Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2023, 11:55
Behavioral task
behavioral1
Sample
0x000600000001414c-92.exe
Resource
win7-20230220-en
General
-
Target
0x000600000001414c-92.exe
-
Size
205KB
-
MD5
50cd3787763e0bf5ded69a2260c5d2a4
-
SHA1
80955fcb1dc9977549813ed0e3d52b23a1d201ed
-
SHA256
866894828249946a7a6af9befd0738d0ed8f55839d5dcc95b78049b1977a3921
-
SHA512
5435edd160aeb8d5cc6e47b5ff9c7234abb081317edc955e2d83825a58b315061f350fc95192a5fae81e46b08c7e06045bade7172a8160e32804219f92f30c52
-
SSDEEP
3072:CXkSckkHbzG1iXAt60p0zuNmnKG7peNMQbuZAIOb2y3xfbT:8kSDAzG1iciuInRexuZAIKj
Malware Config
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation 0x000600000001414c-92.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation rugen.exe -
Executes dropped EXE 3 IoCs
pid Process 2276 rugen.exe 3888 rugen.exe 4120 rugen.exe -
Loads dropped DLL 1 IoCs
pid Process 524 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4700 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3532 0x000600000001414c-92.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3532 wrote to memory of 2276 3532 0x000600000001414c-92.exe 84 PID 3532 wrote to memory of 2276 3532 0x000600000001414c-92.exe 84 PID 3532 wrote to memory of 2276 3532 0x000600000001414c-92.exe 84 PID 2276 wrote to memory of 4700 2276 rugen.exe 85 PID 2276 wrote to memory of 4700 2276 rugen.exe 85 PID 2276 wrote to memory of 4700 2276 rugen.exe 85 PID 2276 wrote to memory of 2680 2276 rugen.exe 87 PID 2276 wrote to memory of 2680 2276 rugen.exe 87 PID 2276 wrote to memory of 2680 2276 rugen.exe 87 PID 2680 wrote to memory of 1012 2680 cmd.exe 89 PID 2680 wrote to memory of 1012 2680 cmd.exe 89 PID 2680 wrote to memory of 1012 2680 cmd.exe 89 PID 2680 wrote to memory of 1384 2680 cmd.exe 90 PID 2680 wrote to memory of 1384 2680 cmd.exe 90 PID 2680 wrote to memory of 1384 2680 cmd.exe 90 PID 2680 wrote to memory of 1712 2680 cmd.exe 91 PID 2680 wrote to memory of 1712 2680 cmd.exe 91 PID 2680 wrote to memory of 1712 2680 cmd.exe 91 PID 2680 wrote to memory of 340 2680 cmd.exe 92 PID 2680 wrote to memory of 340 2680 cmd.exe 92 PID 2680 wrote to memory of 340 2680 cmd.exe 92 PID 2680 wrote to memory of 228 2680 cmd.exe 93 PID 2680 wrote to memory of 228 2680 cmd.exe 93 PID 2680 wrote to memory of 228 2680 cmd.exe 93 PID 2680 wrote to memory of 180 2680 cmd.exe 94 PID 2680 wrote to memory of 180 2680 cmd.exe 94 PID 2680 wrote to memory of 180 2680 cmd.exe 94 PID 2276 wrote to memory of 524 2276 rugen.exe 103 PID 2276 wrote to memory of 524 2276 rugen.exe 103 PID 2276 wrote to memory of 524 2276 rugen.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x000600000001414c-92.exe"C:\Users\Admin\AppData\Local\Temp\0x000600000001414c-92.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F3⤵
- Creates scheduled task(s)
PID:4700
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1012
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"4⤵PID:1384
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E4⤵PID:1712
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:340
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"4⤵PID:228
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E4⤵PID:180
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Loads dropped DLL
PID:524
-
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:3888
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:4120
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD550cd3787763e0bf5ded69a2260c5d2a4
SHA180955fcb1dc9977549813ed0e3d52b23a1d201ed
SHA256866894828249946a7a6af9befd0738d0ed8f55839d5dcc95b78049b1977a3921
SHA5125435edd160aeb8d5cc6e47b5ff9c7234abb081317edc955e2d83825a58b315061f350fc95192a5fae81e46b08c7e06045bade7172a8160e32804219f92f30c52
-
Filesize
205KB
MD550cd3787763e0bf5ded69a2260c5d2a4
SHA180955fcb1dc9977549813ed0e3d52b23a1d201ed
SHA256866894828249946a7a6af9befd0738d0ed8f55839d5dcc95b78049b1977a3921
SHA5125435edd160aeb8d5cc6e47b5ff9c7234abb081317edc955e2d83825a58b315061f350fc95192a5fae81e46b08c7e06045bade7172a8160e32804219f92f30c52
-
Filesize
205KB
MD550cd3787763e0bf5ded69a2260c5d2a4
SHA180955fcb1dc9977549813ed0e3d52b23a1d201ed
SHA256866894828249946a7a6af9befd0738d0ed8f55839d5dcc95b78049b1977a3921
SHA5125435edd160aeb8d5cc6e47b5ff9c7234abb081317edc955e2d83825a58b315061f350fc95192a5fae81e46b08c7e06045bade7172a8160e32804219f92f30c52
-
Filesize
205KB
MD550cd3787763e0bf5ded69a2260c5d2a4
SHA180955fcb1dc9977549813ed0e3d52b23a1d201ed
SHA256866894828249946a7a6af9befd0738d0ed8f55839d5dcc95b78049b1977a3921
SHA5125435edd160aeb8d5cc6e47b5ff9c7234abb081317edc955e2d83825a58b315061f350fc95192a5fae81e46b08c7e06045bade7172a8160e32804219f92f30c52
-
Filesize
205KB
MD550cd3787763e0bf5ded69a2260c5d2a4
SHA180955fcb1dc9977549813ed0e3d52b23a1d201ed
SHA256866894828249946a7a6af9befd0738d0ed8f55839d5dcc95b78049b1977a3921
SHA5125435edd160aeb8d5cc6e47b5ff9c7234abb081317edc955e2d83825a58b315061f350fc95192a5fae81e46b08c7e06045bade7172a8160e32804219f92f30c52
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5