Analysis
-
max time kernel
285s -
max time network
236s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
04/09/2023, 01:28
Static task
static1
Behavioral task
behavioral1
Sample
y2670470.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
y2670470.exe
Resource
win10-20230831-en
General
-
Target
y2670470.exe
-
Size
319KB
-
MD5
d6b367743dfeade6a252ed6a641bf673
-
SHA1
5f72f1f2c3f95bf9377440a199ec02ca3b1c6ab5
-
SHA256
7ddc41a8926510fc3298b4deb9f473cf2a2dbb7caa89f914f1bcab8046511de1
-
SHA512
f8ad09b51bd7bff97a36ef9f40d743b37ddd8f0d60356b31aa2c760b79cd0db6f20ca810eb80bbde7c1c9875a01b5a3ea73f7100f2a1926030f1a39cc42586f8
-
SSDEEP
6144:K2y+bnr+lp0yN90QEJrKEP3ve7yRfsK6KRFjEXtaBv7tgagBNniLqGVyyg:OMrZy907KU/e7RK6KRdEXYp7kTuy3
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
Signatures
-
Executes dropped EXE 8 IoCs
pid Process 2620 l9304979.exe 2748 saves.exe 2736 m1612956.exe 1872 saves.exe 2616 saves.exe 776 saves.exe 2104 saves.exe 2496 saves.exe -
Loads dropped DLL 10 IoCs
pid Process 2888 y2670470.exe 2620 l9304979.exe 2620 l9304979.exe 2748 saves.exe 2888 y2670470.exe 2736 m1612956.exe 1792 rundll32.exe 1792 rundll32.exe 1792 rundll32.exe 1792 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" y2670470.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1104 schtasks.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2620 2888 y2670470.exe 28 PID 2888 wrote to memory of 2620 2888 y2670470.exe 28 PID 2888 wrote to memory of 2620 2888 y2670470.exe 28 PID 2888 wrote to memory of 2620 2888 y2670470.exe 28 PID 2888 wrote to memory of 2620 2888 y2670470.exe 28 PID 2888 wrote to memory of 2620 2888 y2670470.exe 28 PID 2888 wrote to memory of 2620 2888 y2670470.exe 28 PID 2620 wrote to memory of 2748 2620 l9304979.exe 29 PID 2620 wrote to memory of 2748 2620 l9304979.exe 29 PID 2620 wrote to memory of 2748 2620 l9304979.exe 29 PID 2620 wrote to memory of 2748 2620 l9304979.exe 29 PID 2620 wrote to memory of 2748 2620 l9304979.exe 29 PID 2620 wrote to memory of 2748 2620 l9304979.exe 29 PID 2620 wrote to memory of 2748 2620 l9304979.exe 29 PID 2888 wrote to memory of 2736 2888 y2670470.exe 30 PID 2888 wrote to memory of 2736 2888 y2670470.exe 30 PID 2888 wrote to memory of 2736 2888 y2670470.exe 30 PID 2888 wrote to memory of 2736 2888 y2670470.exe 30 PID 2888 wrote to memory of 2736 2888 y2670470.exe 30 PID 2888 wrote to memory of 2736 2888 y2670470.exe 30 PID 2888 wrote to memory of 2736 2888 y2670470.exe 30 PID 2748 wrote to memory of 1104 2748 saves.exe 31 PID 2748 wrote to memory of 1104 2748 saves.exe 31 PID 2748 wrote to memory of 1104 2748 saves.exe 31 PID 2748 wrote to memory of 1104 2748 saves.exe 31 PID 2748 wrote to memory of 1104 2748 saves.exe 31 PID 2748 wrote to memory of 1104 2748 saves.exe 31 PID 2748 wrote to memory of 1104 2748 saves.exe 31 PID 2748 wrote to memory of 1796 2748 saves.exe 33 PID 2748 wrote to memory of 1796 2748 saves.exe 33 PID 2748 wrote to memory