Analysis
-
max time kernel
172s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
09/02/2023, 02:34
Static task
static1
Behavioral task
behavioral1
Sample
6b8899f3557b05cde864b82a0098b671488d3571395be11636026164439eb33e.exe
Resource
win10v2004-20220812-en
General
-
Target
6b8899f3557b05cde864b82a0098b671488d3571395be11636026164439eb33e.exe
-
Size
566KB
-
MD5
b53458a8c9fcaed477e0cd8664ba7e93
-
SHA1
abe0b683823d451a030733a151b6c5e50a4b69ea
-
SHA256
6b8899f3557b05cde864b82a0098b671488d3571395be11636026164439eb33e
-
SHA512
bb6a36047fbf406d37efe69ce04ea8b2e86a8e729d0a189bc0bdc32f1784cc4a4b181d5b8a5fcaf5d0b0296ebe387328dad8c3b1af4da7a926c1fd3ba32bcb4d
-
SSDEEP
12288:bMrUy90DHgWB0zFjRw45GBLFB/7D/EeUulKOdKW:3yqgWC2L7v/EexYW
Malware Config
Extracted
amadey
3.66
62.204.41.5/Bu58Ngs/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" amQx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" amQx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" mika.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" mika.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" mika.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection amQx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" amQx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" amQx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" amQx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection mika.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" mika.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" mika.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation vona.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 7 IoCs
pid Process 4816 cmQu.exe 4892 amQx.exe 4992 mika.exe 2244 vona.exe 344 mnolyk.exe 4676 mnolyk.exe 4016 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 4836 rundll32.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features amQx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" amQx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" mika.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6b8899f3557b05cde864b82a0098b671488d3571395be11636026164439eb33e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cmQu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" cmQu.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6b8899f3557b05cde864b82a0098b671488d3571395be11636026164439eb33e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4980 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4892 amQx.exe 4892 amQx.exe 4992 mika.exe 4992 mika.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4892 amQx.exe Token: SeDebugPrivilege 4992 mika.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 4932 wrote to memory of 4816 4932 6b8899f3557b05cde864b82a0098b671488d3571395be11636026164439eb33e.exe 80 PID 4932 wrote to memory of 4816 4932 6b8899f3557b05cde864b82a0098b671488d3571395be11636026164439eb33e.exe 80 PID 4932 wrote to memory of 4816 4932 6b8899f3557b05cde864b82a0098b671488d3571395be11636026164439eb33e.exe 80 PID 4816 wrote to memory of 4892 4816 cmQu.exe 81 PID 4816 wrote to memory of 4892 4816 cmQu.exe 81 PID 4816 wrote to memory of 4892 4816 cmQu.exe 81 PID 4816 wrote to memory of 4992 4816 cmQu.exe 84 PID 4816 wrote to memory of 4992 4816 cmQu.exe 84 PID 4932 wrote to memory of 2244 4932 6b8899f3557b05cde864b82a0098b671488d3571395be11636026164439eb33e.exe 85 PID 4932 wrote to memory of 2244 4932 6b8899f3557b05cde864b82a0098b671488d3571395be11636026164439eb33e.exe 85 PID 4932 wrote to memory of 2244 4932 6b8899f3557b05cde864b82a0098b671488d3571395be11636026164439eb33e.exe 85 PID 2244 wrote to memory of 344 2244 vona.exe 86 PID 2244 wrote to memory of 344 2244 vona.exe 86 PID 2244 wrote to memory of 344 2244 vona.exe 86 PID 344 wrote to memory of 4980 344 mnolyk.exe 87 PID 344 wrote to memory of 4980 344 mnolyk.exe 87 PID 344 wrote to memory of 4980 344 mnolyk.exe 87 PID 344 wrote to memory of 1908 344 mnolyk.exe 89 PID 344 wrote to memory of 1908 344 mnolyk.exe 89 PID 344 wrote to memory of 1908 344 mnolyk.exe 89 PID 1908 wrote to memory of 3892 1908 cmd.exe 91 PID 1908 wrote to memory of 3892 1908 cmd.exe 91 PID 1908 wrote to memory of 3892 1908 cmd.exe 91 PID 1908 wrote to memory of 3304 1908 cmd.exe 92 PID 1908 wrote to memory