Analysis
-
max time kernel
128s -
max time network
133s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
02-09-2023 22:05
General
-
Target
f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39.exe
-
Size
307KB
-
MD5
55f845c433e637594aaf872e41fda207
-
SHA1
1188348ca7e52f075e7d1d0031918c2cea93362e
-
SHA256
f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
-
SHA512
5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4
-
SSDEEP
6144:GUG2bcUH6Z0+ReEjhVsJgAmkMAIeuudb8MT8AOacOZS:GU9bIeEdVsJqeuudbFT8SZS
Malware Config
Extracted
amadey
3.87
79.137.192.18/9bDc8sQ/index.php
-
install_dir
577f58beff
-
install_file
yiueea.exe
-
strings_key
a5085075a537f09dec81cc154ec0af4d
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2196 yiueea.exe 3620 yiueea.exe 4104 yiueea.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3040 schtasks.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 4576 wrote to memory of 2196 4576 f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39.exe 69 PID 4576 wrote to memory of 2196 4576 f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39.exe 69 PID 4576 wrote to memory of 2196 4576 f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39.exe 69 PID 2196 wrote to memory of 3040 2196 yiueea.exe 70 PID 2196 wrote to memory of 3040 2196 yiueea.exe 70 PID 2196 wrote to memory of 3040 2196 yiueea.exe 70 PID 2196 wrote to memory of 4320 2196 yiueea.exe 72 PID 2196 wrote to memory of 4320 2196 yiueea.exe 72 PID 2196 wrote to memory of 4320 2196 yiueea.exe 72 PID 4320 wrote to memory of 672 4320 cmd.exe 74 PID 4320 wrote to memory of 672 4320 cmd.exe 74 PID 4320 wrote to memory of 672 4320 cmd.exe 74 PID 4320 wrote to memory of 3432 4320 cmd.exe 75 PID 4320 wrote to memory of 3432 4320 cmd.exe 75 PID 4320 wrote to memory of 3432 4320 cmd.exe 75 PID 4320 wrote to memory of 4640 4320 cmd.exe 76 PID 4320 wrote to memory of 4640 4320 cmd.exe 76 PID 4320 wrote to memory of 4640 4320 cmd.exe 76 PID 4320 wrote to memory of 2820 4320 cmd.exe 77 PID 4320 wrote to memory of 2820 4320 cmd.exe 77 PID 4320 wrote to memory of 2820 4320 cmd.exe 77 PID 4320 wrote to memory of 4600 4320 cmd.exe 78 PID 4320 wrote to memory of 4600 4320 cmd.exe 78 PID 4320 wrote to memory of 4600 4320 cmd.exe 78 PID 4320 wrote to memory of 3340 4320 cmd.exe 79 PID 4320 wrote to memory of 3340 4320 cmd.exe 79 PID 4320 wrote to memory of 3340 4320 cmd.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39.exe"C:\Users\Admin\AppData\Local\Temp\f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe"C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN yiueea.exe /TR "C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe" /F3⤵
- Creates scheduled task(s)
PID:3040
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "yiueea.exe" /P "Admin:N"&&CACLS "yiueea.exe" /P "Admin:R" /E&&echo Y|CACLS "..\577f58beff" /P "Admin:N"&&CACLS "..\577f58beff" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:672
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "yiueea.exe" /P "Admin:N"4⤵PID:3432
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "yiueea.exe" /P "Admin:R" /E4⤵PID:4640
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2820
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\577f58beff" /P "Admin:N"4⤵PID:4600
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\577f58beff" /P "Admin:R" /E4⤵PID:3340
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exeC:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe1⤵
- Executes dropped EXE
PID:3620
-
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exeC:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe1⤵
- Executes dropped EXE
PID:4104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD555f845c433e637594aaf872e41fda207
SHA11188348ca7e52f075e7d1d0031918c2cea93362e
SHA256f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA5125a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4
-
Filesize
307KB
MD555f845c433e637594aaf872e41fda207
SHA11188348ca7e52f075e7d1d0031918c2cea93362e
SHA256f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA5125a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4
-
Filesize
307KB
MD555f845c433e637594aaf872e41fda207
SHA11188348ca7e52f075e7d1d0031918c2cea93362e
SHA256f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA5125a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4
-
Filesize
307KB
MD555f845c433e637594aaf872e41fda207
SHA11188348ca7e52f075e7d1d0031918c2cea93362e
SHA256f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA5125a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4