Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
11/04/2023, 06:38
Static task
static1
Behavioral task
behavioral1
Sample
5b059a34f0a2daffb6e77f8b321c13e3d28d0d14472f8d9ad5075273d9585bd8.exe
Resource
win10-20230220-en
General
-
Target
5b059a34f0a2daffb6e77f8b321c13e3d28d0d14472f8d9ad5075273d9585bd8.exe
-
Size
1.0MB
-
MD5
e8d47b022614cdab3411b57a6803a074
-
SHA1
3c9559bcaa9c721271a978bbc7523a27da2187c3
-
SHA256
5b059a34f0a2daffb6e77f8b321c13e3d28d0d14472f8d9ad5075273d9585bd8
-
SHA512
c730312f32cad314f4e10bb54131d3792776c8bb2be5f83606dc7ba96f8705cf8e4304bd6661dbdd3d3df330ac4b7247e7b4d29d0f3b74e5742a7a0cc1733066
-
SSDEEP
24576:iyWkHf/5Vjfrt1RWPhgNGxlwguOIi3kwgkGqGp:JWe35zsa+Zx1G
Malware Config
Extracted
amadey
3.70
77.91.124.207/plays/chapter/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" az258293.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" az258293.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" az258293.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" az258293.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" az258293.exe -
Executes dropped EXE 5 IoCs
pid Process 4960 kina8397.exe 2128 kina4608.exe 1776 kina7039.exe 2416 az258293.exe 2264 bu106487.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" az258293.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kina7039.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" kina7039.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5b059a34f0a2daffb6e77f8b321c13e3d28d0d14472f8d9ad5075273d9585bd8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5b059a34f0a2daffb6e77f8b321c13e3d28d0d14472f8d9ad5075273d9585bd8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kina8397.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" kina8397.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kina4608.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" kina4608.exe -
Program crash 7 IoCs
pid pid_target Process procid_target 4492 2264 WerFault.exe 70 2392 2264 WerFault.exe 70 1240 2264 WerFault.exe 70 4676 2264 WerFault.exe 70 3132 2264 WerFault.exe 70 4200 2264 WerFault.exe 70 4456 2264 WerFault.exe 70 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2416 az258293.exe 2416 az258293.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2416 az258293.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4668 wrote to memory of 4960 4668 5b059a34f0a2daffb6e77f8b321c13e3d28d0d14472f8d9ad5075273d9585bd8.exe 66 PID 4668 wrote to memory of 4960 4668 5b059a34f0a2daffb6e77f8b321c13e3d28d0d14472f8d9ad5075273d9585bd8.exe 66 PID 4668 wrote to memory of 4960 4668 5b059a34f0a2daffb6e77f8b321c13e3d28d0d14472f8d9ad5075273d9585bd8.exe 66 PID 4960 wrote to memory of 2128 4960 kina8397.exe 67 PID 4960 wrote to memory of 2128 4960 kina8397.exe 67 PID 4960 wrote to memory of 2128 4960 kina8397.exe 67 PID 2128 wrote to memory of 1776 2128 kina4608.exe 68 PID 2128 wrote to memory of 1776 2128 kina4608.exe 68 PID 2128 wrote to memory of 1776 2128 kina4608.exe 68 PID 1776 wrote to memory of 2416 1776 kina7039.exe 69 PID 1776 wrote to memory of 2416 1776 kina7039.exe 69 PID 1776 wrote to memory of 2264 1776 kina7039.exe 70 PID 1776 wrote to memory of 2264 1776 kina7039.exe 70 PID 1776 wrote to memory of 2264 1776 kina7039.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b059a34f0a2daffb6e77f8b321c13e3d28d0d14472f8d9ad5075273d9585bd8.exe"C:\Users\Admin\AppData\Local\Temp\5b059a34f0a2daffb6e77f8b321c13e3d28d0d14472f8d9ad5075273d9585bd8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina8397.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina8397.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina4608.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina4608.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina7039.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina7039.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az258293.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az258293.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu106487.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu106487.exe5⤵
