Analysis
-
max time kernel
110s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2023, 15:08
Static task
static1
General
-
Target
ff1678a86e742b8b596b7293cf4bd74b5ad23906387e752b11d91eed5a8d2e4e.exe
-
Size
1.0MB
-
MD5
facd0b118db0fef2a438a9f9b79673bd
-
SHA1
ccac7ff0ab6cabc97f35280598574cb96ddf9dab
-
SHA256
ff1678a86e742b8b596b7293cf4bd74b5ad23906387e752b11d91eed5a8d2e4e
-
SHA512
fcc671a126ee27c2441d92a671390fce78ec07d584c2e61671a9133e0a08f99cd82cb1b8cc26b1266dbe8ba0fc49ca0a1a128def6f9672f63fc9eb96d5a8ae0c
-
SSDEEP
24576:gyr16aBeE9AtjsxLW8RYFgIResm8ZOq7jVPWHJJEBP:nrxBe6KWW8RYFg4eP8ZOq7hQJEB
Malware Config
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 07509847.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 07509847.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 07509847.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 07509847.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 07509847.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 07509847.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation xgAZq27.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 4796 za430431.exe 2192 za056249.exe 5100 07509847.exe 4648 w46EH90.exe 2352 xgAZq27.exe 3108 oneetx.exe 3156 ys403739.exe 3680 oneetx.exe 2908 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3168 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 07509847.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 07509847.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ff1678a86e742b8b596b7293cf4bd74b5ad23906387e752b11d91eed5a8d2e4e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ff1678a86e742b8b596b7293cf4bd74b5ad23906387e752b11d91eed5a8d2e4e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za430431.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" za430431.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za056249.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" za056249.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 4540 5100 WerFault.exe 83 1140 4648 WerFault.exe 89 520 3156 WerFault.exe 94 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4568 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5100 07509847.exe 5100 07509847.exe 4648 w46EH90.exe 4648 w46EH90.exe 3156 ys403739.exe 3156 ys403739.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5100 07509847.exe Token: SeDebugPrivilege 4648 w46EH90.exe Token: SeDebugPrivilege 3156 ys403739.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2352 xgAZq27.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 4376 wrote to memory of 4796 4376 ff1678a86e742b8b596b7293cf4bd74b5ad23906387e752b11d91eed5a8d2e4e.exe 81 PID 4376 wrote to memory of 4796 4376 ff1678a86e742b8b596b7293cf4bd74b5ad23906387e752b11d91eed5a8d2e4e.exe 81 PID 4376 wrote to memory of 4796 4376 ff1678a86e742b8b596b7293cf4bd74b5ad23906387e752b11d91eed5a8d2e4e.exe 81 PID 4796 wrote to memory of 2192 4796 za430431.exe 82 PID 4796 wrote to memory of 2192 4796 za430431.exe 82 PID 4796 wrote to memory of 2192 4796 za430431.exe 82 PID 2192 wrote to memory of 5100 2192 za056249.exe 83 PID 2192 wrote to memory of 5100 2192 za056249.exe 83 PID 2192 wrote to memory of 5100 2192 za056249.exe 83 PID 2192 wrote to memory of 4648 2192 za056249.exe 89 PID 2192 wrote to memory of 4648 2192 za056249.exe 89 PID 2192 wrote to memory of 4648 2192 za056249.exe 89 PID 4796 wrote to memory of 2352 4796 za430431.exe 92 PID 4796 wrote to memory of 2352 4796 za430431.exe 92 PID 4796 wrote to memory of 2352 4796 za430431.exe 92 PID 2352 wrote to memory of 3108 2352 xgAZq27.exe 93 PID 2352 wrote to memory of 3108 2352 xgAZq27.exe 93 PID 2352 wrote to memory of 3108 2352 xgAZq27.exe 93 PID 4376 wrote to memory of 3156 4376 ff1678a86e742b8b596b7293cf4bd74b5ad23906387e752b11d91eed5a8d2e4e.exe 94 PID 4376 wrote to memory of 3156 4376 ff1678a86e742b8b596b7293cf4bd74b5ad23906387e752b11d91eed5a8d2e4e.exe 94 PID 4376 wrote to memory of 3156 4376 ff1678a86e742b8b596b7293cf4bd74b5ad23906387e752b11d91eed5a8d2e4e.exe 94 PID 3108 wrote to memory of 4568 3108 oneetx.exe 95 PID 3108 wrote to memory of 4568 3108 oneetx.exe 95 PID 3108 wrote to memory of 4568 3108 oneetx.exe 95 PID 3108 wrote to memory of 3168 3108 oneetx.exe 105 PID 3108 wrote to memory of 3168 3108 oneetx.exe 105 PID 3108 wrote to memory of 3168 3108 oneetx.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff1678a86e742b8b596b7293cf4bd74b5ad23906387e752b11d91eed5a8d2e4e.exe"C:\Users\Admin\AppData\Local\Temp\ff1678a86e742b8b596b7293cf4bd74b5ad23906387e752b11d91eed5a8d2e4e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za430431.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za430431.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za056249.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za056249.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\07509847.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\07509847.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5100 -s 10805⤵
