89KB
MD59221a421a3e777eb7d4ce55e474bcc4a
SHA1c96d7bd7ccbf9352d50527bff472595b3dc5298e
SHA25610ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8
SHA51263ac172cb19c7c020676937cb35e853710d08e99e06e8cdcb410c37e0c9056af409a50fdec0c90a3c532edcf5e0f128fa1e2181063e1208d4fc4643b1b5736f3