Analysis
-
max time kernel
91s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
03/03/2023, 12:51
Behavioral task
behavioral1
Sample
0x0006000000023167-1132.exe
Resource
win7-20230220-en
General
-
Target
0x0006000000023167-1132.exe
-
Size
235KB
-
MD5
a0466731c5317d85566b01f1142e3635
-
SHA1
c61f62ae49b45d6bd25f815072cd07b78e5889ef
-
SHA256
911e1bcf6ffeac92666eac2797ff8a419f815e25737bf4db32d9ad81333a77ad
-
SHA512
0de018b804dc994a423bc3d7b5a14b0d281d8242108c11377f7a0fdd58e76051f93f5fdf71e9c03269935facef19548ac3f2861790f4da5fafd26ac4e1eebf19
-
SSDEEP
6144:+/qDDbAZiwe41jLDzpZWS2ouViF3nxIkJk:S7xjLLW+uViZxI7
Malware Config
Extracted
amadey
3.68
193.233.20.25/buH5N004d/index.php
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1708 ghaaer.exe 1196 ghaaer.exe 1164 ghaaer.exe -
Loads dropped DLL 5 IoCs
pid Process 1284 0x0006000000023167-1132.exe 1404 rundll32.exe 1404 rundll32.exe 1404 rundll32.exe 1404 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1128 schtasks.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 1284 wrote to memory of 1708 1284 0x0006000000023167-1132.exe 28 PID 1284 wrote to memory of 1708 1284 0x0006000000023167-1132.exe 28 PID 1284 wrote to memory of 1708 1284 0x0006000000023167-1132.exe 28 PID 1284 wrote to memory of 1708 1284 0x0006000000023167-1132.exe 28 PID 1708 wrote to memory of 1128 1708 ghaaer.exe 29 PID 1708 wrote to memory of 1128 1708 ghaaer.exe 29 PID 1708 wrote to memory of 1128 1708 ghaaer.exe 29 PID 1708 wrote to memory of 1128 1708 ghaaer.exe 29 PID 1708 wrote to memory of 692 1708 ghaaer.exe 31 PID 1708 wrote to memory of 692 1708 ghaaer.exe 31 PID 1708 wrote to memory of 692 1708 ghaaer.exe 31 PID 1708 wrote to memory of 692 1708 ghaaer.exe 31 PID 692 wrote to memory of 868 692 cmd.exe 33 PID 692 wrote to memory of 868 692 cmd.exe 33 PID 692 wrote to memory of 868 692 cmd.exe 33 PID 692 wrote to memory of 868 692 cmd.exe 33 PID 692 wrote to memory of 1156 692 cmd.exe 34 PID 692 wrote to memory of 1156 692 cmd.exe 34 PID 692 wrote to memory of 1156 692 cmd.exe 34 PID 692 wrote to memory of 1156 692 cmd.exe 34 PID 692 wrote to memory of 1300 692 cmd.exe 35 PID 692 wrote to memory of 1300 692 cmd.exe 35 PID 692 wrote to memory of 1300 692 cmd.exe 35 PID 692 wrote to memory of 1300 692 cmd.exe 35 PID 692 wrote to memory of 988 692 cmd.exe 36 PID 692 wrote to memory of 988 692 cmd.exe 36 PID 692 wrote to memory of 988 692 cmd.exe 36 PID 692 wrote to memory of 988 692 cmd.exe 36 PID 692 wrote to memory of 984 692 cmd.exe 37 PID 692 wrote to memory of 984 692 cmd.exe 37 PID 692 wrote to memory of 984 692 cmd.exe 37 PID 692 wrote to memory of 984 692 cmd.exe 37 PID 692 wrote to memory of 1676 692 cmd.exe 38 PID 692 wrote to memory of 1676 692 cmd.exe 38 PID 692 wrote to memory of 1676 692 cmd.exe 38 PID 692 wrote to memory of 1676 692 cmd.exe 38 PID 1936 wrote to memory of 1196 1936 taskeng.exe 42 PID 1936 wrote to memory of 1196 1936 taskeng.exe 42 PID 1936 wrote to memory of 