Analysis
-
max time kernel
108s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14-06-2023 19:48
Behavioral task
behavioral1
Sample
0x0003000000000731-203.exe
Resource
win7-20230220-en
General
-
Target
0x0003000000000731-203.exe
-
Size
206KB
-
MD5
116ba99c9cce91cee7d3b878c8f4ae87
-
SHA1
16cc47876c7eadd0a4da5e8e1d0abda6db4fb52f
-
SHA256
94e99a1b20326cb4564d899f3d71ad9d7311ba77a47984367ddfe711d3c3a70e
-
SHA512
a91221a00ccffebe110847b60f509f85bd648ecec0819ca66bf602f4709bc516d713a6ea88b06685afc91a0548d2a677be391765703c8fea5db417778679f3ee
-
SSDEEP
3072:WpxiMVc/oooAUNfLp1zuNW3KG7uON8wAuZA+6jbe83xfbq5kmh:siMV5oofVu432OiuZAlXjq
Malware Config
Extracted
amadey
3.81
95.214.27.98/cronus/index.php
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1872 legends.exe 1340 legends.exe 1584 legends.exe -
Loads dropped DLL 5 IoCs
pid Process 2000 0x0003000000000731-203.exe 2020 rundll32.exe 2020 rundll32.exe 2020 rundll32.exe 2020 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1636 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2000 0x0003000000000731-203.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 2000 wrote to memory of 1872 2000 0x0003000000000731-203.exe 28 PID 2000 wrote to memory of 1872 2000 0x0003000000000731-203.exe 28 PID 2000 wrote to memory of 1872 2000 0x0003000000000731-203.exe 28 PID 2000 wrote to memory of 1872 2000 0x0003000000000731-203.exe 28 PID 1872 wrote to memory of 1636 1872 legends.exe 29 PID 1872 wrote to memory of 1636 1872 legends.exe 29 PID 1872 wrote to memory of 1636 1872 legends.exe 29 PID 1872 wrote to memory of 1636 1872 legends.exe 29 PID 1872 wrote to memory of 568 1872 legends.exe 31 PID 1872 wrote to memory of 568 1872 legends.exe 31 PID 1872 wrote to memory of 568 1872 legends.exe 31 PID 1872 wrote to memory of 568 1872 legends.exe 31 PID 568 wrote to memory of 376 568 cmd.exe 33 PID 568 wrote to memory of 376 568 cmd.exe 33 PID 568 wrote to memory of 376 568 cmd.exe 33 PID 568 wrote to memory of 376 568 cmd.exe 33 PID 568 wrote to memory of 1164 568 cmd.exe 34 PID 568 wrote to memory of 1164 568 cmd.exe 34 PID 568 wrote to memory of 1164 568 cmd.exe 34 PID 568 wrote to memory of 1164 568 cmd.exe 34 PID 568 wrote to memory of 1760 568 cmd.exe 35 PID 568 wrote to memory of 1760 568 cmd.exe 35 PID 568 wrote to memory of 1760 568 cmd.exe 35 PID 568 wrote to memory of 1760 568 cmd.exe 35 PID 568 wrote to memory of 1012 568 cmd.exe 36 PID 568 wrote to memory of 1012 568 cmd.exe 36 PID 568 wrote to memory of 1012 568 cmd.exe 36 PID 568 wrote to memory of 1012 568 cmd.exe 36 PID 568 wrote to memory of 1784 568 cmd.exe 37 PID 568 wrote to memory of 1784 568 cmd.exe 37 PID 568 wrote to memory of 1784 568 cmd.exe 37 PID 568 wrote to memory of 1784 568 cmd.exe 37 PID 568 wrote to memory of 636 568 cmd.exe 38 PID 568 wrote to memory of 636 568 cmd.exe 38 PID 568 wrote to memory of 636 568 cmd.exe 38 PID 568 wrote to memory of 636 568 cmd.exe 38 PID 1808 wrote to memory of 1340 1808 taskeng.exe 42 PID 1808 wrote to memory of 1340 1808 taskeng.exe 42 PID 1808 wrote to memory of 1340 1808 taskeng.exe 42 PID 1808 wrote to memory of 1340 1808 taskeng.exe 42 PID 1872 wrote to memory of 2020 1872 legends.exe 43 PID 1872 wrote to memory of 2020 1872 legends.exe 43 PID 1872 wrote to memory of 2020 1872 legends.exe 43 PID 1872 wrote to memory of 2020 1872 legends.exe 43 PID 1872 wrote to memory of 2020 1872 legends.exe 43 PID 1872 wrote to memory of 2020 1872 legends.exe 43 PID 1872 wrote to memory of 2020 1872 legends.exe 43 PID 1808 wrote to memory of 1584 1808 taskeng.exe 44 PID 1808 wrote to memory of 1584 1808 taskeng.exe 44 PID 1808 wrote to memory of 1584 1808 taskeng.exe 44 PID 1808 wrote to memory of 1584 1808 taskeng.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x0003000000000731-203.exe"C:\Users\Admin\AppData\Local\Temp\0x0003000000000731-203.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legends.exe /TR "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe" /F3⤵
