Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
07/08/2023, 02:19
Static task
static1
Behavioral task
behavioral1
Sample
4e7a4d99665ccdf6446e333107e3a18833e75720080dcdb7b1acdb7a6349a14e.exe
Resource
win7-20230712-en
General
-
Target
4e7a4d99665ccdf6446e333107e3a18833e75720080dcdb7b1acdb7a6349a14e.exe
-
Size
3.7MB
-
MD5
1aced2129d10438dc2866516af3c0577
-
SHA1
ed024afd5293d762830e3e7d419f14e14674645d
-
SHA256
4e7a4d99665ccdf6446e333107e3a18833e75720080dcdb7b1acdb7a6349a14e
-
SHA512
d2f0fecbcd95999a4241f7dd22eb8291b9f18ff8e73687d79f2d968beed8c3b5f5291df52f1b4c40778a7cd0b7a58a6ccca4bc80e240ed5c97fb08083ca5edd4
-
SSDEEP
98304:hHo/Q2nHruNGgkNKhK2dZ1JFSbK2v39O+b+WJ5/DFAuvfVZCY6T:hlwRjNKU6+bKk39O6+a5Rpvfr+T
Malware Config
Extracted
amadey
3.85
45.9.74.166/b7djSDcPcZ/index.php
45.9.74.141/b7djSDcPcZ/index.php
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1508 bstyoops.exe 4580 bstyoops.exe 5036 bstyoops.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1752 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4432 4e7a4d99665ccdf6446e333107e3a18833e75720080dcdb7b1acdb7a6349a14e.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 4432 wrote to memory of 1508 4432 4e7a4d99665ccdf6446e333107e3a18833e75720080dcdb7b1acdb7a6349a14e.exe 81 PID 4432 wrote to memory of 1508 4432 4e7a4d99665ccdf6446e333107e3a18833e75720080dcdb7b1acdb7a6349a14e.exe 81 PID 4432 wrote to memory of 1508 4432 4e7a4d99665ccdf6446e333107e3a18833e75720080dcdb7b1acdb7a6349a14e.exe 81 PID 1508 wrote to memory of 1752 1508 bstyoops.exe 84 PID 1508 wrote to memory of 1752 1508 bstyoops.exe 84 PID 1508 wrote to memory of 1752 1508 bstyoops.exe 84 PID 1508 wrote to memory of 2044 1508 bstyoops.exe 87 PID 1508 wrote to memory of 2044 1508 bstyoops.exe 87 PID 1508 wrote to memory of 2044 1508 bstyoops.exe 87 PID 2044 wrote to memory of 2060 2044 cmd.exe 89 PID 2044 wrote to memory of 2060 2044 cmd.exe 89 PID 2044 wrote to memory of 2060 2044 cmd.exe 89 PID 2044 wrote to memory of 4364 2044 cmd.exe 90 PID 2044 wrote to memory of 4364 2044 cmd.exe 90 PID 2044 wrote to memory of 4364 2044 cmd.exe 90 PID 2044 wrote to memory of 3204 2044 cmd.exe 91 PID 2044 wrote to memory of 3204 2044 cmd.exe 91 PID 2044 wrote to memory of 3204 2044 cmd.exe 91 PID 2044 wrote to memory of 4632 2044 cmd.exe 92 PID 2044 wrote to memory of 4632 2044 cmd.exe 92 PID 2044 wrote to memory of 4632 2044 cmd.exe 92 PID 2044 wrote to memory of 3160 2044 cmd.exe 93 PID 2044 wrote to memory of 3160 2044 cmd.exe 93 PID 2044 wrote to memory of 3160 2044 cmd.exe 93 PID 2044 wrote to memory of 3684 2044 cmd.exe 95 PID 2044 wrote to memory of 3684 2044 cmd.exe 95 PID 2044 wrote to memory of 3684 2044 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e7a4d99665ccdf6446e333107e3a18833e75720080dcdb7b1acdb7a6349a14e.exe"C:\Users\Admin\AppData\Local\Temp\4e7a4d99665ccdf6446e333107e3a18833e75720080dcdb7b1acdb7a6349a14e.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe"C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN bstyoops.exe /TR "C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe" /F3⤵
- Creates scheduled task(s)
PID:1752
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "bstyoops.exe" /P "Admin:N"&&CACLS "bstyoops.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c2868ed41c" /P "Admin:N"&&CACLS "..\c2868ed41c" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2060
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "bstyoops.exe" /P "Admin:N"4⤵PID:4364
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "bstyoops.exe" /P "Admin:R" /E4⤵PID:3204
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:4632
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c2868ed41c" /P "Admin:N"4⤵PID:3160
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c2868ed41c" /P "Admin:R" /E4⤵PID:3684
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exeC:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe1⤵
- Executes dropped EXE
PID:4580
-
C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exeC:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe1⤵
- Executes dropped EXE
PID:5036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.7MB
MD51aced2129d10438dc2866516af3c0577
SHA1ed024afd5293d762830e3e7d419f14e14674645d
SHA2564e7a4d99665ccdf6446e333107e3a18833e75720080dcdb7b1acdb7a6349a14e
SHA512d2f0fecbcd95999a4241f7dd22eb8291b9f18ff8e73687d79f2d968beed8c3b5f5291df52f1b4c40778a7cd0b7a58a6ccca4bc80e240ed5c97fb08083ca5edd4
-
Filesize
3.7MB
MD51aced2129d10438dc2866516af3c0577
SHA1ed024afd5293d762830e3e7d419f14e14674645d
SHA2564e7a4d99665ccdf6446e333107e3a18833e75720080dcdb7b1acdb7a6349a14e
SHA512d2f0fecbcd95999a4241f7dd22eb8291b9f18ff8e73687d79f2d968beed8c3b5f5291df52f1b4c40778a7cd0b7a58a6ccca4bc80e240ed5c97fb08083ca5edd4
-
Filesize
3.7MB
MD51aced2129d10438dc2866516af3c0577
SHA1ed024afd5293d762830e3e7d419f14e14674645d
SHA2564e7a4d99665ccdf6446e333107e3a18833e75720080dcdb7b1acdb7a6349a14e
SHA512d2f0fecbcd95999a4241f7dd22eb8291b9f18ff8e73687d79f2d968beed8c3b5f5291df52f1b4c40778a7cd0b7a58a6ccca4bc80e240ed5c97fb08083ca5edd4
-
Filesize
3.7MB
MD51aced2129d10438dc2866516af3c0577
SHA1ed024afd5293d762830e3e7d419f14e14674645d
SHA2564e7a4d99665ccdf6446e333107e3a18833e75720080dcdb7b1acdb7a6349a14e
SHA512d2f0fecbcd95999a4241f7dd22eb8291b9f18ff8e73687d79f2d968beed8c3b5f5291df52f1b4c40778a7cd0b7a58a6ccca4bc80e240ed5c97fb08083ca5edd4
-
Filesize
3.7MB
MD51aced2129d10438dc2866516af3c0577
SHA1ed024afd5293d762830e3e7d419f14e14674645d
SHA2564e7a4d99665ccdf6446e333107e3a18833e75720080dcdb7b1acdb7a6349a14e
SHA512d2f0fecbcd95999a4241f7dd22eb8291b9f18ff8e73687d79f2d968beed8c3b5f5291df52f1b4c40778a7cd0b7a58a6ccca4bc80e240ed5c97fb08083ca5edd4