1196 1936 taskeng.exe 42 PID 1936 wrote to memory of 1196 1936 taskeng.exe 42 PID 1708 wrote to memory of 1404 1708 ghaaer.exe 43 PID 1708 wrote to memory of 1404 1708 ghaaer.exe 43 PID 1708 wrote to memory of 1404 1708 ghaaer.exe 43 PID 1708 wrote to memory of 1404 1708 ghaaer.exe 43 PID 1708 wrote to memory of 1404 1708 ghaaer.exe 43 PID 1708 wrote to memory of 1404 1708 ghaaer.exe 43 PID 1708 wrote to memory of 1404 1708 ghaaer.exe 43 PID 1936 wrote to memory of 1164 1936 taskeng.exe 44 PID 1936 wrote to memory of 1164 1936 taskeng.exe 44 PID 1936 wrote to memory of 1164 1936 taskeng.exe 44 PID 1936 wrote to memory of 1164 1936 taskeng.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x0006000000023167-1132.exe"C:\Users\Admin\AppData\Local\Temp\0x0006000000023167-1132.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe"C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN ghaaer.exe /TR "C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe" /F3⤵
- Creates scheduled task(s)
PID:1128
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "ghaaer.exe" /P "Admin:N"&&CACLS "ghaaer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\46aee2aca4" /P "Admin:N"&&CACLS "..\46aee2aca4" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:868
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "ghaaer.exe" /P "Admin:N"4⤵PID:1156
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "ghaaer.exe" /P "Admin:R" /E4⤵PID:1300
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:988
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\46aee2aca4" /P "Admin:N"4⤵PID:984
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\46aee2aca4" /P "Admin:R" /E4⤵PID:1676
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main3⤵
- Loads dropped DLL
PID:1404
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {C2A8EFFC-6CB2-4E6B-8A05-14BF95109992} S-1-5-21-3430344531-3702557399-3004411149-1000:WFSTZEPN\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exeC:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe2⤵
- Executes dropped EXE
PID:1196
-
-
C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exeC:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe2⤵
- Executes dropped EXE
PID:1164
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
235KB
MD5a0466731c5317d85566b01f1142e3635
SHA1c61f62ae49b45d6bd25f815072cd07b78e5889ef
SHA256911e1bcf6ffeac92666eac2797ff8a419f815e25737bf4db32d9ad81333a77ad
SHA5120de018b804dc994a423bc3d7b5a14b0d281d8242108c11377f7a0fdd58e76051f93f5fdf71e9c03269935facef19548ac3f2861790f4da5fafd26ac4e1eebf19
-
Filesize
235KB
MD5a0466731c5317d85566b01f1142e3635
SHA1c61f62ae49b45d6bd25f815072cd07b78e5889ef
SHA256911e1bcf6ffeac92666eac2797ff8a419f815e25737bf4db32d9ad81333a77ad
SHA5120de018b804dc994a423bc3d7b5a14b0d281d8242108c11377f7a0fdd58e76051f93f5fdf71e9c03269935facef19548ac3f2861790f4da5fafd26ac4e1eebf19
-
Filesize
235KB
MD5a0466731c5317d85566b01f1142e3635
SHA1c61f62ae49b45d6bd25f815072cd07b78e5889ef
