Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
23-09-2023 18:22
Behavioral task
behavioral1
Sample
172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01_JC.exe
-
Size
6.9MB
-
MD5
56c197e493f74f9233a16cdefab3109f
-
SHA1
af35bd2fd5d884bdf6bea8aac695e98f5a00715a
-
SHA256
172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01
-
SHA512
d2830cfebfaa859f5fca15e3c81799e99c3cb31f72b1075d8828f03a490bfe6196b34d35bbcaede32a6d63d5c2d9bc17bea009e1bd8787cb4397f6627328b086
-
SSDEEP
98304:ULop5mhzd71cBjG9Azp56BV8cM0AnwGSOnTXsYGeCW1zbiG54WeOVEMMRHGV7E:0op5mqU9KE8nNZnTXaexbZWsMGV7E
Malware Config
Extracted
amadey
3.89
http://5.42.64.33/vu3skClDn/index.php
-
install_dir
a304d35d74
-
install_file
yiueea.exe
-
strings_key
3ae6c4e6339065c6f5a368011bb5cb8c
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ LEAJ.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ clip.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ LEAJ.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion LEAJ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion clip.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion clip.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion LEAJ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion LEAJ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion LEAJ.exe -
Executes dropped EXE 4 IoCs
pid Process 2868 clip.exe 2152 LEAJ.exe 836 LEAJ.exe 2180 LEAJ.exe -
Loads dropped DLL 2 IoCs
pid Process 1692 172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01_JC.exe 2732 cmd.exe -
resource yara_rule behavioral1/memory/1692-2-0x0000000000930000-0x00000000013A0000-memory.dmp vmprotect behavioral1/memory/1692-7-0x0000000000930000-0x00000000013A0000-memory.dmp vmprotect behavioral1/memory/1692-26-0x0000000000930000-0x00000000013A0000-memory.dmp vmprotect behavioral1/memory/1160-75-0x0000000000930000-0x00000000013A0000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Run\clip.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000071051\\clip.exe" 172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01_JC.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA LEAJ.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA clip.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA LEAJ.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2868 clip.exe 2152 LEAJ.exe 836 LEAJ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2776 schtasks.exe 2940 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2576 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1692 172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01_JC.exe 1160 172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01_JC.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 1692 wrote to memory of 2776 1692 172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01_JC.exe 28 PID 1692 wrote to memory of 2776 1692 172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01_JC.exe 28 PID 1692 wrote to memory of 2776 1692 172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01_JC.exe 28 PID 1692 wrote to memory of 2776 1692 172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01_JC.exe 28 PID 1692 wrote to memory of 2868 1692 172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01_JC.exe 31 PID 1692 wrote to memory of 2868 1692 172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01_JC.exe 31 PID 1692 wrote to memory of 2868 1692 172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01_JC.exe 31 PID 1692 wrote to memory of 2868 1692 172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01_JC.exe 31 PID 1692 wrote to memory of 