Analysis
-
max time kernel
148s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2023 19:31
Behavioral task
behavioral1
Sample
0x0006000000022fa1-203.exe
Resource
win7-20230220-en
General
-
Target
0x0006000000022fa1-203.exe
-
Size
206KB
-
MD5
03882f439263b57f2d79a887a2425e9d
-
SHA1
2cb37f4202507a194bf1b1fa2bdae2500cc63b67
-
SHA256
137607ab8853ef3d7616e169a064946a6b24dcb915278c7dae33318f77d2215c
-
SHA512
8afdf492ca9d836934a439360d3fe0487ff4aae030b5f0590e3a4c1c7b469f447d8d45474ce9558ffa80ef70dab074e76c03056acc0969f9ca41984c103ddf56
-
SSDEEP
3072:WpxiMVc/oooAUNfLp1zuNW3KG7uON8wAuZA+6jbe83xfbq5kmh:siMV5oofVu432OiuZAlXjq
Malware Config
Extracted
amadey
3.81
95.214.27.98/cronus/index.php
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation 0x0006000000022fa1-203.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation legends.exe -
Executes dropped EXE 4 IoCs
pid Process 712 legends.exe 4452 legends.exe 536 legends.exe 2440 legends.exe -
Loads dropped DLL 1 IoCs
pid Process 1944 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3560 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4076 0x0006000000022fa1-203.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4076 wrote to memory of 712 4076 0x0006000000022fa1-203.exe 79 PID 4076 wrote to memory of 712 4076 0x0006000000022fa1-203.exe 79 PID 4076 wrote to memory of 712 4076 0x0006000000022fa1-203.exe 79 PID 712 wrote to memory of 3560 712 legends.exe 80 PID 712 wrote to memory of 3560 712 legends.exe 80 PID 712 wrote to memory of 3560 712 legends.exe 80 PID 712 wrote to memory of 1384 712 legends.exe 82 PID 712 wrote to memory of 1384 712 legends.exe 82 PID 712 wrote to memory of 1384 712 legends.exe 82 PID 1384 wrote to memory of 4916 1384 cmd.exe 84 PID 1384 wrote to memory of 4916 1384 cmd.exe 84 PID 1384 wrote to memory of 4916 1384 cmd.exe 84 PID 1384 wrote to memory of 4924 1384 cmd.exe 85 PID 1384 wrote to memory of 4924 1384 cmd.exe 85 PID 1384 wrote to memory of 4924 1384 cmd.exe 85 PID 1384 wrote to memory of 4544 1384 cmd.exe 86 PID 1384 wrote to memory of 4544 1384 cmd.exe 86 PID 1384 wrote to memory of 4544 1384 cmd.exe 86 PID 1384 wrote to memory of 1240 1384 cmd.exe 87 PID 1384 wrote to memory of 1240 1384 cmd.exe 87 PID 1384 wrote to memory of 1240 1384 cmd.exe 87 PID 1384 wrote to memory of 904 1384 cmd.exe 88 PID 1384 wrote to memory of 904 1384 cmd.exe 88 PID 1384 wrote to memory of 904 1384 cmd.exe 88 PID 1384 wrote to memory of 4984 1384 cmd.exe 89 PID 1384 wrote to memory of 4984 1384 cmd.exe 89 PID 1384 wrote to memory of 4984 1384 cmd.exe 89 PID 712 wrote to memory of 1944 712 legends.exe 100 PID 712 wrote to memory of 1944 712 legends.exe 100 PID 712 wrote to memory of 1944 712 legends.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x0006000000022fa1-203.exe"C:\Users\Admin\AppData\Local\Temp\0x0006000000022fa1-203.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legends.exe /TR "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe" /F3⤵
- Creates scheduled task(s)
PID:3560
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legends.exe" /P "Admin:N"&&CACLS "legends.exe" /P "Admin:R" /E&&echo Y|CACLS "..\41bde21dc7" /P "Admin:N"&&CACLS "..\41bde21dc7" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:4916
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legends.exe" /P "Admin:N"4⤵PID:4924
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legends.exe" /P "Admin:R" /E4⤵PID:4544
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1240
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\41bde21dc7" /P "Admin:N"4⤵PID:904
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\41bde21dc7" /P "Admin:R" /E4⤵PID:4984
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main3⤵
- Loads dropped DLL
PID:1944
-
-
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe1⤵
- Executes dropped EXE
PID:4452
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe1⤵
- Executes dropped EXE
PID:536
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe1⤵
- Executes dropped EXE
PID:2440
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD503882f439263b57f2d79a887a2425e9d
SHA12cb37f4202507a194bf1b1fa2bdae2500cc63b67
SHA256137607ab8853ef3d7616e169a064946a6b24dcb915278c7dae33318f77d2215c
SHA5128afdf492ca9d836934a439360d3fe0487ff4aae030b5f0590e3a4c1c7b469f447d8d45474ce9558ffa80ef70dab074e76c03056acc0969f9ca41984c103ddf56
-
Filesize
206KB
MD503882f439263b57f2d79a887a2425e9d
SHA12cb37f4202507a194bf1b1fa2bdae2500cc63b67
SHA256137607ab8853ef3d7616e169a064946a6b24dcb915278c7dae33318f77d2215c
SHA5128afdf492ca9d836934a439360d3fe0487ff4aae030b5f0590e3a4c1c7b469f447d8d45474ce9558ffa80ef70dab074e76c03056acc0969f9ca41984c103ddf56
-
Filesize
206KB
MD503882f439263b57f2d79a887a2425e9d
SHA12cb37f4202507a194bf1b1fa2bdae2500cc63b67
SHA256137607ab8853ef3d7616e169a064946a6b24dcb915278c7dae33318f77d2215c
SHA5128afdf492ca9d836934a439360d3fe0487ff4aae030b5f0590e3a4c1c7b469f447d8d45474ce9558ffa80ef70dab074e76c03056acc0969f9ca41984c103ddf56
-
Filesize
206KB
MD503882f439263b57f2d79a887a2425e9d
SHA12cb37f4202507a194bf1b1fa2bdae2500cc63b67
SHA256137607ab8853ef3d7616e169a064946a6b24dcb915278c7dae33318f77d2215c
SHA5128afdf492ca9d836934a439360d3fe0487ff4aae030b5f0590e3a4c1c7b469f447d8d45474ce9558ffa80ef70dab074e76c03056acc0969f9ca41984c103ddf56
-
Filesize
206KB
MD503882f439263b57f2d79a887a2425e9d
SHA12cb37f4202507a194bf1b1fa2bdae2500cc63b67
SHA256137607ab8853ef3d7616e169a064946a6b24dcb915278c7dae33318f77d2215c
SHA5128afdf492ca9d836934a439360d3fe0487ff4aae030b5f0590e3a4c1c7b469f447d8d45474ce9558ffa80ef70dab074e76c03056acc0969f9ca41984c103ddf56
-
Filesize
206KB
MD503882f439263b57f2d79a887a2425e9d
SHA12cb37f4202507a194bf1b1fa2bdae2500cc63b67
SHA256137607ab8853ef3d7616e169a064946a6b24dcb915278c7dae33318f77d2215c
SHA5128afdf492ca9d836934a439360d3fe0487ff4aae030b5f0590e3a4c1c7b469f447d8d45474ce9558ffa80ef70dab074e76c03056acc0969f9ca41984c103ddf56
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5