Analysis
-
max time kernel
153s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 06:55
Behavioral task
behavioral1
Sample
cf5cc29a0b750fc9b58f3d0ff9cfc1307e4d30edf3576c9c88b5d08a4a993adf.exe
Resource
win7-20230831-en
General
-
Target
cf5cc29a0b750fc9b58f3d0ff9cfc1307e4d30edf3576c9c88b5d08a4a993adf.exe
-
Size
241KB
-
MD5
40430c1dfdbc4f36c7df1435636d0392
-
SHA1
9022d9537f323f920ce2f13507c9cb2c2df4736f
-
SHA256
cf5cc29a0b750fc9b58f3d0ff9cfc1307e4d30edf3576c9c88b5d08a4a993adf
-
SHA512
153ce2dfd60569bf00345ab91eebe886f21455f1f3988467e82da8a09858205d106335910cd2a893b83b63de5ff3baa6d55841bc8b4b761214f965932d9303f3
-
SSDEEP
6144:V7Vj3uVUn27+6qQx41QPF2nnugMeS2SpY:xwYfQx9FOnugMeS2
Malware Config
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation cf5cc29a0b750fc9b58f3d0ff9cfc1307e4d30edf3576c9c88b5d08a4a993adf.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation explonde.exe -
Executes dropped EXE 2 IoCs
pid Process 568 explonde.exe 3220 explonde.exe -
Loads dropped DLL 1 IoCs
pid Process 3856 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4468 schtasks.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3788 wrote to memory of 568 3788 cf5cc29a0b750fc9b58f3d0ff9cfc1307e4d30edf3576c9c88b5d08a4a993adf.exe 90 PID 3788 wrote to memory of 568 3788 cf5cc29a0b750fc9b58f3d0ff9cfc1307e4d30edf3576c9c88b5d08a4a993adf.exe 90 PID 3788 wrote to memory of 568 3788 cf5cc29a0b750fc9b58f3d0ff9cfc1307e4d30edf3576c9c88b5d08a4a993adf.exe 90 PID 568 wrote to memory of 4468 568 explonde.exe 91 PID 568 wrote to memory of 4468 568 explonde.exe 91 PID 568 wrote to memory of 4468 568 explonde.exe 91 PID 568 wrote to memory of 4952 568 explonde.exe 92 PID 568 wrote to memory of 4952 568 explonde.exe 92 PID 568 wrote to memory of 4952 568 explonde.exe 92 PID 4952 wrote to memory of 1196 4952 cmd.exe 95 PID 4952 wrote to memory of 1196 4952 cmd.exe 95 PID 4952 wrote to memory of 1196 4952 cmd.exe 95 PID 4952 wrote to memory of 2804 4952 cmd.exe 96 PID 4952 wrote to memory of 2804 4952 cmd.exe 96 PID 4952 wrote to memory of 2804 4952 cmd.exe 96 PID 4952 wrote to memory of 3492 4952 cmd.exe 97 PID 4952 wrote to memory of 3492 4952 cmd.exe 97 PID 4952 wrote to memory of 3492 4952 cmd.exe 97 PID 4952 wrote to memory of 2176 4952 cmd.exe 98 PID 4952 wrote to memory of 2176 4952 cmd.exe 98 PID 4952 wrote to memory of 2176 4952 cmd.exe 98 PID 4952 wrote to memory of 2912 4952 cmd.exe 99 PID 4952 wrote to memory of 2912 4952 cmd.exe 99 PID 4952 wrote to memory of 2912 4952 cmd.exe 99 PID 4952 wrote to memory of 4536 4952 cmd.exe 100 PID 4952 wrote to memory of 4536 4952 cmd.exe 100 PID 4952 wrote to memory of 4536 4952 cmd.exe 100 PID 568 wrote to memory of 3856 568 explonde.exe 111 PID 568 wrote to memory of 3856 568 explonde.exe 111 PID 568 wrote to memory of 3856 568 explonde.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf5cc29a0b750fc9b58f3d0ff9cfc1307e4d30edf3576c9c88b5d08a4a993adf.exe"C:\Users\Admin\AppData\Local\Temp\cf5cc29a0b750fc9b58f3d0ff9cfc1307e4d30edf3576c9c88b5d08a4a993adf.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F3⤵
- Creates scheduled task(s)
PID:4468
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1196
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"4⤵PID:2804
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E4⤵PID:3492
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2176
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"4⤵PID:2912
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E4⤵PID:4536
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Loads dropped DLL
PID:3856
-
-
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:3220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
241KB
MD540430c1dfdbc4f36c7df1435636d0392
SHA19022d9537f323f920ce2f13507c9cb2c2df4736f
SHA256cf5cc29a0b750fc9b58f3d0ff9cfc1307e4d30edf3576c9c88b5d08a4a993adf
SHA512153ce2dfd60569bf00345ab91eebe886f21455f1f3988467e82da8a09858205d106335910cd2a893b83b63de5ff3baa6d55841bc8b4b761214f965932d9303f3
-
Filesize
241KB
MD540430c1dfdbc4f36c7df1435636d0392
SHA19022d9537f323f920ce2f13507c9cb2c2df4736f
SHA256cf5cc29a0b750fc9b58f3d0ff9cfc1307e4d30edf3576c9c88b5d08a4a993adf
SHA512153ce2dfd60569bf00345ab91eebe886f21455f1f3988467e82da8a09858205d106335910cd2a893b83b63de5ff3baa6d55841bc8b4b761214f965932d9303f3
-
Filesize
241KB
MD540430c1dfdbc4f36c7df1435636d0392
SHA19022d9537f323f920ce2f13507c9cb2c2df4736f
SHA256cf5cc29a0b750fc9b58f3d0ff9cfc1307e4d30edf3576c9c88b5d08a4a993adf
SHA512153ce2dfd60569bf00345ab91eebe886f21455f1f3988467e82da8a09858205d106335910cd2a893b83b63de5ff3baa6d55841bc8b4b761214f965932d9303f3
-
Filesize
241KB
MD540430c1dfdbc4f36c7df1435636d0392
SHA19022d9537f323f920ce2f13507c9cb2c2df4736f
SHA256cf5cc29a0b750fc9b58f3d0ff9cfc1307e4d30edf3576c9c88b5d08a4a993adf
SHA512153ce2dfd60569bf00345ab91eebe886f21455f1f3988467e82da8a09858205d106335910cd2a893b83b63de5ff3baa6d55841bc8b4b761214f965932d9303f3
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d