Analysis
-
max time kernel
139s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
27/08/2023, 10:30
Behavioral task
behavioral1
Sample
0x0007000000018bba-34.exe
Resource
win7-20230712-en
General
-
Target
0x0007000000018bba-34.exe
-
Size
322KB
-
MD5
390f9d6624fa0e1907279dd8abfa6822
-
SHA1
0b00a958b0f861707eedd39600d1c177ed5a2112
-
SHA256
a5291740a87cea6446dc66f84942f5cd5b3a887209c8c51a0d8b3922aa2c5f46
-
SHA512
a92df1080fefc709ca585ff02a9303b12154af9268ee15e66289dbce35635e553e67ecceb3d77a940450cb9759ac2151747aa46d34368a9c2507dfcb47dc7c49
-
SSDEEP
6144:SR9eh569+UR6P3zIwkp4p2k/DPaZHwc3eoe6u17MgAOIMs8Bq:Sfm5BB7kpi2k/ae6u17pa8Bq
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1352 saves.exe 1196 saves.exe 456 saves.exe -
Loads dropped DLL 5 IoCs
pid Process 1628 0x0007000000018bba-34.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2860 schtasks.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 1628 wrote to memory of 1352 1628 0x0007000000018bba-34.exe 28 PID 1628 wrote to memory of 1352 1628 0x0007000000018bba-34.exe 28 PID 1628 wrote to memory of 1352 1628 0x0007000000018bba-34.exe 28 PID 1628 wrote to memory of 1352 1628 0x0007000000018bba-34.exe 28 PID 1352 wrote to memory of 2860 1352 saves.exe 29 PID 1352 wrote to memory of 2860 1352 saves.exe 29 PID 1352 wrote to memory of 2860 1352 saves.exe 29 PID 1352 wrote to memory of 2860 1352 saves.exe 29 PID 1352 wrote to memory of 2988 1352 saves.exe 31 PID 1352 wrote to memory of 2988 1352 saves.exe 31 PID 1352 wrote to memory of 2988 1352 saves.exe 31 PID 1352 wrote to memory of 2988 1352 saves.exe 31 PID 2988 wrote to memory of 2816 2988 cmd.exe 33 PID 2988 wrote to memory of 2816 2988 cmd.exe 33 PID 2988 wrote to memory of 2816 2988 cmd.exe 33 PID 2988 wrote to memory of 2816 2988 cmd.exe 33 PID 2988 wrote to memory of 1688 2988 cmd.exe 34 PID 2988 wrote to memory of 1688 2988 cmd.exe 34 PID 2988 wrote to memory of 1688 2988 cmd.exe 34 PID 2988 wrote to memory of 1688 2988 cmd.exe 34 PID 2988 wrote to memory of 2920 2988 cmd.exe 35 PID 2988 wrote to memory of 2920 2988 cmd.exe 35 PID 2988 wrote to memory of 2920 2988 cmd.exe 35 PID 2988 wrote to memory of 2920 2988 cmd.exe 35 PID 2988 wrote to memory of 616 2988 cmd.exe 36 PID 2988 wrote to memory of 616 2988 cmd.exe 36 PID 2988 wrote to memory of 616 2988 cmd.exe 36 PID 2988 wrote to memory of 616 2988 cmd.exe 36 PID 2988 wrote to memory of 2172 2988 cmd.exe 37 PID 2988 wrote to memory of 2172 2988 cmd.exe 37 PID 2988 wrote to memory of 2172 2988 cmd.exe 37 PID 2988 wrote to memory of 2172 2988 cmd.exe 37 PID 2988 wrote to memory of 2928 2988 cmd.exe 38 PID 2988 wrote to memory of 2928 2988 cmd.exe 38 PID 2988 wrote to memory of 2928 2988 cmd.exe 38 PID 2988 wrote to memory of 2928 2988 cmd.exe 38 PID 1524 wrote to memory of 1196 1524 taskeng.exe 43 PID 1524 wrote to memory of 1196 1524 taskeng.exe 43 PID 1524 wrote to memory of 1196 1524 taskeng.exe 43 PID 1524 wrote to memory of 1196 1524 taskeng.exe 43 PID 1352 wrote to memory of 2184 1352 saves.exe 44 PID 1352 wrote to memory of 2184 1352 saves.exe 44 PID 1352 wrote to memory of 2184 1352 saves.exe 44 PID 1352 wrote to memory of 2184 1352 saves.exe 44 PID 1352 wrote to memory of 2184 1352 saves.exe 44 PID 1352 wrote to memory of 2184 1352 saves.exe 44 PID 1352 wrote to memory of 2184 1352 saves.exe 44 PID 1524 wrote to memory of 456 1524 taskeng.exe 45 PID 1524 wrote to memory of 456 1524 taskeng.exe 45 PID 1524 wrote to memory of 456 1524 taskeng.exe 45 PID 1524 wrote to memory of 456 1524 taskeng.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x0007000000018bba-34.exe"C:\Users\Admin\AppData\Local\Temp\0x0007000000018bba-34.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F3⤵
