Analysis
-
max time kernel
90s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2023, 12:51
Behavioral task
behavioral1
Sample
0x0006000000023167-1132.exe
Resource
win7-20230220-en
General
-
Target
0x0006000000023167-1132.exe
-
Size
235KB
-
MD5
a0466731c5317d85566b01f1142e3635
-
SHA1
c61f62ae49b45d6bd25f815072cd07b78e5889ef
-
SHA256
911e1bcf6ffeac92666eac2797ff8a419f815e25737bf4db32d9ad81333a77ad
-
SHA512
0de018b804dc994a423bc3d7b5a14b0d281d8242108c11377f7a0fdd58e76051f93f5fdf71e9c03269935facef19548ac3f2861790f4da5fafd26ac4e1eebf19
-
SSDEEP
6144:+/qDDbAZiwe41jLDzpZWS2ouViF3nxIkJk:S7xjLLW+uViZxI7
Malware Config
Extracted
amadey
3.68
193.233.20.25/buH5N004d/index.php
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation 0x0006000000023167-1132.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation ghaaer.exe -
Executes dropped EXE 3 IoCs
pid Process 3296 ghaaer.exe 4824 ghaaer.exe 4264 ghaaer.exe -
Loads dropped DLL 1 IoCs
pid Process 4480 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1872 schtasks.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4696 wrote to memory of 3296 4696 0x0006000000023167-1132.exe 86 PID 4696 wrote to memory of 3296 4696 0x0006000000023167-1132.exe 86 PID 4696 wrote to memory of 3296 4696 0x0006000000023167-1132.exe 86 PID 3296 wrote to memory of 1872 3296 ghaaer.exe 87 PID 3296 wrote to memory of 1872 3296 ghaaer.exe 87 PID 3296 wrote to memory of 1872 3296 ghaaer.exe 87 PID 3296 wrote to memory of 2384 3296 ghaaer.exe 89 PID 3296 wrote to memory of 2384 3296 ghaaer.exe 89 PID 3296 wrote to memory of 2384 3296 ghaaer.exe 89 PID 2384 wrote to memory of 1084 2384 cmd.exe 91 PID 2384 wrote to memory of 1084 2384 cmd.exe 91 PID 2384 wrote to memory of 1084 2384 cmd.exe 91 PID 2384 wrote to memory of 3720 2384 cmd.exe 92 PID 2384 wrote to memory of 3720 2384 cmd.exe 92 PID 2384 wrote to memory of 3720 2384 cmd.exe 92 PID 2384 wrote to memory of 2744 2384 cmd.exe 93 PID 2384 wrote to memory of 2744 2384 cmd.exe 93 PID 2384 wrote to memory of 2744 2384 cmd.exe 93 PID 2384 wrote to memory of 1796 2384 cmd.exe 94 PID 2384 wrote to memory of 1796 2384 cmd.exe 94 PID 2384 wrote to memory of 1796 2384 cmd.exe 94 PID 2384 wrote to memory of 4064 2384 cmd.exe 95 PID 2384 wrote to memory of 4064 2384 cmd.exe 95 PID 2384 wrote to memory of 4064 2384 cmd.exe 95 PID 2384 wrote to memory of 4236 2384 cmd.exe 96 PID 2384 wrote to memory of 4236 2384 cmd.exe 96 PID 2384 wrote to memory of 4236 2384 cmd.exe 96 PID 3296 wrote to memory of 4480 3296 ghaaer.exe 112 PID 3296 wrote to memory of 4480 3296 ghaaer.exe 112 PID 3296 wrote to memory of 4480 3296 ghaaer.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x0006000000023167-1132.exe"C:\Users\Admin\AppData\Local\Temp\0x0006000000023167-1132.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe"C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN ghaaer.exe /TR "C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe" /F3⤵
- Creates scheduled task(s)
PID:1872
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "ghaaer.exe" /P "Admin:N"&&CACLS "ghaaer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\46aee2aca4" /P "Admin:N"&&CACLS "..\46aee2aca4" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1084
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "ghaaer.exe" /P "Admin:N"4⤵PID:3720
