Analysis
-
max time kernel
135s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
03/03/2023, 13:29
Behavioral task
behavioral1
Sample
0x00080000000133d2-1051.exe
Resource
win7-20230220-en
General
-
Target
0x00080000000133d2-1051.exe
-
Size
235KB
-
MD5
e249d346b60bbf07350c88118a7db079
-
SHA1
4de42e367d44358fbfba59b1642131d67e547584
-
SHA256
56497226fec80e0aae8106489fd8e40cb64b4dd2102a15ecbf72b5a1057b4fe0
-
SHA512
94ff737c97c42421e2d367b1e8340210458cbfc1f19870f9c52566640497ade69c50443d099f287aa6b074a7d155dadd97b88780e710f8d95a8aabba00d94f02
-
SSDEEP
6144:+/qDDbAZiwe41jLDzpZWS2ouViF3nxIkJk:S7xjLLW+uViZxI7
Malware Config
Extracted
amadey
3.68
193.233.20.25/buH5N004d/index.php
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1084 ghaaer.exe 1408 ghaaer.exe 388 ghaaer.exe 2036 ghaaer.exe -
Loads dropped DLL 5 IoCs
pid Process 2008 0x00080000000133d2-1051.exe 824 rundll32.exe 824 rundll32.exe 824 rundll32.exe 824 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1060 schtasks.exe -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 2008 wrote to memory of 1084 2008 0x00080000000133d2-1051.exe 27 PID 2008 wrote to memory of 1084 2008 0x00080000000133d2-1051.exe 27 PID 2008 wrote to memory of 1084 2008 0x00080000000133d2-1051.exe 27 PID 2008 wrote to memory of 1084 2008 0x00080000000133d2-1051.exe 27 PID 1084 wrote to memory of 1060 1084 ghaaer.exe 28 PID 1084 wrote to memory of 1060 1084 ghaaer.exe 28 PID 1084 wrote to memory of 1060 1084 ghaaer.exe 28 PID 1084 wrote to memory of 1060 1084 ghaaer.exe 28 PID 1084 wrote to memory of 340 1084 ghaaer.exe 30 PID 1084 wrote to memory of 340 1084 ghaaer.exe 30 PID 1084 wrote to memory of 340 1084 ghaaer.exe 30 PID 1084 wrote to memory of 340 1084 ghaaer.exe 30 PID 340 wrote to memory of 1444 340 cmd.exe 32 PID 340 wrote to memory of 1444 340 cmd.exe 32 PID 340 wrote to memory of 1444 340 cmd.exe 32 PID 340 wrote to memory of 1444 340 cmd.exe 32 PID 340 wrote to memory of 1424 340 cmd.exe 33 PID 340 wrote to memory of 1424 340 cmd.exe 33 PID 340 wrote to memory of 1424 340 cmd.exe 33 PID 340 wrote to memory of 1424 340 cmd.exe 33 PID 340 wrote to memory of 1700 340 cmd.exe 34 PID 340 wrote to memory of 1700 340 cmd.exe 34 PID 340 wrote to memory of 1700 340 cmd.exe 34 PID 340 wrote to memory of 1700 340 cmd.exe 34 PID 340 wrote to memory of 1536 340 cmd.exe 35 PID 340 wrote to memory of 1536 340 cmd.exe 35 PID 340 wrote to memory of 1536 340 cmd.exe 35 PID 340 wrote to memory of 1536 340 cmd.exe 35 PID 340 wrote to memory of 1864 340 cmd.exe 36 PID 340 wrote to memory of 1864 340 cmd.exe 36 PID 340 wrote to memory of 1864 340 cmd.exe 36 PID 340 wrote to memory of 1864 340 cmd.exe 36 PID 340 wrote to memory of 1508 340 cmd.exe 37 PID 340 wrote to memory of 1508 340 cmd.exe 37 PID 340 wrote to memory of 1508 340 cmd.exe 37 PID 340 wrote to memory of 1508 340 cmd.exe 37 PID 1804 wrote to memory of 1408 1804 taskeng.exe 41 PID 1804 wrote to memory of 1408 1804 taskeng.exe 41 PID 1804 wrote to memory of 1408 1804 taskeng.exe 41 PID 1804 wrote to memory of 1408 1804 taskeng.exe 41 PID 1084 wrote to memory of 824 1084 ghaaer.exe 42 PID 1084 wrote to memory of 824 1084 ghaaer.exe 42 PID 1084 wrote to