of 1796 2748 saves.exe 33 PID 2748 wrote to memory of 1796 2748 saves.exe 33 PID 2748 wrote to memory of 1796 2748 saves.exe 33 PID 2748 wrote to memory of 1796 2748 saves.exe 33 PID 2748 wrote to memory of 1796 2748 saves.exe 33 PID 1796 wrote to memory of 2692 1796 cmd.exe 35 PID 1796 wrote to memory of 2692 1796 cmd.exe 35 PID 1796 wrote to memory of 2692 1796 cmd.exe 35 PID 1796 wrote to memory of 2692 1796 cmd.exe 35 PID 1796 wrote to memory of 2692 1796 cmd.exe 35 PID 1796 wrote to memory of 2692 1796 cmd.exe 35 PID 1796 wrote to memory of 2692 1796 cmd.exe 35 PID 1796 wrote to memory of 2572 1796 cmd.exe 36 PID 1796 wrote to memory of 2572 1796 cmd.exe 36 PID 1796 wrote to memory of 2572 1796 cmd.exe 36 PID 1796 wrote to memory of 2572 1796 cmd.exe 36 PID 1796 wrote to memory of 2572 1796 cmd.exe 36 PID 1796 wrote to memory of 2572 1796 cmd.exe 36 PID 1796 wrote to memory of 2572 1796 cmd.exe 36 PID 1796 wrote to memory of 2580 1796 cmd.exe 37 PID 1796 wrote to memory of 2580 1796 cmd.exe 37 PID 1796 wrote to memory of 2580 1796 cmd.exe 37 PID 1796 wrote to memory of 2580 1796 cmd.exe 37 PID 1796 wrote to memory of 2580 1796 cmd.exe 37 PID 1796 wrote to memory of 2580 1796 cmd.exe 37 PID 1796 wrote to memory of 2580 1796 cmd.exe 37 PID 1796 wrote to memory of 2536 1796 cmd.exe 38 PID 1796 wrote to memory of 2536 1796 cmd.exe 38 PID 1796 wrote to memory of 2536 1796 cmd.exe 38 PID 1796 wrote to memory of 2536 1796 cmd.exe 38 PID 1796 wrote to memory of 2536 1796 cmd.exe 38 PID 1796 wrote to memory of 2536 1796 cmd.exe 38 PID 1796 wrote to memory of 2536 1796 cmd.exe 38 PID 1796 wrote to memory of 2544 1796 cmd.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\y2670470.exe"C:\Users\Admin\AppData\Local\Temp\y2670470.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l9304979.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l9304979.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F4⤵
- Creates scheduled task(s)
PID:1104
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2692
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"5⤵PID:2572
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E5⤵PID:2580
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2536
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"5⤵PID:2544
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E5⤵PID:2584
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1792
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1612956.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1612956.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2736
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {F318FE90-FAAD-406A-8A80-C805787AB081} S-1-5-21-3750544865-3773649541-1858556521-1000:XOCYHKRS\Admin:Interactive:[1]1⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe2⤵
- Executes dropped EXE
PID:1872
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe2⤵
- Executes dropped EXE
PID:2616