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "ghaaer.exe" /P "Admin:R" /E4⤵PID:2744
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1796
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\46aee2aca4" /P "Admin:N"4⤵PID:4064
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\46aee2aca4" /P "Admin:R" /E4⤵PID:4236
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main3⤵
- Loads dropped DLL
PID:4480
-
-
-
C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exeC:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe1⤵
- Executes dropped EXE
PID:4824
-
C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exeC:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe1⤵
- Executes dropped EXE
PID:4264
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
235KB
MD5a0466731c5317d85566b01f1142e3635
SHA1c61f62ae49b45d6bd25f815072cd07b78e5889ef
SHA256911e1bcf6ffeac92666eac2797ff8a419f815e25737bf4db32d9ad81333a77ad
SHA5120de018b804dc994a423bc3d7b5a14b0d281d8242108c11377f7a0fdd58e76051f93f5fdf71e9c03269935facef19548ac3f2861790f4da5fafd26ac4e1eebf19
-
Filesize
235KB
MD5a0466731c5317d85566b01f1142e3635
SHA1c61f62ae49b45d6bd25f815072cd07b78e5889ef
SHA256911e1bcf6ffeac92666eac2797ff8a419f815e25737bf4db32d9ad81333a77ad
SHA5120de018b804dc994a423bc3d7b5a14b0d281d8242108c11377f7a0fdd58e76051f93f5fdf71e9c03269935facef19548ac3f2861790f4da5fafd26ac4e1eebf19
-
Filesize
235KB
MD5a0466731c5317d85566b01f1142e3635
SHA1c61f62ae49b45d6bd25f815072cd07b78e5889ef
SHA256911e1bcf6ffeac92666eac2797ff8a419f815e25737bf4db32d9ad81333a77ad
SHA5120de018b804dc994a423bc3d7b5a14b0d281d8242108c11377f7a0fdd58e76051f93f5fdf71e9c03269935facef19548ac3f2861790f4da5fafd26ac4e1eebf19
-
Filesize
235KB
MD5a0466731c5317d85566b01f1142e3635
SHA1c61f62ae49b45d6bd25f815072cd07b78e5889ef
SHA256911e1bcf6ffeac92666eac2797ff8a419f815e25737bf4db32d9ad81333a77ad
SHA5120de018b804dc994a423bc3d7b5a14b0d281d8242108c11377f7a0fdd58e76051f93f5fdf71e9c03269935facef19548ac3f2861790f4da5fafd26ac4e1eebf19
-
Filesize
235KB
MD5a0466731c5317d85566b01f1142e3635
SHA1c61f62ae49b45d6bd25f815072cd07b78e5889ef
SHA256911e1bcf6ffeac92666eac2797ff8a419f815e25737bf4db32d9ad81333a77ad
SHA5120de018b804dc994a423bc3d7b5a14b0d281d8242108c11377f7a0fdd58e76051f93f5fdf71e9c03269935facef19548ac3f2861790f4da5fafd26ac4e1eebf19
-
Filesize
89KB
MD529b9780bb2992d018ae312ed4180a663
SHA1592a993f9518c1ceab3186a8b5007826fa204b60
SHA256b0308039b578ab07a5710745e5895b90a88133c669ca14a8f1943845387d223a
SHA512988a85a0270759d2936e9ffcdf0b0543ad29a6be6342472e796b9ee2406730b8f892f9416fe385e58ecffc39862cc74604bc32a7920133209286ca20c0ac346d
-
Filesize
89KB
MD529b9780bb2992d018ae312ed4180a663
SHA1592a993f9518c1ceab3186a8b5007826fa204b60
SHA256b0308039b578ab07a5710745e5895b90a88133c669ca14a8f1943845387d223a
SHA512988a85a0270759d2936e9ffcdf0b0543ad29a6be6342472e796b9ee2406730b8f892f9416fe385e58ecffc39862cc74604bc32a7920133209286ca20c0ac346d
-
Filesize
89KB
MD529b9780bb2992d018ae312ed4180a663
SHA1592a993f9518c1ceab3186a8b5007826fa204b60
SHA256b0308039b578ab07a5710745e5895b90a88133c669ca14a8f1943845387d223a
SHA512988a85a0270759d2936e9ffcdf0b0543ad29a6be6342472e796b9ee2406730b8f892f9416fe385e58ecffc39862cc74604bc32a7920133209286ca20c0ac346d
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5