memory of 824 1084 ghaaer.exe 42 PID 1084 wrote to memory of 824 1084 ghaaer.exe 42 PID 1084 wrote to memory of 824 1084 ghaaer.exe 42 PID 1084 wrote to memory of 824 1084 ghaaer.exe 42 PID 1084 wrote to memory of 824 1084 ghaaer.exe 42 PID 1804 wrote to memory of 388 1804 taskeng.exe 43 PID 1804 wrote to memory of 388 1804 taskeng.exe 43 PID 1804 wrote to memory of 388 1804 taskeng.exe 43 PID 1804 wrote to memory of 388 1804 taskeng.exe 43 PID 1804 wrote to memory of 2036 1804 taskeng.exe 44 PID 1804 wrote to memory of 2036 1804 taskeng.exe 44 PID 1804 wrote to memory of 2036 1804 taskeng.exe 44 PID 1804 wrote to memory of 2036 1804 taskeng.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x00080000000133d2-1051.exe"C:\Users\Admin\AppData\Local\Temp\0x00080000000133d2-1051.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe"C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN ghaaer.exe /TR "C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe" /F3⤵
- Creates scheduled task(s)
PID:1060
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "ghaaer.exe" /P "Admin:N"&&CACLS "ghaaer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\46aee2aca4" /P "Admin:N"&&CACLS "..\46aee2aca4" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1444
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "ghaaer.exe" /P "Admin:N"4⤵PID:1424
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "ghaaer.exe" /P "Admin:R" /E4⤵PID:1700
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1536
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\46aee2aca4" /P "Admin:N"4⤵PID:1864
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\46aee2aca4" /P "Admin:R" /E4⤵PID:1508
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main3⤵
- Loads dropped DLL
PID:824
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {AA533616-7D2E-462D-A9E0-2E91D85F7501} S-1-5-21-3430344531-3702557399-3004411149-1000:WFSTZEPN\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exeC:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe2⤵
- Executes dropped EXE
PID:1408
-
-
C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exeC:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe2⤵
- Executes dropped EXE
PID:388
-
-
C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exeC:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe2⤵
- Executes dropped EXE
PID:2036
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
235KB
MD5e249d346b60bbf07350c88118a7db079
SHA14de42e367d44358fbfba59b1642131d67e547584
SHA25656497226fec80e0aae8106489fd8e40cb64b4dd2102a15ecbf72b5a1057b4fe0
SHA51294ff737c97c42421e2d367b1e8340210458cbfc1f19870f9c52566640497ade69c50443d099f287aa6b074a7d155dadd97b88780e710f8d95a8aabba00d94f02
-
Filesize
235KB
MD5e249d346b60bbf07350c88118a7db079
SHA14de42e367d44358fbfba59b1642131d67e547584
SHA25656497226fec80e0aae8106489fd8e40cb64b4dd2102a15ecbf72b5a1057b4fe0
SHA51294ff737c97c42421e2d367b1e8340210458cbfc1f19870f9c52566640497ade69c50443d099f287aa6b074a7d155dadd97b88780e710f8d95a8aabba00d94f02
-
Filesize
235KB
MD5e249d346b60bbf07350c88118a7db079
SHA14de42e367d44358fbfba59b1642131d67e547584
SHA25656497226fec80e0aae8106489fd8e40cb64b4dd2102a15ecbf72b5a1057b4fe0