- Creates scheduled task(s)
PID:2860
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2816
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"4⤵PID:1688
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E4⤵PID:2920
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:616
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"4⤵PID:2172
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E4⤵PID:2928
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Loads dropped DLL
PID:2184
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {1EA520E6-38D1-46A2-9D31-1806450663F8} S-1-5-21-377084978-2088738870-2818360375-1000:DSWJWADP\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe2⤵
- Executes dropped EXE
PID:1196
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe2⤵
- Executes dropped EXE
PID:456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
322KB
MD5390f9d6624fa0e1907279dd8abfa6822
SHA10b00a958b0f861707eedd39600d1c177ed5a2112
SHA256a5291740a87cea6446dc66f84942f5cd5b3a887209c8c51a0d8b3922aa2c5f46
SHA512a92df1080fefc709ca585ff02a9303b12154af9268ee15e66289dbce35635e553e67ecceb3d77a940450cb9759ac2151747aa46d34368a9c2507dfcb47dc7c49
-
Filesize
322KB
MD5390f9d6624fa0e1907279dd8abfa6822
SHA10b00a958b0f861707eedd39600d1c177ed5a2112
SHA256a5291740a87cea6446dc66f84942f5cd5b3a887209c8c51a0d8b3922aa2c5f46
SHA512a92df1080fefc709ca585ff02a9303b12154af9268ee15e66289dbce35635e553e67ecceb3d77a940450cb9759ac2151747aa46d34368a9c2507dfcb47dc7c49
-
Filesize
322KB
MD5390f9d6624fa0e1907279dd8abfa6822
SHA10b00a958b0f861707eedd39600d1c177ed5a2112
SHA256a5291740a87cea6446dc66f84942f5cd5b3a887209c8c51a0d8b3922aa2c5f46
SHA512a92df1080fefc709ca585ff02a9303b12154af9268ee15e66289dbce35635e553e67ecceb3d77a940450cb9759ac2151747aa46d34368a9c2507dfcb47dc7c49
-
Filesize
322KB
MD5390f9d6624fa0e1907279dd8abfa6822
SHA10b00a958b0f861707eedd39600d1c177ed5a2112
SHA256a5291740a87cea6446dc66f84942f5cd5b3a887209c8c51a0d8b3922aa2c5f46
SHA512a92df1080fefc709ca585ff02a9303b12154af9268ee15e66289dbce35635e553e67ecceb3d77a940450cb9759ac2151747aa46d34368a9c2507dfcb47dc7c49
-
Filesize
322KB
MD5390f9d6624fa0e1907279dd8abfa6822
SHA10b00a958b0f861707eedd39600d1c177ed5a2112
SHA256a5291740a87cea6446dc66f84942f5cd5b3a887209c8c51a0d8b3922aa2c5f46
SHA512a92df1080fefc709ca585ff02a9303b12154af9268ee15e66289dbce35635e553e67ecceb3d77a940450cb9759ac2151747aa46d34368a9c2507dfcb47dc7c49
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
322KB
MD5390f9d6624fa0e1907279dd8abfa6822
SHA10b00a958b0f861707eedd39600d1c177ed5a2112
SHA256a5291740a87cea6446dc66f84942f5cd5b3a887209c8c51a0d8b3922aa2c5f46
SHA512a92df1080fefc709ca585ff02a9303b12154af9268ee15e66289dbce35635e553e67ecceb3d77a940450cb9759ac2151747aa46d34368a9c2507dfcb47dc7c49
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b