Analysis
-
max time kernel
294s -
max time network
283s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10-09-2023 22:18
Behavioral task
behavioral1
Sample
b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe
Resource
win10-20230831-en
General
-
Target
b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe
-
Size
2.7MB
-
MD5
cf0a9195cb5140896bf44aa5264bcf9f
-
SHA1
dcd732395ed47e12574dcd2dd1da957fd56cd58a
-
SHA256
b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56
-
SHA512
338697f3db380c0f9b505524d5e1ac47b21cf6707e7d74342056c2c5bfebc7f583fa396026c753307a33efec58f69f314429514276a0b4d251437b7b6e8bc233
-
SSDEEP
49152:AbbbY6RZFHuL21BTS02JDwvcwB7DQbMdVoDUeTcMIAmsPCcKD:qjFHuLGyycwB7gaV8oMIAmLD
Malware Config
Extracted
amadey
3.89
http://5.42.64.33/vu3skClDn/index.php
-
install_dir
a304d35d74
-
install_file
yiueea.exe
-
strings_key
3ae6c4e6339065c6f5a368011bb5cb8c
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe -
resource yara_rule behavioral1/memory/2200-0-0x00000000010C0000-0x00000000016EE000-memory.dmp themida behavioral1/memory/2200-2-0x00000000010C0000-0x00000000016EE000-memory.dmp themida behavioral1/memory/2200-3-0x00000000010C0000-0x00000000016EE000-memory.dmp themida behavioral1/memory/2200-4-0x00000000010C0000-0x00000000016EE000-memory.dmp themida behavioral1/memory/2200-5-0x00000000010C0000-0x00000000016EE000-memory.dmp themida behavioral1/memory/2200-6-0x00000000010C0000-0x00000000016EE000-memory.dmp themida behavioral1/memory/2560-12-0x00000000010C0000-0x00000000016EE000-memory.dmp themida behavioral1/memory/2560-13-0x00000000010C0000-0x00000000016EE000-memory.dmp themida behavioral1/memory/2560-14-0x00000000010C0000-0x00000000016EE000-memory.dmp themida behavioral1/memory/2560-16-0x00000000010C0000-0x00000000016EE000-memory.dmp themida behavioral1/memory/2560-15-0x00000000010C0000-0x00000000016EE000-memory.dmp themida behavioral1/memory/3000-23-0x00000000010C0000-0x00000000016EE000-memory.dmp themida behavioral1/memory/3000-24-0x00000000010C0000-0x00000000016EE000-memory.dmp themida behavioral1/memory/3000-25-0x00000000010C0000-0x00000000016EE000-memory.dmp themida behavioral1/memory/3000-26-0x00000000010C0000-0x00000000016EE000-memory.dmp themida behavioral1/memory/3000-27-0x00000000010C0000-0x00000000016EE000-memory.dmp themida behavioral1/memory/2856-34-0x00000000010C0000-0x00000000016EE000-memory.dmp themida behavioral1/memory/2856-35-0x00000000010C0000-0x00000000016EE000-memory.dmp themida behavioral1/memory/2856-36-0x00000000010C0000-0x00000000016EE000-memory.dmp themida behavioral1/memory/2856-37-0x00000000010C0000-0x00000000016EE000-memory.dmp themida behavioral1/memory/2856-38-0x00000000010C0000-0x00000000016EE000-memory.dmp themida behavioral1/memory/540-45-0x00000000010C0000-0x00000000016EE000-memory.dmp themida behavioral1/memory/540-46-0x00000000010C0000-0x00000000016EE000-memory.dmp themida behavioral1/memory/540-47-0x00000000010C0000-0x00000000016EE000-memory.dmp themida behavioral1/memory/540-48-0x00000000010C0000-0x00000000016EE000-memory.dmp themida behavioral1/memory/540-49-0x00000000010C0000-0x00000000016EE000-memory.dmp themida behavioral1/memory/1628-56-0x00000000010C0000-0x00000000016EE000-memory.dmp themida behavioral1/memory/1628-57-0x00000000010C0000-0x00000000016EE000-memory.dmp themida behavioral1/memory/1628-58-0x00000000010C0000-0x00000000016EE000-memory.dmp themida behavioral1/memory/1628-59-0x00000000010C0000-0x00000000016EE000-memory.dmp themida behavioral1/memory/1628-60-0x00000000010C0000-0x00000000016EE000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 2200 b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe 2560 b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe 3000 b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe 2856 b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe 540 b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe 1628 b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1696 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2200 b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe 2560 b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe 3000 b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe 2856 b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe 540 b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe 1628 b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2200 wrote to memory of 1696 2200 b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe 28 PID 2200 wrote to memory of 1696 2200 b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe 28 PID 2200 wrote to memory of 1696 2200 b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe 28 PID 2200 wrote to memory of 1696 2200 b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe 28 PID 2556 wrote to memory of 2560 2556 taskeng.exe 34 PID 2556 wrote to memory of 2560 2556 taskeng.exe 34 PID 2556 wrote to memory of 2560 2556 taskeng.exe 34 PID 2556 wrote to memory of 2560 2556 taskeng.exe 34 PID 2556 wrote to memory of 3000 2556 taskeng.exe 35 PID 2556 wrote to memory of 3000 2556 taskeng.exe 35 PID 2556 wrote to memory of 3000 2556 taskeng.exe 35 PID 2556 wrote to memory of 3000 2556 taskeng.exe 35 PID 2556 wrote to memory of 2856 2556 taskeng.exe 36 PID 2556 wrote to memory of 2856 2556 taskeng.exe 36 PID 2556 wrote to memory of 2856 2556 taskeng.exe 36 PID 2556 wrote to memory of 2856 2556 taskeng.exe 36 PID 2556 wrote to memory of 540 2556 taskeng.exe 37 PID 2556 wrote to memory of 540 2556 taskeng.exe 37 PID 2556 wrote to memory of 540 2556 taskeng.exe 37 PID 2556 wrote to memory of 540 2556 taskeng.exe 37 PID 2556 wrote to memory of 1628 2556 taskeng.exe 38 PID 2556 wrote to memory of 1628 2556 taskeng.exe 38 PID 2556 wrote to memory of 1628 2556 taskeng.exe 38 PID 2556 wrote to memory of 1628 2556 taskeng.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe"C:\Users\Admin\AppData\Local\Temp\b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe /TR "C:\Users\Admin\AppData\Local\Temp\b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe" /F2⤵
- Creates scheduled task(s)
PID:1696
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {8E25941C-26D6-4F82-8BA6-25E4463255F6} S-1-5-21-686452656-3203474025-4140627569-1000:UUVOHKNL\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exeC:\Users\Admin\AppData\Local\Temp\b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exeC:\Users\Admin\AppData\Local\Temp\b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3000
-
-
C:\Users\Admin\AppData\Local\Temp\b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exeC:\Users\Admin\AppData\Local\Temp\b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2856
-
-
C:\Users\Admin\AppData\Local\Temp\b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exeC:\Users\Admin\AppData\Local\Temp\b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:540
-
-
C:\Users\Admin\AppData\Local\Temp\b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exeC:\Users\Admin\AppData\Local\Temp\b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1628
-