SHA51294ff737c97c42421e2d367b1e8340210458cbfc1f19870f9c52566640497ade69c50443d099f287aa6b074a7d155dadd97b88780e710f8d95a8aabba00d94f02
-
Filesize
235KB
MD5e249d346b60bbf07350c88118a7db079
SHA14de42e367d44358fbfba59b1642131d67e547584
SHA25656497226fec80e0aae8106489fd8e40cb64b4dd2102a15ecbf72b5a1057b4fe0
SHA51294ff737c97c42421e2d367b1e8340210458cbfc1f19870f9c52566640497ade69c50443d099f287aa6b074a7d155dadd97b88780e710f8d95a8aabba00d94f02
-
Filesize
235KB
MD5e249d346b60bbf07350c88118a7db079
SHA14de42e367d44358fbfba59b1642131d67e547584
SHA25656497226fec80e0aae8106489fd8e40cb64b4dd2102a15ecbf72b5a1057b4fe0
SHA51294ff737c97c42421e2d367b1e8340210458cbfc1f19870f9c52566640497ade69c50443d099f287aa6b074a7d155dadd97b88780e710f8d95a8aabba00d94f02
-
Filesize
235KB
MD5e249d346b60bbf07350c88118a7db079
SHA14de42e367d44358fbfba59b1642131d67e547584
SHA25656497226fec80e0aae8106489fd8e40cb64b4dd2102a15ecbf72b5a1057b4fe0
SHA51294ff737c97c42421e2d367b1e8340210458cbfc1f19870f9c52566640497ade69c50443d099f287aa6b074a7d155dadd97b88780e710f8d95a8aabba00d94f02
-
Filesize
89KB
MD529b9780bb2992d018ae312ed4180a663
SHA1592a993f9518c1ceab3186a8b5007826fa204b60
SHA256b0308039b578ab07a5710745e5895b90a88133c669ca14a8f1943845387d223a
SHA512988a85a0270759d2936e9ffcdf0b0543ad29a6be6342472e796b9ee2406730b8f892f9416fe385e58ecffc39862cc74604bc32a7920133209286ca20c0ac346d
-
Filesize
89KB
MD529b9780bb2992d018ae312ed4180a663
SHA1592a993f9518c1ceab3186a8b5007826fa204b60
SHA256b0308039b578ab07a5710745e5895b90a88133c669ca14a8f1943845387d223a
SHA512988a85a0270759d2936e9ffcdf0b0543ad29a6be6342472e796b9ee2406730b8f892f9416fe385e58ecffc39862cc74604bc32a7920133209286ca20c0ac346d
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
235KB
MD5e249d346b60bbf07350c88118a7db079
SHA14de42e367d44358fbfba59b1642131d67e547584
SHA25656497226fec80e0aae8106489fd8e40cb64b4dd2102a15ecbf72b5a1057b4fe0
SHA51294ff737c97c42421e2d367b1e8340210458cbfc1f19870f9c52566640497ade69c50443d099f287aa6b074a7d155dadd97b88780e710f8d95a8aabba00d94f02
-
Filesize
89KB
MD529b9780bb2992d018ae312ed4180a663
SHA1592a993f9518c1ceab3186a8b5007826fa204b60
SHA256b0308039b578ab07a5710745e5895b90a88133c669ca14a8f1943845387d223a
SHA512988a85a0270759d2936e9ffcdf0b0543ad29a6be6342472e796b9ee2406730b8f892f9416fe385e58ecffc39862cc74604bc32a7920133209286ca20c0ac346d
-
Filesize
89KB
MD529b9780bb2992d018ae312ed4180a663
SHA1592a993f9518c1ceab3186a8b5007826fa204b60
SHA256b0308039b578ab07a5710745e5895b90a88133c669ca14a8f1943845387d223a
SHA512988a85a0270759d2936e9ffcdf0b0543ad29a6be6342472e796b9ee2406730b8f892f9416fe385e58ecffc39862cc74604bc32a7920133209286ca20c0ac346d
-
Filesize
89KB
MD529b9780bb2992d018ae312ed4180a663
SHA1592a993f9518c1ceab3186a8b5007826fa204b60
SHA256b0308039b578ab07a5710745e5895b90a88133c669ca14a8f1943845387d223a
SHA512988a85a0270759d2936e9ffcdf0b0543ad29a6be6342472e796b9ee2406730b8f892f9416fe385e58ecffc39862cc74604bc32a7920133209286ca20c0ac346d
-
Filesize
89KB
MD529b9780bb2992d018ae312ed4180a663
SHA1592a993f9518c1ceab3186a8b5007826fa204b60
SHA256b0308039b578ab07a5710745e5895b90a88133c669ca14a8f1943845387d223a
SHA512988a85a0270759d2936e9ffcdf0b0543ad29a6be6342472e796b9ee2406730b8f892f9416fe385e58ecffc39862cc74604bc32a7920133209286ca20c0ac346d