Analysis
-
max time kernel
131s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
08/02/2023, 17:57
Static task
static1
Behavioral task
behavioral1
Sample
ede7fc6ebe1dcb09a9ef261291a766d474d17a4f66ca04a6f4e1304d888eed8f.exe
Resource
win10v2004-20220901-en
General
-
Target
ede7fc6ebe1dcb09a9ef261291a766d474d17a4f66ca04a6f4e1304d888eed8f.exe
-
Size
567KB
-
MD5
d64895a2de00a51b6eb8ea4ea5d23e96
-
SHA1
d5ebe9a196cd563f85cdbe011b86c19b764b19d8
-
SHA256
ede7fc6ebe1dcb09a9ef261291a766d474d17a4f66ca04a6f4e1304d888eed8f
-
SHA512
89deb974da8907c8e4818b2fb2dc735ded9fb2b406ef79f12debe354004ecd844d6d5598f239961b714dfc67d753b8681eb5b74a6b3427f76786ae6e161493ef
-
SSDEEP
12288:UMrFy90TWfmvp+1KETHl4tWW7NjaHeK9EF3OujJTR1:xyXfmB+Mc2YW6eK9EVR
Malware Config
Extracted
amadey
3.66
62.204.41.5/Bu58Ngs/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" mika.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" mika.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" mika.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" agqx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" agqx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" agqx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" agqx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection mika.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" mika.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" mika.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection agqx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" agqx.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation vona.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 7 IoCs
pid Process 4692 cgqu.exe 5016 agqx.exe 2604 mika.exe 3132 vona.exe 2500 mnolyk.exe 4256 mnolyk.exe 2388 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 1924 rundll32.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features agqx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" agqx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" mika.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ede7fc6ebe1dcb09a9ef261291a766d474d17a4f66ca04a6f4e1304d888eed8f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cgqu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" cgqu.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ede7fc6ebe1dcb09a9ef261291a766d474d17a4f66ca04a6f4e1304d888eed8f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3440 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5016 agqx.exe 5016 agqx.exe 2604 mika.exe 2604 mika.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5016 agqx.exe Token: SeDebugPrivilege 2604 mika.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1812 wrote to memory of 4692 1812 ede7fc6ebe1dcb09a9ef261291a766d474d17a4f66ca04a6f4e1304d888eed8f.exe 81 PID 1812 wrote to memory of 4692 1812 ede7fc6ebe1dcb09a9ef261291a766d474d17a4f66ca04a6f4e1304d888eed8f.exe 81 PID 1812 wrote to memory of 4692 1812 ede7fc6ebe1dcb09a9ef261291a766d474d17a4f66ca04a6f4e1304d888eed8f.exe 81 PID 4692 wrote to memory of 5016 4692 cgqu.exe 82 PID 4692 wrote to memory of 5016 4692 cgqu.exe 82 PID 4692 wrote to memory of 5016 4692 cgqu.exe 82 PID 4692 wrote to memory of 2604 4692 cgqu.exe 86 PID 4692 wrote to memory of 2604 4692 cgqu.exe 86 PID 1812 wrote to memory of 3132 1812 ede7fc6ebe1dcb09a9ef261291a766d474d17a4f66ca04a6f4e1304d888eed8f.exe 87 PID 1812 wrote to memory of 3132 1812 ede7fc6ebe1dcb09a9ef261291a766d474d17a4f66ca04a6f4e1304d888eed8f.exe 87 PID 1812 wrote to memory of 3132 1812 ede7fc6ebe1dcb09a9ef261291a766d474d17a4f66ca04a6f4e1304d888eed8f.exe 87 PID 3132 wrote to memory of 2500 3132 vona.exe 88 PID 3132 wrote to memory of 2500 3132 vona.exe 88 PID 3132 wrote to memory of 2500 3132 vona.exe 88 PID 2500 wrote to memory of 3440 2500 mnolyk.exe 89 PID 2500 wrote to memory of 3440 2500 mnolyk.exe 89 PID 2500 wrote to memory of 3440 2500 mnolyk.exe 89 PID 2500 wrote to memory of 4004 2500 mnolyk.exe 91 PID 2500 wrote to memory of 4004 2500 mnolyk.exe 91 PID 2500 wrote to memory of 4004 2500 mnolyk.exe 91 PID 4004 wrote to memory of 4352 4004 cmd.exe 93 PID 4004 wrote to memory of 4352 4004 cmd.exe 93 PID 4004 wrote to memory of 4352 4004 cmd.exe 93 PID 4004 wrote to memory of 1484 4004 cmd.exe 94 PID 4004 wrote to