Analysis
-
max time kernel
159s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2023 18:15
Static task
static1
Behavioral task
behavioral1
Sample
c1b498cfa1d995397e728559093534c36c1777b3288502409b68752d3b0b0ab5.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c1b498cfa1d995397e728559093534c36c1777b3288502409b68752d3b0b0ab5.exe
Resource
win10v2004-20230220-en
General
-
Target
c1b498cfa1d995397e728559093534c36c1777b3288502409b68752d3b0b0ab5.exe
-
Size
1.5MB
-
MD5
836ebd50cda51a2e7b80798716053331
-
SHA1
14dba1de905513f545b2eb07139e27d86f830b16
-
SHA256
c1b498cfa1d995397e728559093534c36c1777b3288502409b68752d3b0b0ab5
-
SHA512
3c8a2d0fe385e2a8ede8ae98f6203cef4cb0ac6cdfdc67ed4673d0dfde496ea22755d1bd4151617bfa35b46f8ce54ac84b93b6683be406553390b5d7317f1d51
-
SSDEEP
24576:RyZxmfaoM1ttaH7RLvJRE1TyyHiz21YK6eaEwgq/s3kIjeC0eu:E/mCoUt4H7xJREZH+0YK6eaEAE3Hjec
Malware Config
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Signatures
-
Processes:
1.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
22653380.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation 22653380.exe -
Executes dropped EXE 7 IoCs
Processes:
za114052.exeza693011.exeza622102.exe22653380.exe1.exeu76324744.exew25zk21.exepid process 3872 za114052.exe 2668 za693011.exe 2824 za622102.exe 1844 22653380.exe 60 1.exe 4824 u76324744.exe 4668 w25zk21.exe -
Processes:
1.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 1.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
za622102.exec1b498cfa1d995397e728559093534c36c1777b3288502409b68752d3b0b0ab5.exeza114052.exeza693011.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za622102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" za622102.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c1b498cfa1d995397e728559093534c36c1777b3288502409b68752d3b0b0ab5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c1b498cfa1d995397e728559093534c36c1777b3288502409b68752d3b0b0ab5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za114052.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" za114052.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za693011.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" za693011.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1160 4824 WerFault.exe u76324744.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1.exepid process 60 1.exe 60 1.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
22653380.exeu76324744.exe1.exedescription pid process Token: SeDebugPrivilege 1844 22653380.exe Token: SeDebugPrivilege 4824 u76324744.exe Token: SeDebugPrivilege 60 1.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
c1b498cfa1d995397e728559093534c36c1777b3288502409b68752d3b0b0ab5.exeza114052.exeza693011.exeza622102.exe22653380.exedescription pid process target process PID 1896 wrote to memory of 3872 1896 c1b498cfa1d995397e728559093534c36c1777b3288502409b68752d3b0b0ab5.exe za114052.exe PID 1896 wrote to memory of 3872 1896 c1b498cfa1d995397e728559093534c36c1777b3288502409b68752d3b0b0ab5.exe za114052.exe PID 1896 wrote to memory of 3872 1896 c1b498cfa1d995397e728559093534c36c1777b3288502409b68752d3b0b0ab5.exe za114052.exe PID 3872 wrote to memory of 2668 3872 za114052.exe za693011.exe PID 3872 wrote to memory of 2668 3872 za114052.exe za693011.exe PID 3872 wrote to memory of 2668 3872 za114052.exe za693011.exe PID 2668 wrote to memory of 2824 2668 za693011.exe za622102.exe PID 2668 wrote to memory of 2824 2668 za693011.exe za622102.exe PID 2668 wrote to memory of 2824 2668 za693011.exe za622102.exe PID 2824 wrote to memory of 1844 2824 za622102.exe 22653380.exe PID 2824 wrote to memory of 1844 2824 za622102.exe 22653380.exe PID 2824 wrote to memory of 1844 2824 za622102.exe 22653380.exe PID 1844 wrote to memory of 60 1844 22653380.exe 1.exe PID 1844 wrote to memory of 60 1844 22653380.exe 1.exe PID 2824 wrote to memory of 4824 2824 za622102.exe u76324744.exe PID 2824 wrote to memory of 4824 2824 za622102.exe u76324744.exe PID 2824 wrote to memory of 4824 2824 za622102.exe u76324744.exe PID 2668 wrote to memory of 4668 2668 za693011.exe w25zk21.exe PID 2668 wrote to memory of 4668 2668 za693011.exe w25zk21.exe PID 2668 wrote to memory of 4668 2668 za693011.exe w25zk21.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1b498cfa1d995397e728559093534c36c1777b3288502409b68752d3b0b0ab5.exe"C:\Users\Admin\AppData\Local\Temp\c1b498cfa1d995397e728559093534c36c1777b3288502409b68752d3b0b0ab5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za114052.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za114052.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za693011.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za693011.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za622102.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za622102.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\22653380.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\22653380.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:60
