Analysis
-
max time kernel
182s -
max time network
259s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
28-08-2023 04:38
Behavioral task
behavioral1
Sample
l5952554.exe
Resource
win7-20230824-en
General
-
Target
l5952554.exe
-
Size
319KB
-
MD5
5a6e758df64ee5553fdb304f6f97dfc1
-
SHA1
24f5e539dc1293faf20a69fcb9d5fcedc76e3062
-
SHA256
71eddfd20f707e09cc3d28c903e9a5781024cd0ba1ff54ad17f2efe496c25c7d
-
SHA512
67831462985d7824bb5701dc466382b002e4e891a1610bb8aa1d2a1d5a3091447c3b9dc0d2525c21d6a2c634b59b7eb8860742d05ff3dc24c6fa6118874125dc
-
SSDEEP
6144:SR9eh569+UR6P3zIwkp4p2k/DPaZHwc3eoe6u17MgAOIMs8Bq:Sfm5BB7kpi2k/ae6u17pa8Bq
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4596 saves.exe 4132 saves.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4316 schtasks.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 5116 wrote to memory of 4596 5116 l5952554.exe 69 PID 5116 wrote to memory of 4596 5116 l5952554.exe 69 PID 5116 wrote to memory of 4596 5116 l5952554.exe 69 PID 4596 wrote to memory of 4316 4596 saves.exe 70 PID 4596 wrote to memory of 4316 4596 saves.exe 70 PID 4596 wrote to memory of 4316 4596 saves.exe 70 PID 4596 wrote to memory of 2560 4596 saves.exe 71 PID 4596 wrote to memory of 2560 4596 saves.exe 71 PID 4596 wrote to memory of 2560 4596 saves.exe 71 PID 2560 wrote to memory of 216 2560 cmd.exe 74 PID 2560 wrote to memory of 216 2560 cmd.exe 74 PID 2560 wrote to memory of 216 2560 cmd.exe 74 PID 2560 wrote to memory of 4464 2560 cmd.exe 75 PID 2560 wrote to memory of 4464 2560 cmd.exe 75 PID 2560 wrote to memory of 4464 2560 cmd.exe 75 PID 2560 wrote to memory of 4180 2560 cmd.exe 76 PID 2560 wrote to memory of 4180 2560 cmd.exe 76 PID 2560 wrote to memory of 4180 2560 cmd.exe 76 PID 2560 wrote to memory of 952 2560 cmd.exe 77 PID 2560 wrote to memory of 952 2560 cmd.exe 77 PID 2560 wrote to memory of 952 2560 cmd.exe 77 PID 2560 wrote to memory of 4144 2560 cmd.exe 78 PID 2560 wrote to memory of 4144 2560 cmd.exe 78 PID 2560 wrote to memory of 4144 2560 cmd.exe 78 PID 2560 wrote to memory of 4432 2560 cmd.exe 79 PID 2560 wrote to memory of 4432 2560 cmd.exe 79 PID 2560 wrote to memory of 4432 2560 cmd.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\l5952554.exe"C:\Users\Admin\AppData\Local\Temp\l5952554.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F3⤵
- Creates scheduled task(s)
PID:4316
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:216
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"4⤵PID:4464
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E4⤵PID:4180
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:952
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"4⤵PID:4144
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E4⤵PID:4432
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
319KB
MD55a6e758df64ee5553fdb304f6f97dfc1
SHA124f5e539dc1293faf20a69fcb9d5fcedc76e3062
SHA25671eddfd20f707e09cc3d28c903e9a5781024cd0ba1ff54ad17f2efe496c25c7d
SHA51267831462985d7824bb5701dc466382b002e4e891a1610bb8aa1d2a1d5a3091447c3b9dc0d2525c21d6a2c634b59b7eb8860742d05ff3dc24c6fa6118874125dc
-
Filesize
319KB
MD55a6e758df64ee5553fdb304f6f97dfc1
SHA124f5e539dc1293faf20a69fcb9d5fcedc76e3062
SHA25671eddfd20f707e09cc3d28c903e9a5781024cd0ba1ff54ad17f2efe496c25c7d
SHA51267831462985d7824bb5701dc466382b002e4e891a1610bb8aa1d2a1d5a3091447c3b9dc0d2525c21d6a2c634b59b7eb8860742d05ff3dc24c6fa6118874125dc
-
Filesize
319KB
MD55a6e758df64ee5553fdb304f6f97dfc1
SHA124f5e539dc1293faf20a69fcb9d5fcedc76e3062
SHA25671eddfd20f707e09cc3d28c903e9a5781024cd0ba1ff54ad17f2efe496c25c7d
SHA51267831462985d7824bb5701dc466382b002e4e891a1610bb8aa1d2a1d5a3091447c3b9dc0d2525c21d6a2c634b59b7eb8860742d05ff3dc24c6fa6118874125dc