Analysis
-
max time kernel
123s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 23:42
Behavioral task
behavioral1
Sample
ee99deaa87f602f0ea98a596a43adf1b3383b94269ce44ba621900a808438311.exe
Resource
win7-20230831-en
General
-
Target
ee99deaa87f602f0ea98a596a43adf1b3383b94269ce44ba621900a808438311.exe
-
Size
235KB
-
MD5
a3870c8daf819e77fb27a82949d0a3e1
-
SHA1
f4658c4ec41f11f8ea9d028b387fb0487b2120d1
-
SHA256
ee99deaa87f602f0ea98a596a43adf1b3383b94269ce44ba621900a808438311
-
SHA512
2d931a1942375d4ebfc4461bba687995c8e57ef26ac4ab313f4202ed5b2270e86b346ba1ec35141e569d69454c7a710a453530ecdd20fb0c25ef4846e20f01c5
-
SSDEEP
6144:V7Vj3uVUn27+6qQx41QPF2nnugMeS2SpY:xwYfQx9FOnugMeS2
Malware Config
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2272 explonde.exe 2776 explonde.exe 2204 explonde.exe -
Loads dropped DLL 5 IoCs
pid Process 2020 ee99deaa87f602f0ea98a596a43adf1b3383b94269ce44ba621900a808438311.exe 2796 rundll32.exe 2796 rundll32.exe 2796 rundll32.exe 2796 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2760 schtasks.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2272 2020 ee99deaa87f602f0ea98a596a43adf1b3383b94269ce44ba621900a808438311.exe 28 PID 2020 wrote to memory of 2272 2020 ee99deaa87f602f0ea98a596a43adf1b3383b94269ce44ba621900a808438311.exe 28 PID 2020 wrote to memory of 2272 2020 ee99deaa87f602f0ea98a596a43adf1b3383b94269ce44ba621900a808438311.exe 28 PID 2020 wrote to memory of 2272 2020 ee99deaa87f602f0ea98a596a43adf1b3383b94269ce44ba621900a808438311.exe 28 PID 2272 wrote to memory of 2760 2272 explonde.exe 29 PID 2272 wrote to memory of 2760 2272 explonde.exe 29 PID 2272 wrote to memory of 2760 2272 explonde.exe 29 PID 2272 wrote to memory of 2760 2272 explonde.exe 29 PID 2272 wrote to memory of 2596 2272 explonde.exe 31 PID 2272 wrote to memory of 2596 2272 explonde.exe 31 PID 2272 wrote to memory of 2596 2272 explonde.exe 31 PID 2272 wrote to memory of 2596 2272 explonde.exe 31 PID 2596 wrote to memory of 2716 2596 cmd.exe 33 PID 2596 wrote to memory of 2716 2596 cmd.exe 33 PID 2596 wrote to memory of 2716 2596 cmd.exe 33 PID 2596 wrote to memory of 2716 2596 cmd.exe 33 PID 2596 wrote to memory of 2620 2596 cmd.exe 34 PID 2596 wrote to memory of 2620 2596 cmd.exe 34 PID 2596 wrote to memory of 2620 2596 cmd.exe 34 PID 2596 wrote to memory of 2620 2596 cmd.exe 34 PID 2596 wrote to memory of 2768 2596 cmd.exe 35 PID 2596 wrote to memory of 2768 2596 cmd.exe 35 PID 2596 wrote to memory of 2768 2596 cmd.exe 35 PID 2596 wrote to memory of 2768 2596 cmd.exe 35 PID 2596 wrote to memory of 2844 2596 cmd.exe 36 PID 2596 wrote to memory of 2844 2596 cmd.exe 36 PID 2596 wrote to memory of 2844 2596 cmd.exe 36 PID 2596 wrote to memory of 2844 2596 cmd.exe 36 PID 2596 wrote to memory of 2824 2596 cmd.exe 37 PID 2596 wrote to memory of 2824 2596 cmd.exe 37 PID 2596 wrote to memory of 2824 2596 cmd.exe 37 PID 2596 wrote to memory of 2824 2596 cmd.exe 37 PID 2596 wrote to memory of 2212 2596 cmd.exe 38 PID 2596 wrote to memory of 2212 2596 cmd.exe 38 PID 2596 wrote to memory of 2212 2596 cmd.exe 38 PID 2596 wrote to memory of 2212 2596 cmd.exe 38 PID 1484 wrote to memory of 2776 1484 taskeng.exe 44 PID 1484 wrote to memory of 2776 1484 taskeng.exe 44 PID 1484 wrote to memory of 2776 1484 taskeng.exe 44 PID 1484 wrote to memory of 2776 1484 taskeng.exe 44 PID 2272 wrote to memory of 2796 2272 explonde.exe 45 PID 2272 wrote to memory of 2796 2272 explonde.exe 45 PID 2272 wrote to memory of 2796 2272 explonde.exe 45 PID 2272 wrote to memory of 2796 2272 explonde.exe 45 PID 2272 wrote to memory of 2796 2272 explonde.exe 45 PID 2272 wrote to memory of 2796 2272 explonde.exe 45 PID 2272 wrote to memory of 2796 2272 explonde.exe 45 PID 1484 wrote to memory of 2204 1484 taskeng.exe 46 PID 1484 wrote to memory of 2204 1484 taskeng.exe 46 PID 1484 wrote to memory of 2204 1484 taskeng.exe 46 PID 1484 wrote to memory of 2204 1484 taskeng.