Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2023, 12:19
Behavioral task
behavioral1
Sample
0x0007000000015c2f-106.exe
Resource
win7-20230831-en
General
-
Target
0x0007000000015c2f-106.exe
-
Size
227KB
-
MD5
69d468f64dc451287c4d2af9e7e1e649
-
SHA1
7799b32a7a3c0e8679dade16ff97e60324e8b93c
-
SHA256
e88701f5f2bc931ade631c04c5d2d50e21ba0e64217c022d75b9c38fb132f451
-
SHA512
b8dc99a347a6d4fb7492830221bc89384f44f0f13cb17ef884e6b27e8fa7da5c7dda74bd276f9a3a6ff87373d01a11ed13243cb670cf372955270a558bc6f2bd
-
SSDEEP
6144:LEPAc72ss5pKL93yMax7pH3F2d1ugMeSWpy:LE32xpoaxBFg1ugMeSB
Malware Config
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation 0x0007000000015c2f-106.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation explothe.exe -
Executes dropped EXE 3 IoCs
pid Process 4752 explothe.exe 208 explothe.exe 548 explothe.exe -
Loads dropped DLL 1 IoCs
pid Process 1696 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2900 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 1124 svchost.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 964 wrote to memory of 4752 964 0x0007000000015c2f-106.exe 83 PID 964 wrote to memory of 4752 964 0x0007000000015c2f-106.exe 83 PID 964 wrote to memory of 4752 964 0x0007000000015c2f-106.exe 83 PID 4752 wrote to memory of 2900 4752 explothe.exe 85 PID 4752 wrote to memory of 2900 4752 explothe.exe 85 PID 4752 wrote to memory of 2900 4752 explothe.exe 85 PID 4752 wrote to memory of 1020 4752 explothe.exe 87 PID 4752 wrote to memory of 1020 4752 explothe.exe 87 PID 4752 wrote to memory of 1020 4752 explothe.exe 87 PID 1020 wrote to memory of 1076 1020 cmd.exe 89 PID 1020 wrote to memory of 1076 1020 cmd.exe 89 PID 1020 wrote to memory of 1076 1020 cmd.exe 89 PID 1020 wrote to memory of 4116 1020 cmd.exe 90 PID 1020 wrote to memory of 4116 1020 cmd.exe 90 PID 1020 wrote to memory of 4116 1020 cmd.exe 90 PID 1020 wrote to memory of 1048 1020 cmd.exe 91 PID 1020 wrote to memory of 1048 1020 cmd.exe 91 PID 1020 wrote to memory of 1048 1020 cmd.exe 91 PID 1020 wrote to memory of 4604 1020 cmd.exe 92 PID 1020 wrote to memory of 4604 1020 cmd.exe 92 PID 1020 wrote to memory of 4604 1020 cmd.exe 92 PID 1020 wrote to memory of 2252 1020 cmd.exe 93 PID 1020 wrote to memory of 2252 1020 cmd.exe 93 PID 1020 wrote to memory of 2252 1020 cmd.exe 93 PID 1020 wrote to memory of 756 1020 cmd.exe 94 PID 1020 wrote to memory of 756 1020 cmd.exe 94 PID 1020 wrote to memory of 756 1020 cmd.exe 94 PID 4752 wrote to memory of 1696 4752 explothe.exe 109 PID 4752 wrote to memory of 1696 4752 explothe.exe 109 PID 4752 wrote to memory of 1696 4752 explothe.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x0007000000015c2f-106.exe"C:\Users\Admin\AppData\Local\Temp\0x0007000000015c2f-106.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F3⤵
- Creates scheduled task(s)
PID:2900
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1076
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"4⤵PID:4116
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E4⤵PID:1048
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:4604
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"4⤵PID:2252
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E4⤵PID:756
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Loads dropped DLL
PID:1696
-
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:552
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1124
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:208
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD567696e26f3b79be4e8564dbd95362d01
SHA1062d0da2631fec197eb4abb2c7e507abd74cf99b
SHA2564f96600938fe98dea88f2b26dcb43b898b34b00dca45650bdb32b6831ca0d2d1
SHA512d33c214bd74fad9ef41c089c01f8ea293cbb423c1c55cf571633a3ac7b3ac6fb4851cd4131bb7c4c852c96099ea1f3e92fbfbef84babd444baff34cd074ca94c
-
Filesize
227KB
MD569d468f64dc451287c4d2af9e7e1e649
SHA17799b32a7a3c0e8679dade16ff97e60324e8b93c
SHA256e88701f5f2bc931ade631c04c5d2d50e21ba0e64217c022d75b9c38fb132f451
SHA512b8dc99a347a6d4fb7492830221bc89384f44f0f13cb17ef884e6b27e8fa7da5c7dda74bd276f9a3a6ff87373d01a11ed13243cb670cf372955270a558bc6f2bd
-
Filesize
227KB
MD569d468f64dc451287c4d2af9e7e1e649
SHA17799b32a7a3c0e8679dade16ff97e60324e8b93c
SHA256e88701f5f2bc931ade631c04c5d2d50e21ba0e64217c022d75b9c38fb132f451
SHA512b8dc99a347a6d4fb7492830221bc89384f44f0f13cb17ef884e6b27e8fa7da5c7dda74bd276f9a3a6ff87373d01a11ed13243cb670cf372955270a558bc6f2bd
-
Filesize
227KB
MD569d468f64dc451287c4d2af9e7e1e649
SHA17799b32a7a3c0e8679dade16ff97e60324e8b93c
SHA256e88701f5f2bc931ade631c04c5d2d50e21ba0e64217c022d75b9c38fb132f451
SHA512b8dc99a347a6d4fb7492830221bc89384f44f0f13cb17ef884e6b27e8fa7da5c7dda74bd276f9a3a6ff87373d01a11ed13243cb670cf372955270a558bc6f2bd
-
Filesize
227KB
MD569d468f64dc451287c4d2af9e7e1e649
SHA17799b32a7a3c0e8679dade16ff97e60324e8b93c
SHA256e88701f5f2bc931ade631c04c5d2d50e21ba0e64217c022d75b9c38fb132f451
SHA512b8dc99a347a6d4fb7492830221bc89384f44f0f13cb17ef884e6b27e8fa7da5c7dda74bd276f9a3a6ff87373d01a11ed13243cb670cf372955270a558bc6f2bd
-
Filesize
227KB
MD569d468f64dc451287c4d2af9e7e1e649
SHA17799b32a7a3c0e8679dade16ff97e60324e8b93c
SHA256e88701f5f2bc931ade631c04c5d2d50e21ba0e64217c022d75b9c38fb132f451
SHA512b8dc99a347a6d4fb7492830221bc89384f44f0f13cb17ef884e6b27e8fa7da5c7dda74bd276f9a3a6ff87373d01a11ed13243cb670cf372955270a558bc6f2bd
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9