- Creates scheduled task(s)
PID:1636
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legends.exe" /P "Admin:N"&&CACLS "legends.exe" /P "Admin:R" /E&&echo Y|CACLS "..\41bde21dc7" /P "Admin:N"&&CACLS "..\41bde21dc7" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:376
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legends.exe" /P "Admin:N"4⤵PID:1164
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legends.exe" /P "Admin:R" /E4⤵PID:1760
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1012
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\41bde21dc7" /P "Admin:N"4⤵PID:1784
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\41bde21dc7" /P "Admin:R" /E4⤵PID:636
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main3⤵
- Loads dropped DLL
PID:2020
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {7BA5E741-F410-4327-BB98-CD61F332F116} S-1-5-21-3430344531-3702557399-3004411149-1000:WFSTZEPN\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe2⤵
- Executes dropped EXE
PID:1340
-
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe2⤵
- Executes dropped EXE
PID:1584
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5116ba99c9cce91cee7d3b878c8f4ae87
SHA116cc47876c7eadd0a4da5e8e1d0abda6db4fb52f
SHA25694e99a1b20326cb4564d899f3d71ad9d7311ba77a47984367ddfe711d3c3a70e
SHA512a91221a00ccffebe110847b60f509f85bd648ecec0819ca66bf602f4709bc516d713a6ea88b06685afc91a0548d2a677be391765703c8fea5db417778679f3ee
-
Filesize
206KB
MD5116ba99c9cce91cee7d3b878c8f4ae87
SHA116cc47876c7eadd0a4da5e8e1d0abda6db4fb52f
SHA25694e99a1b20326cb4564d899f3d71ad9d7311ba77a47984367ddfe711d3c3a70e
SHA512a91221a00ccffebe110847b60f509f85bd648ecec0819ca66bf602f4709bc516d713a6ea88b06685afc91a0548d2a677be391765703c8fea5db417778679f3ee
-
Filesize
206KB
MD5116ba99c9cce91cee7d3b878c8f4ae87
SHA116cc47876c7eadd0a4da5e8e1d0abda6db4fb52f
SHA25694e99a1b20326cb4564d899f3d71ad9d7311ba77a47984367ddfe711d3c3a70e
SHA512a91221a00ccffebe110847b60f509f85bd648ecec0819ca66bf602f4709bc516d713a6ea88b06685afc91a0548d2a677be391765703c8fea5db417778679f3ee
-
Filesize
206KB
MD5116ba99c9cce91cee7d3b878c8f4ae87
SHA116cc47876c7eadd0a4da5e8e1d0abda6db4fb52f
SHA25694e99a1b20326cb4564d899f3d71ad9d7311ba77a47984367ddfe711d3c3a70e
SHA512a91221a00ccffebe110847b60f509f85bd648ecec0819ca66bf602f4709bc516d713a6ea88b06685afc91a0548d2a677be391765703c8fea5db417778679f3ee
-
Filesize
206KB
MD5116ba99c9cce91cee7d3b878c8f4ae87
SHA116cc47876c7eadd0a4da5e8e1d0abda6db4fb52f
SHA25694e99a1b20326cb4564d899f3d71ad9d7311ba77a47984367ddfe711d3c3a70e
SHA512a91221a00ccffebe110847b60f509f85bd648ecec0819ca66bf602f4709bc516d713a6ea88b06685afc91a0548d2a677be391765703c8fea5db417778679f3ee
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
206KB
MD5116ba99c9cce91cee7d3b878c8f4ae87
SHA116cc47876c7eadd0a4da5e8e1d0abda6db4fb52f
SHA25694e99a1b20326cb4564d899f3d71ad9d7311ba77a47984367ddfe711d3c3a70e
SHA512a91221a00ccffebe110847b60f509f85bd648ecec0819ca66bf602f4709bc516d713a6ea88b06685afc91a0548d2a677be391765703c8fea5db417778679f3ee
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643