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee99deaa87f602f0ea98a596a43adf1b3383b94269ce44ba621900a808438311.exe"C:\Users\Admin\AppData\Local\Temp\ee99deaa87f602f0ea98a596a43adf1b3383b94269ce44ba621900a808438311.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F3⤵
- Creates scheduled task(s)
PID:2760
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2716
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"4⤵PID:2620
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E4⤵PID:2768
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2844
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"4⤵PID:2824
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E4⤵PID:2212
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Loads dropped DLL
PID:2796
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {4B858705-65A4-4CFE-84B8-6BBF6C6B42A1} S-1-5-21-3185155662-718608226-894467740-1000:YETUIZPU\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe2⤵
- Executes dropped EXE
PID:2776
-
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe2⤵
- Executes dropped EXE
PID:2204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
235KB
MD5a3870c8daf819e77fb27a82949d0a3e1
SHA1f4658c4ec41f11f8ea9d028b387fb0487b2120d1
SHA256ee99deaa87f602f0ea98a596a43adf1b3383b94269ce44ba621900a808438311
SHA5122d931a1942375d4ebfc4461bba687995c8e57ef26ac4ab313f4202ed5b2270e86b346ba1ec35141e569d69454c7a710a453530ecdd20fb0c25ef4846e20f01c5
-
Filesize
235KB
MD5a3870c8daf819e77fb27a82949d0a3e1
SHA1f4658c4ec41f11f8ea9d028b387fb0487b2120d1
SHA256ee99deaa87f602f0ea98a596a43adf1b3383b94269ce44ba621900a808438311
SHA5122d931a1942375d4ebfc4461bba687995c8e57ef26ac4ab313f4202ed5b2270e86b346ba1ec35141e569d69454c7a710a453530ecdd20fb0c25ef4846e20f01c5
-
Filesize
235KB
MD5a3870c8daf819e77fb27a82949d0a3e1
SHA1f4658c4ec41f11f8ea9d028b387fb0487b2120d1
SHA256ee99deaa87f602f0ea98a596a43adf1b3383b94269ce44ba621900a808438311
SHA5122d931a1942375d4ebfc4461bba687995c8e57ef26ac4ab313f4202ed5b2270e86b346ba1ec35141e569d69454c7a710a453530ecdd20fb0c25ef4846e20f01c5
-
Filesize
235KB
MD5a3870c8daf819e77fb27a82949d0a3e1
SHA1f4658c4ec41f11f8ea9d028b387fb0487b2120d1
SHA256ee99deaa87f602f0ea98a596a43adf1b3383b94269ce44ba621900a808438311
SHA5122d931a1942375d4ebfc4461bba687995c8e57ef26ac4ab313f4202ed5b2270e86b346ba1ec35141e569d69454c7a710a453530ecdd20fb0c25ef4846e20f01c5
-
Filesize
235KB
MD5a3870c8daf819e77fb27a82949d0a3e1
SHA1f4658c4ec41f11f8ea9d028b387fb0487b2120d1
SHA256ee99deaa87f602f0ea98a596a43adf1b3383b94269ce44ba621900a808438311
SHA5122d931a1942375d4ebfc4461bba687995c8e57ef26ac4ab313f4202ed5b2270e86b346ba1ec35141e569d69454c7a710a453530ecdd20fb0c25ef4846e20f01c5
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
Filesize
235KB
MD5a3870c8daf819e77fb27a82949d0a3e1
SHA1f4658c4ec41f11f8ea9d028b387fb0487b2120d1
SHA256ee99deaa87f602f0ea98a596a43adf1b3383b94269ce44ba621900a808438311
SHA5122d931a1942375d4ebfc4461bba687995c8e57ef26ac4ab313f4202ed5b2270e86b346ba1ec35141e569d69454c7a710a453530ecdd20fb0c25ef4846e20f01c5
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6