- Executes dropped EXE
PID:2264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 6166⤵
- Program crash
PID:4492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 6966⤵
- Program crash
PID:2392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 8326⤵
- Program crash
PID:1240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 8766⤵
- Program crash
PID:4676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 8126⤵
- Program crash
PID:3132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 9046⤵
- Program crash
PID:4200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 10526⤵
- Program crash
PID:4456
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
920KB
MD5a685e10e3b292e2fb28af2db250ae785
SHA1102a3bbd22e6ce6e0bd2d495f0ba83772851eff4
SHA25656374eed949c59e11d98047454927b81d05390e605f318a4d2bce3e0dd533f19
SHA5126926ac066288e160e916e42825f373d0a0cf0a34cde942074a08b507ecb7b1073d9034852afc8101af7de176e56732f5dcf29a3329e1f6430bfcbeef0fc8b8ea
-
Filesize
920KB
MD5a685e10e3b292e2fb28af2db250ae785
SHA1102a3bbd22e6ce6e0bd2d495f0ba83772851eff4
SHA25656374eed949c59e11d98047454927b81d05390e605f318a4d2bce3e0dd533f19
SHA5126926ac066288e160e916e42825f373d0a0cf0a34cde942074a08b507ecb7b1073d9034852afc8101af7de176e56732f5dcf29a3329e1f6430bfcbeef0fc8b8ea
-
Filesize
588KB
MD51e899a45b4a5d0de952f46ce67ade632
SHA151eb60cfeaf70cb51f81505b6be58b233bcfec9f
SHA25698306da0142dddbd56e374091c19c0786417664ae6c53b5a8fb4c16e89141fac
SHA512ccbc0268ed7937680c705b3abeebb717fbbb20f047dbed572d0dc5064ad69a5cf189142abe497708a8429bedc431ff85727df69461924489f98e6bd59ae7a842
-
Filesize
588KB
MD51e899a45b4a5d0de952f46ce67ade632
SHA151eb60cfeaf70cb51f81505b6be58b233bcfec9f
SHA25698306da0142dddbd56e374091c19c0786417664ae6c53b5a8fb4c16e89141fac
SHA512ccbc0268ed7937680c705b3abeebb717fbbb20f047dbed572d0dc5064ad69a5cf189142abe497708a8429bedc431ff85727df69461924489f98e6bd59ae7a842
-
Filesize
315KB
MD5f3a0775105aa792f055ad46ae12be829
SHA1eb6b0b44655312952e58f1da513acd5e52e05436
SHA2563edaa84e504cb6c605f24be393d52b956e70ecaf1380d152b801962c478c1eea
SHA5120cdae38d9d1b836c1c8d31d3b93d90814dbf418bf9ca5b5b111fa7eae30021e0008a70fdd0d31d897456b9169e70a71aaa90798e674cbf5f2984281c8c78fb36
-
Filesize
315KB
MD5f3a0775105aa792f055ad46ae12be829
SHA1eb6b0b44655312952e58f1da513acd5e52e05436
SHA2563edaa84e504cb6c605f24be393d52b956e70ecaf1380d152b801962c478c1eea
SHA5120cdae38d9d1b836c1c8d31d3b93d90814dbf418bf9ca5b5b111fa7eae30021e0008a70fdd0d31d897456b9169e70a71aaa90798e674cbf5f2984281c8c78fb36
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
231KB
MD58f72e39dc917ec2036dc9f331f9a536f
SHA1e1c13d690c796c8824777adacaf2be4204ce0f97
SHA256173a4511cff68489f4aa2e141441f87ac3692ebb24f9771b46d6034b5970a3e3
SHA512b38fa982bf6427ab6b844896e87e652209ab7d9adf1311bfd740b5b4f428185837cc6d520ec5ac687e5b07bf4fd88ed1105a51a8dcdf450c10a34c09dc3ecc29
-
Filesize
231KB
MD58f72e39dc917ec2036dc9f331f9a536f
SHA1e1c13d690c796c8824777adacaf2be4204ce0f97
SHA256173a4511cff68489f4aa2e141441f87ac3692ebb24f9771b46d6034b5970a3e3
SHA512b38fa982bf6427ab6b844896e87e652209ab7d9adf1311bfd740b5b4f428185837cc6d520ec5ac687e5b07bf4fd88ed1105a51a8dcdf450c10a34c09dc3ecc29