of 3304 1908 cmd.exe 92 PID 1908 wrote to memory of 3304 1908 cmd.exe 92 PID 1908 wrote to memory of 3648 1908 cmd.exe 93 PID 1908 wrote to memory of 3648 1908 cmd.exe 93 PID 1908 wrote to memory of 3648 1908 cmd.exe 93 PID 1908 wrote to memory of 1268 1908 cmd.exe 94 PID 1908 wrote to memory of 1268 1908 cmd.exe 94 PID 1908 wrote to memory of 1268 1908 cmd.exe 94 PID 1908 wrote to memory of 2876 1908 cmd.exe 95 PID 1908 wrote to memory of 2876 1908 cmd.exe 95 PID 1908 wrote to memory of 2876 1908 cmd.exe 95 PID 1908 wrote to memory of 3912 1908 cmd.exe 96 PID 1908 wrote to memory of 3912 1908 cmd.exe 96 PID 1908 wrote to memory of 3912 1908 cmd.exe 96 PID 344 wrote to memory of 4836 344 mnolyk.exe 98 PID 344 wrote to memory of 4836 344 mnolyk.exe 98 PID 344 wrote to memory of 4836 344 mnolyk.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b8899f3557b05cde864b82a0098b671488d3571395be11636026164439eb33e.exe"C:\Users\Admin\AppData\Local\Temp\6b8899f3557b05cde864b82a0098b671488d3571395be11636026164439eb33e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cmQu.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cmQu.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\amQx.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\amQx.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4892
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mika.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mika.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vona.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vona.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe" /F4⤵
- Creates scheduled task(s)
PID:4980
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5eb6b96734" /P "Admin:N"&&CACLS "..\5eb6b96734" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3892
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"5⤵PID:3304
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E5⤵PID:3648
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1268
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:N"5⤵PID:2876
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:R" /E5⤵PID:3912
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4836
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:4676
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:4016
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
379KB
MD52d8fbea381eefb150c252d799d5d2fbd
SHA135c31c249d16ace4e4537955d8d199273f011a24
SHA2562ef19befc6f7ce3a2954c912453082601e2fdd4279292d58a069832f3cb4728b
SHA512172c88871849b0eb5aba44410bf701db80fc5571cb304f156826c3f929b22bd19da50cd02b88aba67d3a79d81ce2e4cf7454d6db219846122e3d0b2773e58a17
-
Filesize
379KB
MD52d8fbea381eefb150c252d799d5d2fbd
SHA135c31c249d16ace4e4537955d8d199273f011a24
SHA2562ef19befc6f7ce3a2954c912453082601e2fdd4279292d58a069832f3cb4728b
SHA512172c88871849b0eb5aba44410bf701db80fc5571cb304f156826c3f929b22bd19da50cd02b88aba67d3a79d81ce2e4cf7454d6db219846122e3d0b2773e58a17
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
364KB
MD55f35b6528430a65d81ca059a7855d12e
SHA128ff9b5a70d1e1dba46a724850f5c1e282281a8a
SHA2569ec87ddce0d1e999ac96f93401657c9a0dcb12c8f9a75df72ce69cba2190972d
SHA512d1470a9f713ea1a857a985a12931b6b4e61d1ba5201084abd15b34408c4f029f4e2bf21f1ed311c08abf016866c006521e37c55a0add85fdabe6e7ff1267de95
-
Filesize
364KB
MD55f35b6528430a65d81ca059a7855d12e
SHA128ff9b5a70d1e1dba46a724850f5c1e282281a8a
SHA2569ec87ddce0d1e999ac96f93401657c9a0dcb12c8f9a75df72ce69cba2190972d
SHA512d1470a9f713ea1a857a985a12931b6b4e61d1ba5201084abd15b34408c4f029f4e2bf21f1ed311c08abf016866c006521e37c55a0add85fdabe6e7ff1267de95
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
89KB
MD59221a421a3e777eb7d4ce55e474bcc4a
SHA1c96d7bd7ccbf9352d50527bff472595b3dc5298e
SHA25610ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8
SHA51263ac172cb19c7c020676937cb35e853710d08e99e06e8cdcb410c37e0c9056af409a50fdec0c90a3c532edcf5e0f128fa1e2181063e1208d4fc4643b1b5736f3
-
Filesize
89KB
MD59221a421a3e777eb7d4ce55e474bcc4a
SHA1c96d7bd7ccbf9352d50527bff472595b3dc5298e
SHA25610ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8
SHA51263ac172cb19c7c020676937cb35e853710d08e99e06e8cdcb410c37e0c9056af409a50fdec0c90a3c532edcf5e0f128fa1e2181063e1208d4fc4643b1b5736f3