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe2⤵
- Executes dropped EXE
PID:776
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe2⤵
- Executes dropped EXE
PID:2104
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe2⤵
- Executes dropped EXE
PID:2496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
329KB
MD5263235f39bb411b9a470d12d2879281b
SHA1f5890a6c138b98c2a9b433481f412e6ce799fdce
SHA25603c35561dc57293916f447d04c14c35d419f7565e7fb6893ee85bd74e305fd73
SHA512588fe9293e25b3b44348b20bc21e7cbd0e6895dda56c7e51fd1e97e85d5c5550cab12cac643473ce5974a0b4bee585780d83ff53979555bf11040934db656795
-
Filesize
329KB
MD5263235f39bb411b9a470d12d2879281b
SHA1f5890a6c138b98c2a9b433481f412e6ce799fdce
SHA25603c35561dc57293916f447d04c14c35d419f7565e7fb6893ee85bd74e305fd73
SHA512588fe9293e25b3b44348b20bc21e7cbd0e6895dda56c7e51fd1e97e85d5c5550cab12cac643473ce5974a0b4bee585780d83ff53979555bf11040934db656795
-
Filesize
141KB
MD56fc9f3f1117073752315207389581366
SHA19b1ec2d5496eef966430616772048f8cdf257a5b
SHA25698d55c74416d430442e507f74a08299985708c5533d3ef3926b2fde8c86f68be
SHA51213a228e7007045ccaf250a2fc8a11671611516142fc32c66a4253e258d90d10ac43a2ff15924383e19843e6847229e7f85b3d3db94a0fdd71e92cc934441f3ff
-
Filesize
141KB
MD56fc9f3f1117073752315207389581366
SHA19b1ec2d5496eef966430616772048f8cdf257a5b
SHA25698d55c74416d430442e507f74a08299985708c5533d3ef3926b2fde8c86f68be
SHA51213a228e7007045ccaf250a2fc8a11671611516142fc32c66a4253e258d90d10ac43a2ff15924383e19843e6847229e7f85b3d3db94a0fdd71e92cc934441f3ff
-
Filesize
329KB
MD5263235f39bb411b9a470d12d2879281b
SHA1f5890a6c138b98c2a9b433481f412e6ce799fdce
SHA25603c35561dc57293916f447d04c14c35d419f7565e7fb6893ee85bd74e305fd73
SHA512588fe9293e25b3b44348b20bc21e7cbd0e6895dda56c7e51fd1e97e85d5c5550cab12cac643473ce5974a0b4bee585780d83ff53979555bf11040934db656795
-
Filesize
329KB
MD5263235f39bb411b9a470d12d2879281b
SHA1f5890a6c138b98c2a9b433481f412e6ce799fdce
SHA25603c35561dc57293916f447d04c14c35d419f7565e7fb6893ee85bd74e305fd73
SHA512588fe9293e25b3b44348b20bc21e7cbd0e6895dda56c7e51fd1e97e85d5c5550cab12cac643473ce5974a0b4bee585780d83ff53979555bf11040934db656795
-
Filesize
329KB
MD5263235f39bb411b9a470d12d2879281b
SHA1f5890a6c138b98c2a9b433481f412e6ce799fdce
SHA25603c35561dc57293916f447d04c14c35d419f7565e7fb6893ee85bd74e305fd73
SHA512588fe9293e25b3b44348b20bc21e7cbd0e6895dda56c7e51fd1e97e85d5c5550cab12cac643473ce5974a0b4bee585780d83ff53979555bf11040934db656795
-
Filesize
329KB
MD5263235f39bb411b9a470d12d2879281b
SHA1f5890a6c138b98c2a9b433481f412e6ce799fdce
SHA25603c35561dc57293916f447d04c14c35d419f7565e7fb6893ee85bd74e305fd73
SHA512588fe9293e25b3b44348b20bc21e7cbd0e6895dda56c7e51fd1e97e85d5c5550cab12cac643473ce5974a0b4bee585780d83ff53979555bf11040934db656795
-
Filesize
329KB
MD5263235f39bb411b9a470d12d2879281b
SHA1f5890a6c138b98c2a9b433481f412e6ce799fdce
SHA25603c35561dc57293916f447d04c14c35d419f7565e7fb6893ee85bd74e305fd73