2868 1692 172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01_JC.exe 31 PID 1692 wrote to memory of 2868 1692 172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01_JC.exe 31 PID 1692 wrote to memory of 2868 1692 172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01_JC.exe 31 PID 2868 wrote to memory of 2732 2868 clip.exe 32 PID 2868 wrote to memory of 2732 2868 clip.exe 32 PID 2868 wrote to memory of 2732 2868 clip.exe 32 PID 2868 wrote to memory of 2732 2868 clip.exe 32 PID 2732 wrote to memory of 2576 2732 cmd.exe 34 PID 2732 wrote to memory of 2576 2732 cmd.exe 34 PID 2732 wrote to memory of 2576 2732 cmd.exe 34 PID 2732 wrote to memory of 2576 2732 cmd.exe 34 PID 2732 wrote to memory of 2152 2732 cmd.exe 37 PID 2732 wrote to memory of 2152 2732 cmd.exe 37 PID 2732 wrote to memory of 2152 2732 cmd.exe 37 PID 2732 wrote to memory of 2152 2732 cmd.exe 37 PID 2732 wrote to memory of 2152 2732 cmd.exe 37 PID 2732 wrote to memory of 2152 2732 cmd.exe 37 PID 2732 wrote to memory of 2152 2732 cmd.exe 37 PID 2152 wrote to memory of 2940 2152 LEAJ.exe 38 PID 2152 wrote to memory of 2940 2152 LEAJ.exe 38 PID 2152 wrote to memory of 2940 2152 LEAJ.exe 38 PID 2152 wrote to memory of 2940 2152 LEAJ.exe 38 PID 2392 wrote to memory of 1160 2392 taskeng.exe 41 PID 2392 wrote to memory of 1160 2392 taskeng.exe 41 PID 2392 wrote to memory of 1160 2392 taskeng.exe 41 PID 2392 wrote to memory of 1160 2392 taskeng.exe 41 PID 2392 wrote to memory of 1160 2392 taskeng.exe 41 PID 2392 wrote to memory of 1160 2392 taskeng.exe 41 PID 2392 wrote to memory of 1160 2392 taskeng.exe 41 PID 2392 wrote to memory of 836 2392 taskeng.exe 42 PID 2392 wrote to memory of 836 2392 taskeng.exe 42 PID 2392 wrote to memory of 836 2392 taskeng.exe 42 PID 2392 wrote to memory of 836 2392 taskeng.exe 42 PID 2392 wrote to memory of 836 2392 taskeng.exe 42 PID 2392 wrote to memory of 836 2392 taskeng.exe 42 PID 2392 wrote to memory of 836 2392 taskeng.exe 42 PID 2392 wrote to memory of 2180 2392 taskeng.exe 43 PID 2392 wrote to memory of 2180 2392 taskeng.exe 43 PID 2392 wrote to memory of 2180 2392 taskeng.exe 43 PID 2392 wrote to memory of 2180 2392 taskeng.exe 43 PID 2392 wrote to memory of 2180 2392 taskeng.exe 43 PID 2392 wrote to memory of 2180 2392 taskeng.exe 43 PID 2392 wrote to memory of 2180 2392 taskeng.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01_JC.exe"C:\Users\Admin\AppData\Local\Temp\172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01_JC.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN 172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01_JC.exe /TR "C:\Users\Admin\AppData\Local\Temp\172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01_JC.exe" /F2⤵
- Creates scheduled task(s)
PID:2776
-
-
C:\Users\Admin\AppData\Local\Temp\1000071051\clip.exe"C:\Users\Admin\AppData\Local\Temp\1000071051\clip.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\s27o.0.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:2576
-
-
C:\ProgramData\presepuesto\LEAJ.exe"C:\ProgramData\presepuesto\LEAJ.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /RL HIGHEST /tn "LEAJ" /tr C:\ProgramData\presepuesto\LEAJ.exe /f5⤵
- Creates scheduled task(s)
PID:2940
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {5ED4B730-2EDD-4A16-ADB5-2FE5E4FE3C2E} S-1-5-21-3185155662-718608226-894467740-1000:YETUIZPU\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01_JC.exeC:\Users\Admin\AppData\Local\Temp\172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01_JC.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1160
-
-