SHA256911e1bcf6ffeac92666eac2797ff8a419f815e25737bf4db32d9ad81333a77ad
SHA5120de018b804dc994a423bc3d7b5a14b0d281d8242108c11377f7a0fdd58e76051f93f5fdf71e9c03269935facef19548ac3f2861790f4da5fafd26ac4e1eebf19
-
Filesize
235KB
MD5a0466731c5317d85566b01f1142e3635
SHA1c61f62ae49b45d6bd25f815072cd07b78e5889ef
SHA256911e1bcf6ffeac92666eac2797ff8a419f815e25737bf4db32d9ad81333a77ad
SHA5120de018b804dc994a423bc3d7b5a14b0d281d8242108c11377f7a0fdd58e76051f93f5fdf71e9c03269935facef19548ac3f2861790f4da5fafd26ac4e1eebf19
-
Filesize
235KB
MD5a0466731c5317d85566b01f1142e3635
SHA1c61f62ae49b45d6bd25f815072cd07b78e5889ef
SHA256911e1bcf6ffeac92666eac2797ff8a419f815e25737bf4db32d9ad81333a77ad
SHA5120de018b804dc994a423bc3d7b5a14b0d281d8242108c11377f7a0fdd58e76051f93f5fdf71e9c03269935facef19548ac3f2861790f4da5fafd26ac4e1eebf19
-
Filesize
89KB
MD529b9780bb2992d018ae312ed4180a663
SHA1592a993f9518c1ceab3186a8b5007826fa204b60
SHA256b0308039b578ab07a5710745e5895b90a88133c669ca14a8f1943845387d223a
SHA512988a85a0270759d2936e9ffcdf0b0543ad29a6be6342472e796b9ee2406730b8f892f9416fe385e58ecffc39862cc74604bc32a7920133209286ca20c0ac346d
-
Filesize
89KB
MD529b9780bb2992d018ae312ed4180a663
SHA1592a993f9518c1ceab3186a8b5007826fa204b60
SHA256b0308039b578ab07a5710745e5895b90a88133c669ca14a8f1943845387d223a
SHA512988a85a0270759d2936e9ffcdf0b0543ad29a6be6342472e796b9ee2406730b8f892f9416fe385e58ecffc39862cc74604bc32a7920133209286ca20c0ac346d
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
235KB
MD5a0466731c5317d85566b01f1142e3635
SHA1c61f62ae49b45d6bd25f815072cd07b78e5889ef
SHA256911e1bcf6ffeac92666eac2797ff8a419f815e25737bf4db32d9ad81333a77ad
SHA5120de018b804dc994a423bc3d7b5a14b0d281d8242108c11377f7a0fdd58e76051f93f5fdf71e9c03269935facef19548ac3f2861790f4da5fafd26ac4e1eebf19
-
Filesize
89KB
MD529b9780bb2992d018ae312ed4180a663
SHA1592a993f9518c1ceab3186a8b5007826fa204b60
SHA256b0308039b578ab07a5710745e5895b90a88133c669ca14a8f1943845387d223a
SHA512988a85a0270759d2936e9ffcdf0b0543ad29a6be6342472e796b9ee2406730b8f892f9416fe385e58ecffc39862cc74604bc32a7920133209286ca20c0ac346d
-
Filesize
89KB
MD529b9780bb2992d018ae312ed4180a663
SHA1592a993f9518c1ceab3186a8b5007826fa204b60
SHA256b0308039b578ab07a5710745e5895b90a88133c669ca14a8f1943845387d223a
SHA512988a85a0270759d2936e9ffcdf0b0543ad29a6be6342472e796b9ee2406730b8f892f9416fe385e58ecffc39862cc74604bc32a7920133209286ca20c0ac346d
-
Filesize
89KB
MD529b9780bb2992d018ae312ed4180a663
SHA1592a993f9518c1ceab3186a8b5007826fa204b60
SHA256b0308039b578ab07a5710745e5895b90a88133c669ca14a8f1943845387d223a
SHA512988a85a0270759d2936e9ffcdf0b0543ad29a6be6342472e796b9ee2406730b8f892f9416fe385e58ecffc39862cc74604bc32a7920133209286ca20c0ac346d
-
Filesize
89KB
MD529b9780bb2992d018ae312ed4180a663
SHA1592a993f9518c1ceab3186a8b5007826fa204b60
SHA256b0308039b578ab07a5710745e5895b90a88133c669ca14a8f1943845387d223a
SHA512988a85a0270759d2936e9ffcdf0b0543ad29a6be6342472e796b9ee2406730b8f892f9416fe385e58ecffc39862cc74604bc32a7920133209286ca20c0ac346d