Analysis
-
max time kernel
182s -
max time network
237s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
28/08/2023, 04:36
Static task
static1
Behavioral task
behavioral1
Sample
y3394774.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
y3394774.exe
Resource
win10-20230703-en
General
-
Target
y3394774.exe
-
Size
320KB
-
MD5
509da1dda78d29a6dd036420d9693729
-
SHA1
0937f3c6f37030e4ca59532eba7ec89e781c8aa3
-
SHA256
6fc9b1a9cf410f38cb75c2c7e02694abf76b7a3b594663ee912db580d4c29a17
-
SHA512
f627f0b4e70bc7e7ea8f8e0a53367d0d58eed5dbd026ccf8736c315f897cdb0661fcf8700529d7515fd7f6a06fdb9e5c7d6fcd316f6eb5a3ce2e0f92bc6fb88d
-
SSDEEP
6144:K6y+bnr+Np0yN90QEprKEP3ve7yRfsK6KRFjEXtaBv7T8KgxW94sMk:yMrhy90/KU/e7RK6KRdEXYp7I7xW94Jk
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 3716 l5265920.exe 920 saves.exe 5012 m9943034.exe 4480 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 3848 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" y3394774.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2444 schtasks.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3392 wrote to memory of 3716 3392 y3394774.exe 70 PID 3392 wrote to memory of 3716 3392 y3394774.exe 70 PID 3392 wrote to memory of 3716 3392 y3394774.exe 70 PID 3716 wrote to memory of 920 3716 l5265920.exe 71 PID 3716 wrote to memory of 920 3716 l5265920.exe 71 PID 3716 wrote to memory of 920 3716 l5265920.exe 71 PID 3392 wrote to memory of 5012 3392 y3394774.exe 72 PID 3392 wrote to memory of 5012 3392 y3394774.exe 72 PID 3392 wrote to memory of 5012 3392 y3394774.exe 72 PID 920 wrote to memory of 2444 920 saves.exe 73 PID 920 wrote to memory of 2444 920 saves.exe 73 PID 920 wrote to memory of 2444 920 saves.exe 73 PID 920 wrote to memory of 3964 920 saves.exe 74 PID 920 wrote to memory of 3964 920 saves.exe 74 PID 920 wrote to memory of 3964 920 saves.exe 74 PID 3964 wrote to memory of 340 3964 cmd.exe 77 PID 3964 wrote to memory of 340 3964 cmd.exe 77 PID 3964 wrote to memory of 340 3964 cmd.exe 77 PID 3964 wrote to memory of 4256 3964 cmd.exe 78 PID 3964 wrote to memory of 4256 3964 cmd.exe 78 PID 3964 wrote to memory of 4256 3964 cmd.exe 78 PID 3964 wrote to memory of 3936 3964 cmd.exe 79 PID 3964 wrote to memory of 3936 3964 cmd.exe 79 PID 3964 wrote to memory of 3936 3964 cmd.exe 79 PID 3964 wrote to memory of 3576 3964 cmd.exe 80 PID 3964 wrote to memory of 3576 3964 cmd.exe 80 PID 3964 wrote to memory of 3576 3964 cmd.exe 80 PID 3964 wrote to memory of 3056 3964 cmd.exe 81 PID 3964 wrote to memory of 3056 3964 cmd.exe 81 PID 3964 wrote to memory of 3056 3964 cmd.exe 81 PID 3964 wrote to memory of 1892 3964 cmd.exe 82 PID 3964 wrote to memory of 1892 3964 cmd.exe 82 PID 3964 wrote to memory of 1892 3964 cmd.exe 82 PID 920 wrote to memory of 3848 920 saves.exe 83 PID 920 wrote to memory of 3848 920 saves.exe 83 PID 920 wrote to memory of 3848 920 saves.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\y3394774.exe"C:\Users\Admin\AppData\Local\Temp\y3394774.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l5265920.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l5265920.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F4⤵
