Analysis
-
max time kernel
165s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 14:13
Behavioral task
behavioral1
Sample
28d3884e2ede32105da54c5050ac036ff19029689ffd6bedb21e7e92d2463e32.exe
Resource
win7-20230831-en
General
-
Target
28d3884e2ede32105da54c5050ac036ff19029689ffd6bedb21e7e92d2463e32.exe
-
Size
239KB
-
MD5
73ed489323b6543701efdf6cd368c5e3
-
SHA1
f923d94ca1aa8b24be16581ff7c55459078cf771
-
SHA256
28d3884e2ede32105da54c5050ac036ff19029689ffd6bedb21e7e92d2463e32
-
SHA512
cb18e57e7b991f2e20827427022663fd93d78e467cc5e958aed28ca5327c1501a21f662d36fa91b5536795106826103b6fde772d7743a47f3864c9f55e52d79e
-
SSDEEP
6144:V7Vj3uVUn27+6qQx41QPF2nnugMeS2SpY:xwYfQx9FOnugMeS2
Malware Config
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation 28d3884e2ede32105da54c5050ac036ff19029689ffd6bedb21e7e92d2463e32.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation explonde.exe -
Executes dropped EXE 1 IoCs
pid Process 676 explonde.exe -
Loads dropped DLL 1 IoCs
pid Process 680 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3504 schtasks.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2296 wrote to memory of 676 2296 28d3884e2ede32105da54c5050ac036ff19029689ffd6bedb21e7e92d2463e32.exe 88 PID 2296 wrote to memory of 676 2296 28d3884e2ede32105da54c5050ac036ff19029689ffd6bedb21e7e92d2463e32.exe 88 PID 2296 wrote to memory of 676 2296 28d3884e2ede32105da54c5050ac036ff19029689ffd6bedb21e7e92d2463e32.exe 88 PID 676 wrote to memory of 3504 676 explonde.exe 89 PID 676 wrote to memory of 3504 676 explonde.exe 89 PID 676 wrote to memory of 3504 676 explonde.exe 89 PID 676 wrote to memory of 1560 676 explonde.exe 91 PID 676 wrote to memory of 1560 676 explonde.exe 91 PID 676 wrote to memory of 1560 676 explonde.exe 91 PID 1560 wrote to memory of 3336 1560 cmd.exe 93 PID 1560 wrote to memory of 3336 1560 cmd.exe 93 PID 1560 wrote to memory of 3336 1560 cmd.exe 93 PID 1560 wrote to memory of 4572 1560 cmd.exe 94 PID 1560 wrote to memory of 4572 1560 cmd.exe 94 PID 1560 wrote to memory of 4572 1560 cmd.exe 94 PID 1560 wrote to memory of 4396 1560 cmd.exe 95 PID 1560 wrote to memory of 4396 1560 cmd.exe 95 PID 1560 wrote to memory of 4396 1560 cmd.exe 95 PID 1560 wrote to memory of 1608 1560 cmd.exe 96 PID 1560 wrote to memory of 1608 1560 cmd.exe 96 PID 1560 wrote to memory of 1608 1560 cmd.exe 96 PID 1560 wrote to memory of 1436 1560 cmd.exe 97 PID 1560 wrote to memory of 1436 1560 cmd.exe 97 PID 1560 wrote to memory of 1436 1560 cmd.exe 97 PID 1560 wrote to memory of 2516 1560 cmd.exe 99 PID 1560 wrote to memory of 2516 1560 cmd.exe 99 PID 1560 wrote to memory of 2516 1560 cmd.exe 99 PID 676 wrote to memory of 680 676 explonde.exe 108 PID 676 wrote to memory of 680 676 explonde.exe 108 PID 676 wrote to memory of 680 676 explonde.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\28d3884e2ede32105da54c5050ac036ff19029689ffd6bedb21e7e92d2463e32.exe"C:\Users\Admin\AppData\Local\Temp\28d3884e2ede32105da54c5050ac036ff19029689ffd6bedb21e7e92d2463e32.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F3⤵
- Creates scheduled task(s)
PID:3504
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:3336
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"4⤵PID:4572
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E4⤵PID:4396
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1608
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"4⤵PID:1436
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E4⤵PID:2516
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Loads dropped DLL
PID:680
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239KB
MD573ed489323b6543701efdf6cd368c5e3
SHA1f923d94ca1aa8b24be16581ff7c55459078cf771
SHA25628d3884e2ede32105da54c5050ac036ff19029689ffd6bedb21e7e92d2463e32
SHA512cb18e57e7b991f2e20827427022663fd93d78e467cc5e958aed28ca5327c1501a21f662d36fa91b5536795106826103b6fde772d7743a47f3864c9f55e52d79e
-
Filesize
239KB
MD573ed489323b6543701efdf6cd368c5e3
SHA1f923d94ca1aa8b24be16581ff7c55459078cf771
SHA25628d3884e2ede32105da54c5050ac036ff19029689ffd6bedb21e7e92d2463e32
SHA512cb18e57e7b991f2e20827427022663fd93d78e467cc5e958aed28ca5327c1501a21f662d36fa91b5536795106826103b6fde772d7743a47f3864c9f55e52d79e
-
Filesize
239KB
MD573ed489323b6543701efdf6cd368c5e3
SHA1f923d94ca1aa8b24be16581ff7c55459078cf771
SHA25628d3884e2ede32105da54c5050ac036ff19029689ffd6bedb21e7e92d2463e32
SHA512cb18e57e7b991f2e20827427022663fd93d78e467cc5e958aed28ca5327c1501a21f662d36fa91b5536795106826103b6fde772d7743a47f3864c9f55e52d79e
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d