C:\ProgramData\presepuesto\LEAJ.exeC:\ProgramData\presepuesto\LEAJ.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:836
-
-
C:\ProgramData\presepuesto\LEAJ.exeC:\ProgramData\presepuesto\LEAJ.exe2⤵
- Executes dropped EXE
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.6MB
MD555a7682ff0b918010481c8daa6b76a32
SHA1e18309e4cd12d8217bc0d0f2ae3d58bf1a70cf5e
SHA256033b38832db481d558743cc807a3657423535cc01d2e57fbca9035fa581e863d
SHA512794d5c4d0ec7d5e00931251cfbc9d6da56d1d9964d43272849f4a424a448dba6c1549fa1f011bd8d07c31230922bd76e6cb69e11c4438b552fce98b9589de606
-
Filesize
5.6MB
MD555a7682ff0b918010481c8daa6b76a32
SHA1e18309e4cd12d8217bc0d0f2ae3d58bf1a70cf5e
SHA256033b38832db481d558743cc807a3657423535cc01d2e57fbca9035fa581e863d
SHA512794d5c4d0ec7d5e00931251cfbc9d6da56d1d9964d43272849f4a424a448dba6c1549fa1f011bd8d07c31230922bd76e6cb69e11c4438b552fce98b9589de606
-
Filesize
5.6MB
MD555a7682ff0b918010481c8daa6b76a32
SHA1e18309e4cd12d8217bc0d0f2ae3d58bf1a70cf5e
SHA256033b38832db481d558743cc807a3657423535cc01d2e57fbca9035fa581e863d
SHA512794d5c4d0ec7d5e00931251cfbc9d6da56d1d9964d43272849f4a424a448dba6c1549fa1f011bd8d07c31230922bd76e6cb69e11c4438b552fce98b9589de606
-
Filesize
5.6MB
MD555a7682ff0b918010481c8daa6b76a32
SHA1e18309e4cd12d8217bc0d0f2ae3d58bf1a70cf5e
SHA256033b38832db481d558743cc807a3657423535cc01d2e57fbca9035fa581e863d
SHA512794d5c4d0ec7d5e00931251cfbc9d6da56d1d9964d43272849f4a424a448dba6c1549fa1f011bd8d07c31230922bd76e6cb69e11c4438b552fce98b9589de606
-
Filesize
5.6MB
MD555a7682ff0b918010481c8daa6b76a32
SHA1e18309e4cd12d8217bc0d0f2ae3d58bf1a70cf5e
SHA256033b38832db481d558743cc807a3657423535cc01d2e57fbca9035fa581e863d
SHA512794d5c4d0ec7d5e00931251cfbc9d6da56d1d9964d43272849f4a424a448dba6c1549fa1f011bd8d07c31230922bd76e6cb69e11c4438b552fce98b9589de606
-
Filesize
5.6MB
MD555a7682ff0b918010481c8daa6b76a32
SHA1e18309e4cd12d8217bc0d0f2ae3d58bf1a70cf5e
SHA256033b38832db481d558743cc807a3657423535cc01d2e57fbca9035fa581e863d
SHA512794d5c4d0ec7d5e00931251cfbc9d6da56d1d9964d43272849f4a424a448dba6c1549fa1f011bd8d07c31230922bd76e6cb69e11c4438b552fce98b9589de606
-
Filesize
5.6MB
MD555a7682ff0b918010481c8daa6b76a32
SHA1e18309e4cd12d8217bc0d0f2ae3d58bf1a70cf5e
SHA256033b38832db481d558743cc807a3657423535cc01d2e57fbca9035fa581e863d
SHA512794d5c4d0ec7d5e00931251cfbc9d6da56d1d9964d43272849f4a424a448dba6c1549fa1f011bd8d07c31230922bd76e6cb69e11c4438b552fce98b9589de606
-
Filesize
175B
MD5394d233da1d643c0dd0ff2510cf7e534
SHA13ff39df6c390e9cb75161b3e5b63f497183b5289
SHA256ed60b8d2208d7a262bcb81d2006d38ad5f1d40c4812dbd4cfbb37985a2dc7ebe
SHA512bf9eaff2504712342ef6d217f61d6300e7f06295db2881aaeff9159a508b9d95cdde26a7d1b1cb41cfeaa667584052e7bd24863c0ce6942ebf889058c2db7779
-
Filesize
175B
MD5394d233da1d643c0dd0ff2510cf7e534
SHA13ff39df6c390e9cb75161b3e5b63f497183b5289
SHA256ed60b8d2208d7a262bcb81d2006d38ad5f1d40c4812dbd4cfbb37985a2dc7ebe
SHA512bf9eaff2504712342ef6d217f61d6300e7f06295db2881aaeff9159a508b9d95cdde26a7d1b1cb41cfeaa667584052e7bd24863c0ce6942ebf889058c2db7779
-
Filesize
5.6MB
MD555a7682ff0b918010481c8daa6b76a32
SHA1e18309e4cd12d8217bc0d0f2ae3d58bf1a70cf5e
SHA256033b38832db481d558743cc807a3657423535cc01d2e57fbca9035fa581e863d
SHA512794d5c4d0ec7d5e00931251cfbc9d6da56d1d9964d43272849f4a424a448dba6c1549fa1f011bd8d07c31230922bd76e6cb69e11c4438b552fce98b9589de606
-
Filesize
5.6MB
MD555a7682ff0b918010481c8daa6b76a32
SHA1e18309e4cd12d8217bc0d0f2ae3d58bf1a70cf5e
SHA256033b38832db481d558743cc807a3657423535cc01d2e57fbca9035fa581e863d
SHA512794d5c4d0ec7d5e00931251cfbc9d6da56d1d9964d43272849f4a424a448dba6c1549fa1f011bd8d07c31230922bd76e6cb69e11c4438b552fce98b9589de606