- Creates scheduled task(s)
PID:2444
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:340
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"5⤵PID:4256
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E5⤵PID:3936
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3576
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"5⤵PID:3056
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E5⤵PID:1892
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3848
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m9943034.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m9943034.exe2⤵
- Executes dropped EXE
PID:5012
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
322KB
MD5ffe512a49f5b67365d1f54ff54ac0189
SHA180e05bf2c1e8720c79208660ac30f011c35bdf88
SHA25655b7464fbd89492bcc661e65940738b27eceec2499623dd6a4d77029803538ec
SHA5124263c3db943fb5b7aa3eb6719209cf372798b33b887d91673cef5894ee9f75cd158082ea72498286c1743f20ac9eace8851ca05920659d0288c2dc17edb70812
-
Filesize
322KB
MD5ffe512a49f5b67365d1f54ff54ac0189
SHA180e05bf2c1e8720c79208660ac30f011c35bdf88
SHA25655b7464fbd89492bcc661e65940738b27eceec2499623dd6a4d77029803538ec
SHA5124263c3db943fb5b7aa3eb6719209cf372798b33b887d91673cef5894ee9f75cd158082ea72498286c1743f20ac9eace8851ca05920659d0288c2dc17edb70812
-
Filesize
140KB
MD5cd35f0bf18be1246d46ee7c18c465f78
SHA107e28967c78bb47d0791a00e55d33ad6e54cafa0
SHA256ee61ae00f2ec54bd3c1859ec8ca0d59c3549908a81bbcc489dd962a877ef44a8
SHA512ba3ad77b2a578057a6ca6f6f6a6a9df6a39bc88b4736729a48972ceccc641b645d546d6e862539d609ebf3531995187b33adb4db32293a972603d98296cec8e1
-
Filesize
140KB
MD5cd35f0bf18be1246d46ee7c18c465f78
SHA107e28967c78bb47d0791a00e55d33ad6e54cafa0
SHA256ee61ae00f2ec54bd3c1859ec8ca0d59c3549908a81bbcc489dd962a877ef44a8
SHA512ba3ad77b2a578057a6ca6f6f6a6a9df6a39bc88b4736729a48972ceccc641b645d546d6e862539d609ebf3531995187b33adb4db32293a972603d98296cec8e1
-
Filesize
322KB
MD5ffe512a49f5b67365d1f54ff54ac0189
SHA180e05bf2c1e8720c79208660ac30f011c35bdf88
SHA25655b7464fbd89492bcc661e65940738b27eceec2499623dd6a4d77029803538ec
SHA5124263c3db943fb5b7aa3eb6719209cf372798b33b887d91673cef5894ee9f75cd158082ea72498286c1743f20ac9eace8851ca05920659d0288c2dc17edb70812
-
Filesize
322KB
MD5ffe512a49f5b67365d1f54ff54ac0189
SHA180e05bf2c1e8720c79208660ac30f011c35bdf88
SHA25655b7464fbd89492bcc661e65940738b27eceec2499623dd6a4d77029803538ec
SHA5124263c3db943fb5b7aa3eb6719209cf372798b33b887d91673cef5894ee9f75cd158082ea72498286c1743f20ac9eace8851ca05920659d0288c2dc17edb70812
-
Filesize
322KB
MD5ffe512a49f5b67365d1f54ff54ac0189
SHA180e05bf2c1e8720c79208660ac30f011c35bdf88
SHA25655b7464fbd89492bcc661e65940738b27eceec2499623dd6a4d77029803538ec
SHA5124263c3db943fb5b7aa3eb6719209cf372798b33b887d91673cef5894ee9f75cd158082ea72498286c1743f20ac9eace8851ca05920659d0288c2dc17edb70812
-
Filesize
322KB
MD5ffe512a49f5b67365d1f54ff54ac0189
SHA180e05bf2c1e8720c79208660ac30f011c35bdf88
SHA25655b7464fbd89492bcc661e65940738b27eceec2499623dd6a4d77029803538ec
SHA5124263c3db943fb5b7aa3eb6719209cf372798b33b887d91673cef5894ee9f75cd158082ea72498286c1743f20ac9eace8851ca05920659d0288c2dc17edb70812
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b