Analysis
-
max time kernel
185s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
10-02-2023 09:43
Behavioral task
behavioral1
Sample
b00302c7a37d30e1d649945bce637c2be5ef5a1055e572df9866ef8281964b65.exe
Resource
win7-20220812-en
General
-
Target
b00302c7a37d30e1d649945bce637c2be5ef5a1055e572df9866ef8281964b65.exe
-
Size
235KB
-
MD5
6779cd6f17fa7536c4490cc6d72a00a0
-
SHA1
2976ecc0ecc2800be22fa92868c2173a44e04ee0
-
SHA256
b00302c7a37d30e1d649945bce637c2be5ef5a1055e572df9866ef8281964b65
-
SHA512
88e8e38e1c664ebe1aa3c9f7601496b83f3c7ca9916a49573d169a33ae697602737505aaa2af755b6bea19dc38064742876b585a41c6ffaac172a44fb8bdc482
-
SSDEEP
6144:eLUoeyDABOdDubDXqgraG0JzSRuVyL+VYjQqgE:elu0LgwJ4uVyaV+J
Malware Config
Extracted
amadey
3.66
62.204.41.242/9vZbns/index.php
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation b00302c7a37d30e1d649945bce637c2be5ef5a1055e572df9866ef8281964b65.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation nbveek.exe -
Executes dropped EXE 3 IoCs
pid Process 4980 nbveek.exe 3900 nbveek.exe 4452 nbveek.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4868 schtasks.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 928 wrote to memory of 4980 928 b00302c7a37d30e1d649945bce637c2be5ef5a1055e572df9866ef8281964b65.exe 80 PID 928 wrote to memory of 4980 928 b00302c7a37d30e1d649945bce637c2be5ef5a1055e572df9866ef8281964b65.exe 80 PID 928 wrote to memory of 4980 928 b00302c7a37d30e1d649945bce637c2be5ef5a1055e572df9866ef8281964b65.exe 80 PID 4980 wrote to memory of 4868 4980 nbveek.exe 81 PID 4980 wrote to memory of 4868 4980 nbveek.exe 81 PID 4980 wrote to memory of 4868 4980 nbveek.exe 81 PID 4980 wrote to memory of 4848 4980 nbveek.exe 83 PID 4980 wrote to memory of 4848 4980 nbveek.exe 83 PID 4980 wrote to memory of 4848 4980 nbveek.exe 83 PID 4848 wrote to memory of 3372 4848 cmd.exe 85 PID 4848 wrote to memory of 3372 4848 cmd.exe 85 PID 4848 wrote to memory of 3372 4848 cmd.exe 85 PID 4848 wrote to memory of 4576 4848 cmd.exe 86 PID 4848 wrote to memory of 4576 4848 cmd.exe 86 PID 4848 wrote to memory of 4576 4848 cmd.exe 86 PID 4848 wrote to memory of 4128 4848 cmd.exe 87 PID 4848 wrote to memory of 4128 4848 cmd.exe 87 PID 4848 wrote to memory of 4128 4848 cmd.exe 87 PID 4848 wrote to memory of 4260 4848 cmd.exe 88 PID 4848 wrote to memory of 4260 4848 cmd.exe 88 PID 4848 wrote to memory of 4260 4848 cmd.exe 88 PID 4848 wrote to memory of 4380 4848 cmd.exe 89 PID 4848 wrote to memory of 4380 4848 cmd.exe 89 PID 4848 wrote to memory of 4380 4848 cmd.exe 89 PID 4848 wrote to memory of 2760 4848 cmd.exe 90 PID 4848 wrote to memory of 2760 4848 cmd.exe 90 PID 4848 wrote to memory of 2760 4848 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\b00302c7a37d30e1d649945bce637c2be5ef5a1055e572df9866ef8281964b65.exe"C:\Users\Admin\AppData\Local\Temp\b00302c7a37d30e1d649945bce637c2be5ef5a1055e572df9866ef8281964b65.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\nbveek.exe"C:\Users\Admin\AppData\Local\Temp\4b9a106e76\nbveek.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nbveek.exe /TR "C:\Users\Admin\AppData\Local\Temp\4b9a106e76\nbveek.exe" /F3⤵
- Creates scheduled task(s)
PID:4868
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "nbveek.exe" /P "Admin:N"&&CACLS "nbveek.exe" /P "Admin:R" /E&&echo Y|CACLS "..\4b9a106e76" /P "Admin:N"&&CACLS "..\4b9a106e76" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:3372
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "nbveek.exe" /P "Admin:N"4⤵PID:4576
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "nbveek.exe" /P "Admin:R" /E4⤵PID:4128
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:4260
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4b9a106e76" /P "Admin:N"4⤵PID:4380
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4b9a106e76" /P "Admin:R" /E4⤵PID:2760
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\nbveek.exeC:\Users\Admin\AppData\Local\Temp\4b9a106e76\nbveek.exe1⤵
- Executes dropped EXE
PID:3900
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\nbveek.exeC:\Users\Admin\AppData\Local\Temp\4b9a106e76\nbveek.exe1⤵
- Executes dropped EXE
PID:4452
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
235KB
MD56779cd6f17fa7536c4490cc6d72a00a0
SHA12976ecc0ecc2800be22fa92868c2173a44e04ee0
SHA256b00302c7a37d30e1d649945bce637c2be5ef5a1055e572df9866ef8281964b65
SHA51288e8e38e1c664ebe1aa3c9f7601496b83f3c7ca9916a49573d169a33ae697602737505aaa2af755b6bea19dc38064742876b585a41c6ffaac172a44fb8bdc482
-
Filesize
235KB
MD56779cd6f17fa7536c4490cc6d72a00a0
SHA12976ecc0ecc2800be22fa92868c2173a44e04ee0
SHA256b00302c7a37d30e1d649945bce637c2be5ef5a1055e572df9866ef8281964b65
SHA51288e8e38e1c664ebe1aa3c9f7601496b83f3c7ca9916a49573d169a33ae697602737505aaa2af755b6bea19dc38064742876b585a41c6ffaac172a44fb8bdc482
-
Filesize
235KB
MD56779cd6f17fa7536c4490cc6d72a00a0
SHA12976ecc0ecc2800be22fa92868c2173a44e04ee0
SHA256b00302c7a37d30e1d649945bce637c2be5ef5a1055e572df9866ef8281964b65
SHA51288e8e38e1c664ebe1aa3c9f7601496b83f3c7ca9916a49573d169a33ae697602737505aaa2af755b6bea19dc38064742876b585a41c6ffaac172a44fb8bdc482
-
Filesize
235KB
MD56779cd6f17fa7536c4490cc6d72a00a0
SHA12976ecc0ecc2800be22fa92868c2173a44e04ee0
SHA256b00302c7a37d30e1d649945bce637c2be5ef5a1055e572df9866ef8281964b65
SHA51288e8e38e1c664ebe1aa3c9f7601496b83f3c7ca9916a49573d169a33ae697602737505aaa2af755b6bea19dc38064742876b585a41c6ffaac172a44fb8bdc482