- Program crash
PID:4540
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w46EH90.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w46EH90.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4648 -s 15845⤵
- Program crash
PID:1140
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xgAZq27.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xgAZq27.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F5⤵
- Creates scheduled task(s)
PID:4568
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:3168
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys403739.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys403739.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3156 -s 13123⤵
- Program crash
PID:520
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 5100 -ip 51001⤵PID:408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4648 -ip 46481⤵PID:3840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3156 -ip 31561⤵PID:5048
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:3680
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:2908
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
460KB
MD517a464832774bbb54607bcf2e7cc7278
SHA1d398c93e4c01e9f8503556f403a3811c775acd92
SHA25627c340044d552004d3b7b5addb1ee01820e66fd21911f1cf7dd394fc08272cc8
SHA51287575dbd3e6cf3fcdb5d3d46a44cc01b554ac6b996027cacad6946484a731431bee2f3cea6dbe3f98b027e87d1556b7c0a16ae8fc54adcc538dff88f61cf4fc5
-
Filesize
460KB
MD517a464832774bbb54607bcf2e7cc7278
SHA1d398c93e4c01e9f8503556f403a3811c775acd92
SHA25627c340044d552004d3b7b5addb1ee01820e66fd21911f1cf7dd394fc08272cc8
SHA51287575dbd3e6cf3fcdb5d3d46a44cc01b554ac6b996027cacad6946484a731431bee2f3cea6dbe3f98b027e87d1556b7c0a16ae8fc54adcc538dff88f61cf4fc5
-
Filesize
776KB
MD5500d884e1c53b87768ef31cd7245b693
SHA122f45d44017d55c25ca88243bf816db8d4714a5c
SHA256a6bb95446b0708f559a3f85124b6298464187f8e3fc37c65ca5ed5975195d8ba
SHA512b4313788a1f0282d584ef26ce38db79d9ae4b502a874acd823899b0899b9b5ae00d3ad02996e91f137c4cc44f0182029f97b596344fc2083f4e298265f71d5ba
-
Filesize
776KB
MD5500d884e1c53b87768ef31cd7245b693
SHA122f45d44017d55c25ca88243bf816db8d4714a5c
SHA256a6bb95446b0708f559a3f85124b6298464187f8e3fc37c65ca5ed5975195d8ba
SHA512b4313788a1f0282d584ef26ce38db79d9ae4b502a874acd823899b0899b9b5ae00d3ad02996e91f137c4cc44f0182029f97b596344fc2083f4e298265f71d5ba
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
593KB
MD56d2b3556890ffc406e695eeb845dfc38
SHA10788f45296e7f8c23f8e181d499c5e71c596daf5
SHA2560bf88630bcfd42339663d5ccd10dd65963a4820805629d6b4b0dbe70e4589f16
SHA512f3a82528fde2303facf69b057a72974e1135309e4f38e97230d87b74ae095ed0c839c94478acc371eaa6ca03d6f2ab279549072b1305064cbe1466527c7ee278
-
Filesize
593KB
MD56d2b3556890ffc406e695eeb845dfc38
SHA10788f45296e7f8c23f8e181d499c5e71c596daf5
SHA2560bf88630bcfd42339663d5ccd10dd65963a4820805629d6b4b0dbe70e4589f16
SHA512f3a82528fde2303facf69b057a72974e1135309e4f38e97230d87b74ae095ed0c839c94478acc371eaa6ca03d6f2ab279549072b1305064cbe1466527c7ee278
-
Filesize
378KB
MD5deb2aa47b5fb835ad82b6e01a5cce1f6
SHA1471a3412b32a4e364a9250916e43b1066a99caae
SHA256217052ef8973dedf1c45290bd03dfafede9e9a721db972d4234663c05d54fe98
SHA5126ba35df1a668af1574166d71bc9509fd82aa8e2661cabaa794dc99301c151169333a99d95434849fbb26ca52ac0c7d524d2e59a4f2ce91db6903584883fd5b20
-
Filesize
378KB
MD5deb2aa47b5fb835ad82b6e01a5cce1f6
SHA1471a3412b32a4e364a9250916e43b1066a99caae
SHA256217052ef8973dedf1c45290bd03dfafede9e9a721db972d4234663c05d54fe98
SHA5126ba35df1a668af1574166d71bc9509fd82aa8e2661cabaa794dc99301c151169333a99d95434849fbb26ca52ac0c7d524d2e59a4f2ce91db6903584883fd5b20
-
Filesize
460KB
MD51b75e9be4f1b7110749b3791b135eaee
SHA11bcd5d4f97b95e870e0a0185b6d4f50a000e4425
SHA256235036bfe9d127a288a930c4c3275a2f3cc392b5d605a0c886e59132f0c2d7e2
SHA512ad83a95b520277494a65e8e273a0a6e1becd1d023b31765328fe56f77ad96a35dd564c115ca057bc7e0421c7cabc0dcbadc9215a9fd58107e051a1cf99c5cc3f
-
Filesize
460KB
MD51b75e9be4f1b7110749b3791b135eaee
SHA11bcd5d4f97b95e870e0a0185b6d4f50a000e4425
SHA256235036bfe9d127a288a930c4c3275a2f3cc392b5d605a0c886e59132f0c2d7e2
SHA512ad83a95b520277494a65e8e273a0a6e1becd1d023b31765328fe56f77ad96a35dd564c115ca057bc7e0421c7cabc0dcbadc9215a9fd58107e051a1cf99c5cc3f
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5