memory of 1484 4004 cmd.exe 94 PID 4004 wrote to memory of 1484 4004 cmd.exe 94 PID 4004 wrote to memory of 2288 4004 cmd.exe 95 PID 4004 wrote to memory of 2288 4004 cmd.exe 95 PID 4004 wrote to memory of 2288 4004 cmd.exe 95 PID 4004 wrote to memory of 2652 4004 cmd.exe 96 PID 4004 wrote to memory of 2652 4004 cmd.exe 96 PID 4004 wrote to memory of 2652 4004 cmd.exe 96 PID 4004 wrote to memory of 4696 4004 cmd.exe 97 PID 4004 wrote to memory of 4696 4004 cmd.exe 97 PID 4004 wrote to memory of 4696 4004 cmd.exe 97 PID 4004 wrote to memory of 424 4004 cmd.exe 99 PID 4004 wrote to memory of 424 4004 cmd.exe 99 PID 4004 wrote to memory of 424 4004 cmd.exe 99 PID 2500 wrote to memory of 1924 2500 mnolyk.exe 105 PID 2500 wrote to memory of 1924 2500 mnolyk.exe 105 PID 2500 wrote to memory of 1924 2500 mnolyk.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\ede7fc6ebe1dcb09a9ef261291a766d474d17a4f66ca04a6f4e1304d888eed8f.exe"C:\Users\Admin\AppData\Local\Temp\ede7fc6ebe1dcb09a9ef261291a766d474d17a4f66ca04a6f4e1304d888eed8f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cgqu.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cgqu.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\agqx.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\agqx.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5016
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mika.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mika.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vona.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vona.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe" /F4⤵
- Creates scheduled task(s)
PID:3440
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5eb6b96734" /P "Admin:N"&&CACLS "..\5eb6b96734" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4352
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"5⤵PID:1484
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E5⤵PID:2288
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2652
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:N"5⤵PID:4696
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:R" /E5⤵PID:424
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1924
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:4256
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:2388
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
380KB
MD5d8d0075d0375db0d7d4fce18dd0af9b2
SHA18c2c4579a7ec7660065a179379c744e3039a724e
SHA256063dfcf90eac2c36686929a5c735f15213fecccbce593a4333070c942eb784e4
SHA512b494e172b1ded4c0563feb643a1d0cadeef0bc48108a622c3bce38a77281cd40ef37a03e21669db5c3683170135a158a1d80573fc654085d4a1117492c05b323
-
Filesize
380KB
MD5d8d0075d0375db0d7d4fce18dd0af9b2
SHA18c2c4579a7ec7660065a179379c744e3039a724e
SHA256063dfcf90eac2c36686929a5c735f15213fecccbce593a4333070c942eb784e4
SHA512b494e172b1ded4c0563feb643a1d0cadeef0bc48108a622c3bce38a77281cd40ef37a03e21669db5c3683170135a158a1d80573fc654085d4a1117492c05b323
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
364KB
MD506e19bf4f39f6e632d91be87a226312a
SHA1cd0e1696ff00afb7d024eec8213a8f4e0228765c
SHA2569b6b4589bf5411e47f02676d798e11b09d09980915210184c72c4b2f75203fdd
SHA5120a52a1a2662a1781b5c41f82c542126c1d23854cb1b9a49c729241bd3de4d0a8feedc7dee1609429b3e0465a473e9d8e27ea28dfc4a41abec8ae3931f73f422c
-
Filesize
364KB
MD506e19bf4f39f6e632d91be87a226312a
SHA1cd0e1696ff00afb7d024eec8213a8f4e0228765c
SHA2569b6b4589bf5411e47f02676d798e11b09d09980915210184c72c4b2f75203fdd
SHA5120a52a1a2662a1781b5c41f82c542126c1d23854cb1b9a49c729241bd3de4d0a8feedc7dee1609429b3e0465a473e9d8e27ea28dfc4a41abec8ae3931f73f422c
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
89KB
MD59221a421a3e777eb7d4ce55e474bcc4a
SHA1c96d7bd7ccbf9352d50527bff472595b3dc5298e
SHA25610ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8
SHA51263ac172cb19c7c020676937cb35e853710d08e99e06e8cdcb410c37e0c9056af409a50fdec0c90a3c532edcf5e0f128fa1e2181063e1208d4fc4643b1b5736f3
-
Filesize
89KB
MD59221a421a3e777eb7d4ce55e474bcc4a
SHA1c96d7bd7ccbf9352d50527bff472595b3dc5298e
SHA25610ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8
SHA51263ac172cb19c7c020676937cb35e853710d08e99e06e8cdcb410c37e0c9056af409a50fdec0c90a3c532edcf5e0f128fa1e2181063e1208d4fc4643b1b5736f3