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u76324744.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u76324744.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4824 -s 12566⤵
- Program crash
PID:1160
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w25zk21.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w25zk21.exe4⤵
- Executes dropped EXE
PID:4668
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4824 -ip 48241⤵PID:4500
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5c6ae66ba58ffe2991239db402e7554e6
SHA149de9f66fefb10574f13df5610b8b6e9af2d46f7
SHA256921dd1c033fb397a45c3df01912a4834a7349cddbb0725ebef2510c2eaaf5476
SHA512abdc6077df35e128b994622196df491062b2a431fde0c962fd0bf98e42ec380e8f4c18e66e3d6f4eb6488784258f07e02044942297c94ce393cd48edb9b5373e
-
Filesize
1.3MB
MD5c6ae66ba58ffe2991239db402e7554e6
SHA149de9f66fefb10574f13df5610b8b6e9af2d46f7
SHA256921dd1c033fb397a45c3df01912a4834a7349cddbb0725ebef2510c2eaaf5476
SHA512abdc6077df35e128b994622196df491062b2a431fde0c962fd0bf98e42ec380e8f4c18e66e3d6f4eb6488784258f07e02044942297c94ce393cd48edb9b5373e
-
Filesize
882KB
MD574c9adc9671d32343e8148e73aee3b68
SHA1da9ef9e14ed3ae774cb2002f7fb9a070c50a86d3
SHA2562abf4c1b237a89cda0cbd91cac56ecaeb5b7f355e9335d7386cda281a01f4653
SHA5120b18b07772f36461f1e6dbf2e3e7179d278b8a0c38176133fcd1c1620504045abcb59f07e85196f48a5151c847e76c1ae9a9bcb97d9c237670a5f20758dda9d7
-
Filesize
882KB
MD574c9adc9671d32343e8148e73aee3b68
SHA1da9ef9e14ed3ae774cb2002f7fb9a070c50a86d3
SHA2562abf4c1b237a89cda0cbd91cac56ecaeb5b7f355e9335d7386cda281a01f4653
SHA5120b18b07772f36461f1e6dbf2e3e7179d278b8a0c38176133fcd1c1620504045abcb59f07e85196f48a5151c847e76c1ae9a9bcb97d9c237670a5f20758dda9d7
-
Filesize
229KB
MD54b803df7b39ff5e60d3d9a864fe53ee1
SHA171aba672fb548dc755f91a81aeb6190dea1d2eb9
SHA256b2f93f6f1d56e6bdbf25c437390a5c686e47c441cb02c201829c2e3db710ff1a
SHA5121f9758fcb802ccaab9bbf66e4b6941d334b2ebd4249183c65d0361a17da1c58ac3abfb8271ce3cb651b3bd88abb14cf5b13014e90efa80cf32194d2f28b17561
-
Filesize
229KB
MD54b803df7b39ff5e60d3d9a864fe53ee1
SHA171aba672fb548dc755f91a81aeb6190dea1d2eb9
SHA256b2f93f6f1d56e6bdbf25c437390a5c686e47c441cb02c201829c2e3db710ff1a
SHA5121f9758fcb802ccaab9bbf66e4b6941d334b2ebd4249183c65d0361a17da1c58ac3abfb8271ce3cb651b3bd88abb14cf5b13014e90efa80cf32194d2f28b17561
-
Filesize
700KB
MD5273edd288075b5586dd7d2526cc731dd
SHA18c46f2769ab8ef1780169b1bd11cea6ba0adb5b6
SHA2569ff673b0aa053bc4728ae72065b16ff3a1a8eb68804839662be3961a69ead6c6
SHA512a2a0c8a598288d126a96bc300c83292910e97fc3be81ab9efee04c6e4bc68af525053f484284eedeee38ef24ac5559d2e2feb71618932f3d25b7041d3e57bbe9
-
Filesize
700KB
MD5273edd288075b5586dd7d2526cc731dd
SHA18c46f2769ab8ef1780169b1bd11cea6ba0adb5b6
SHA2569ff673b0aa053bc4728ae72065b16ff3a1a8eb68804839662be3961a69ead6c6
SHA512a2a0c8a598288d126a96bc300c83292910e97fc3be81ab9efee04c6e4bc68af525053f484284eedeee38ef24ac5559d2e2feb71618932f3d25b7041d3e57bbe9
-
Filesize
300KB
MD5f97b67f9cf960af058fa680f7c7d7f47
SHA17c526a35e2aba0b83bc726d371c3b8b8a621df61
SHA256e4b6254d0030427cbe61bad3147237c662fe4808fab4d93ea971cb13ff52196d
SHA512f78196056db6db6eeeab86607b6555344d51ef32451dfbc36fa4ca83fa4d7cf20cb48ecf5a4859a10f0d11832ccfca2e5891f41b791fd4cab6cc82dd05c57e3d
-
Filesize
300KB
MD5f97b67f9cf960af058fa680f7c7d7f47
SHA17c526a35e2aba0b83bc726d371c3b8b8a621df61
SHA256e4b6254d0030427cbe61bad3147237c662fe4808fab4d93ea971cb13ff52196d
SHA512f78196056db6db6eeeab86607b6555344d51ef32451dfbc36fa4ca83fa4d7cf20cb48ecf5a4859a10f0d11832ccfca2e5891f41b791fd4cab6cc82dd05c57e3d
-
Filesize
479KB
MD5fb592526edf2daec25a50ec0c4a3e556
SHA1270dbe093c6da559c32a1f9f2c1fe8e8f3952c8a
SHA256853ad1b57ee9f777275f7dc7f28de734b3e4b4ff57172cb8f051da94de4bec7f
SHA5129b8c176f68af8a7146099c9d238a150dde392f29f7c054bb46b015a08c41827a74f33985da300b9e78c3d5206edb048d0e2d0a6cf06dc72c3e4e38853aca0df4
-
Filesize
479KB
MD5fb592526edf2daec25a50ec0c4a3e556
SHA1270dbe093c6da559c32a1f9f2c1fe8e8f3952c8a
SHA256853ad1b57ee9f777275f7dc7f28de734b3e4b4ff57172cb8f051da94de4bec7f
SHA5129b8c176f68af8a7146099c9d238a150dde392f29f7c054bb46b015a08c41827a74f33985da300b9e78c3d5206edb048d0e2d0a6cf06dc72c3e4e38853aca0df4
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91