SHA512588fe9293e25b3b44348b20bc21e7cbd0e6895dda56c7e51fd1e97e85d5c5550cab12cac643473ce5974a0b4bee585780d83ff53979555bf11040934db656795
-
Filesize
329KB
MD5263235f39bb411b9a470d12d2879281b
SHA1f5890a6c138b98c2a9b433481f412e6ce799fdce
SHA25603c35561dc57293916f447d04c14c35d419f7565e7fb6893ee85bd74e305fd73
SHA512588fe9293e25b3b44348b20bc21e7cbd0e6895dda56c7e51fd1e97e85d5c5550cab12cac643473ce5974a0b4bee585780d83ff53979555bf11040934db656795
-
Filesize
329KB
MD5263235f39bb411b9a470d12d2879281b
SHA1f5890a6c138b98c2a9b433481f412e6ce799fdce
SHA25603c35561dc57293916f447d04c14c35d419f7565e7fb6893ee85bd74e305fd73
SHA512588fe9293e25b3b44348b20bc21e7cbd0e6895dda56c7e51fd1e97e85d5c5550cab12cac643473ce5974a0b4bee585780d83ff53979555bf11040934db656795
-
Filesize
329KB
MD5263235f39bb411b9a470d12d2879281b
SHA1f5890a6c138b98c2a9b433481f412e6ce799fdce
SHA25603c35561dc57293916f447d04c14c35d419f7565e7fb6893ee85bd74e305fd73
SHA512588fe9293e25b3b44348b20bc21e7cbd0e6895dda56c7e51fd1e97e85d5c5550cab12cac643473ce5974a0b4bee585780d83ff53979555bf11040934db656795
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
329KB
MD5263235f39bb411b9a470d12d2879281b
SHA1f5890a6c138b98c2a9b433481f412e6ce799fdce
SHA25603c35561dc57293916f447d04c14c35d419f7565e7fb6893ee85bd74e305fd73
SHA512588fe9293e25b3b44348b20bc21e7cbd0e6895dda56c7e51fd1e97e85d5c5550cab12cac643473ce5974a0b4bee585780d83ff53979555bf11040934db656795
-
Filesize
329KB
MD5263235f39bb411b9a470d12d2879281b
SHA1f5890a6c138b98c2a9b433481f412e6ce799fdce
SHA25603c35561dc57293916f447d04c14c35d419f7565e7fb6893ee85bd74e305fd73
SHA512588fe9293e25b3b44348b20bc21e7cbd0e6895dda56c7e51fd1e97e85d5c5550cab12cac643473ce5974a0b4bee585780d83ff53979555bf11040934db656795
-
Filesize
141KB
MD56fc9f3f1117073752315207389581366
SHA19b1ec2d5496eef966430616772048f8cdf257a5b
SHA25698d55c74416d430442e507f74a08299985708c5533d3ef3926b2fde8c86f68be
SHA51213a228e7007045ccaf250a2fc8a11671611516142fc32c66a4253e258d90d10ac43a2ff15924383e19843e6847229e7f85b3d3db94a0fdd71e92cc934441f3ff
-
Filesize
141KB
MD56fc9f3f1117073752315207389581366
SHA19b1ec2d5496eef966430616772048f8cdf257a5b
SHA25698d55c74416d430442e507f74a08299985708c5533d3ef3926b2fde8c86f68be
SHA51213a228e7007045ccaf250a2fc8a11671611516142fc32c66a4253e258d90d10ac43a2ff15924383e19843e6847229e7f85b3d3db94a0fdd71e92cc934441f3ff
-
Filesize
329KB
MD5263235f39bb411b9a470d12d2879281b
SHA1f5890a6c138b98c2a9b433481f412e6ce799fdce
SHA25603c35561dc57293916f447d04c14c35d419f7565e7fb6893ee85bd74e305fd73
SHA512588fe9293e25b3b44348b20bc21e7cbd0e6895dda56c7e51fd1e97e85d5c5550cab12cac643473ce5974a0b4bee585780d83ff53979555bf11040934db656795
-
Filesize
329KB
MD5263235f39bb411b9a470d12d2879281b
SHA1f5890a6c138b98c2a9b433481f412e6ce799fdce
SHA25603c35561dc57293916f447d04c14c35d419f7565e7fb6893ee85bd74e305fd73
SHA512588fe9293e25b3b44348b20bc21e7cbd0e6895dda56c7e51fd1e97e85d5c5550cab12cac643473ce5974a0b4bee585780d83ff53979555bf11040934db656795
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b