Analysis
-
max time kernel
270s -
max time network
235s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
24/07/2023, 04:50
Behavioral task
behavioral1
Sample
g3089479.exe
Resource
win7-20230712-en
General
-
Target
g3089479.exe
-
Size
224KB
-
MD5
8c6b79ec436d7cf6950a804c1ec7d3e9
-
SHA1
4a589d5605d8ef785fdc78b0bf64e769e3a21ad6
-
SHA256
4e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
-
SHA512
06f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
SSDEEP
3072:oTzC4usLP+wOULUFAB3i9nyRA4/Prk3huiPFSbuZRuNcZVKOUm8LHIMbffWtsm3:oTzYsLdf/Rity237PFHRuNcPKOK3+
Malware Config
Extracted
amadey
3.85
77.91.68.3/home/love/index.php
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
pid Process 2476 danke.exe 2268 danke.exe 944 danke.exe 1672 danke.exe 2984 danke.exe 1236 danke.exe -
Loads dropped DLL 1 IoCs
pid Process 2532 g3089479.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1504 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2532 g3089479.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2476 2532 g3089479.exe 28 PID 2532 wrote to memory of 2476 2532 g3089479.exe 28 PID 2532 wrote to memory of 2476 2532 g3089479.exe 28 PID 2532 wrote to memory of 2476 2532 g3089479.exe 28 PID 2476 wrote to memory of 1504 2476 danke.exe 29 PID 2476 wrote to memory of 1504 2476 danke.exe 29 PID 2476 wrote to memory of 1504 2476 danke.exe 29 PID 2476 wrote to memory of 1504 2476 danke.exe 29 PID 2476 wrote to memory of 584 2476 danke.exe 31 PID 2476 wrote to memory of 584 2476 danke.exe 31 PID 2476 wrote to memory of 584 2476 danke.exe 31 PID 2476 wrote to memory of 584 2476 danke.exe 31 PID 584 wrote to memory of 2440 584 cmd.exe 33 PID 584 wrote to memory of 2440 584 cmd.exe 33 PID 584 wrote to memory of 2440 584 cmd.exe 33 PID 584 wrote to memory of 2440 584 cmd.exe 33 PID 584 wrote to memory of 2380 584 cmd.exe 34 PID 584 wrote to memory of 2380 584 cmd.exe 34 PID 584 wrote to memory of 2380 584 cmd.exe 34 PID 584 wrote to memory of 2380 584 cmd.exe 34 PID 584 wrote to memory of 2836 584 cmd.exe 35 PID 584 wrote to memory of 2836 584 cmd.exe 35 PID 584 wrote to memory of 2836 584 cmd.exe 35 PID 584 wrote to memory of 2836 584 cmd.exe 35 PID 584 wrote to memory of 2924 584 cmd.exe 36 PID 584 wrote to memory of 2924 584 cmd.exe 36 PID 584 wrote to memory of 2924 584 cmd.exe 36 PID 584 wrote to memory of 2924 584 cmd.exe 36 PID 584 wrote to memory of 2936 584 cmd.exe 37 PID 584 wrote to memory of 2936 584 cmd.exe 37 PID 584 wrote to memory of 2936 584 cmd.exe 37 PID 584 wrote to memory of 2936 584 cmd.exe 37 PID 584 wrote to memory of 3068 584 cmd.exe 38 PID 584 wrote to memory of 3068 584 cmd.exe 38 PID 584 wrote to memory of 3068 584 cmd.exe 38 PID 584 wrote to memory of 3068 584 cmd.exe 38 PID 1512 wrote to memory of 2268 1512 taskeng.exe 43 PID 1512 wrote to memory of 2268 1512 taskeng.exe 43 PID 1512 wrote to memory of 2268 1512 taskeng.exe 43 PID 1512 wrote to memory of 2268 1512 taskeng.exe 43 PID 1512 wrote to memory of 944 1512 taskeng.exe 44 PID 1512 wrote to memory of 944 1512 taskeng.exe 44 PID 1512 wrote to memory of 944 1512 taskeng.exe 44 PID 1512 wrote to memory of 944 1512 taskeng.exe 44 PID 1512 wrote to memory of 1672 1512 taskeng.exe 45 PID 1512 wrote to memory of 1672 1512 taskeng.exe 45 PID 1512 wrote to memory of 1672 1512 taskeng.exe 45 PID 1512 wrote to memory of 1672 1512 taskeng.exe 45 PID 1512 wrote to memory of 2984 1512 taskeng.exe 46 PID 1512 wrote to memory of 2984 1512 taskeng.exe 46 PID 1512 wrote to memory of 2984 1512 taskeng.exe 46 PID 1512 wrote to memory of 2984 1512 taskeng.exe 46 PID 1512 wrote to memory of 1236 1512 taskeng.exe 47 PID 1512 wrote to memory of 1236 1512 taskeng.exe 47 PID 1512 wrote to memory of 1236 1512 taskeng.exe 47 PID 1512 wrote to memory of 1236 1512 taskeng.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\g3089479.exe"C:\Users\Admin\AppData\Local\Temp\g3089479.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F3⤵
- Creates scheduled task(s)
PID:1504
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2440
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:N"4⤵PID:2380
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:R" /E4⤵PID:2836
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2924
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:N"4⤵PID:2936
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:R" /E4⤵PID:3068
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {61A6E29C-76B4-4D33-B6F2-98559769ECD0} S-1-5-21-4159544280-4273523227-683900707-1000:UMAXQRGK\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe2⤵
- Executes dropped EXE
PID:2268
-
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe2⤵
- Executes dropped EXE
PID:944
-
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe2⤵
- Executes dropped EXE
PID:1672
-
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe2⤵
- Executes dropped EXE
PID:2984
-
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe2⤵
- Executes dropped EXE
PID:1236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce