Analysis
-
max time kernel
179s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 14:15
Behavioral task
behavioral1
Sample
7eda5dba702f83ca43a8201d9d77e7d4d3efe45bcb44466c484401d17c81a671.exe
Resource
win7-20230831-en
General
-
Target
7eda5dba702f83ca43a8201d9d77e7d4d3efe45bcb44466c484401d17c81a671.exe
-
Size
239KB
-
MD5
5e68964ac8629a36bd6cce50fc694e6d
-
SHA1
069596b4aa701c38beeea6c8e6666feed87fb171
-
SHA256
7eda5dba702f83ca43a8201d9d77e7d4d3efe45bcb44466c484401d17c81a671
-
SHA512
042a2b89162c13305f4ecbefa1eb99af629dc41db01a0babc8d022a63271887df3b2a3aea126c083d201e282b6492605d99c57c31ddb8b20684316c01ee9117c
-
SSDEEP
6144:V7Vj3uVUn27+6qQx41QPF2nnugMeS2SpY:xwYfQx9FOnugMeS2
Malware Config
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation 7eda5dba702f83ca43a8201d9d77e7d4d3efe45bcb44466c484401d17c81a671.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation explonde.exe -
Executes dropped EXE 4 IoCs
pid Process 1704 explonde.exe 1608 explonde.exe 4008 explonde.exe 3448 explonde.exe -
Loads dropped DLL 1 IoCs
pid Process 3684 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4360 schtasks.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1404 wrote to memory of 1704 1404 7eda5dba702f83ca43a8201d9d77e7d4d3efe45bcb44466c484401d17c81a671.exe 87 PID 1404 wrote to memory of 1704 1404 7eda5dba702f83ca43a8201d9d77e7d4d3efe45bcb44466c484401d17c81a671.exe 87 PID 1404 wrote to memory of 1704 1404 7eda5dba702f83ca43a8201d9d77e7d4d3efe45bcb44466c484401d17c81a671.exe 87 PID 1704 wrote to memory of 4360 1704 explonde.exe 88 PID 1704 wrote to memory of 4360 1704 explonde.exe 88 PID 1704 wrote to memory of 4360 1704 explonde.exe 88 PID 1704 wrote to memory of 1864 1704 explonde.exe 90 PID 1704 wrote to memory of 1864 1704 explonde.exe 90 PID 1704 wrote to memory of 1864 1704 explonde.exe 90 PID 1864 wrote to memory of 3456 1864 cmd.exe 92 PID 1864 wrote to memory of 3456 1864 cmd.exe 92 PID 1864 wrote to memory of 3456 1864 cmd.exe 92 PID 1864 wrote to memory of 3524 1864 cmd.exe 93 PID 1864 wrote to memory of 3524 1864 cmd.exe 93 PID 1864 wrote to memory of 3524 1864 cmd.exe 93 PID 1864 wrote to memory of 4772 1864 cmd.exe 94 PID 1864 wrote to memory of 4772 1864 cmd.exe 94 PID 1864 wrote to memory of 4772 1864 cmd.exe 94 PID 1864 wrote to memory of 3444 1864 cmd.exe 95 PID 1864 wrote to memory of 3444 1864 cmd.exe 95 PID 1864 wrote to memory of 3444 1864 cmd.exe 95 PID 1864 wrote to memory of 1644 1864 cmd.exe 96 PID 1864 wrote to memory of 1644 1864 cmd.exe 96 PID 1864 wrote to memory of 1644 1864 cmd.exe 96 PID 1864 wrote to memory of 1692 1864 cmd.exe 97 PID 1864 wrote to memory of 1692 1864 cmd.exe 97 PID 1864 wrote to memory of 1692 1864 cmd.exe 97 PID 1704 wrote to memory of 3684 1704 explonde.exe 108 PID 1704 wrote to memory of 3684 1704 explonde.exe 108 PID 1704 wrote to memory of 3684 1704 explonde.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\7eda5dba702f83ca43a8201d9d77e7d4d3efe45bcb44466c484401d17c81a671.exe"C:\Users\Admin\AppData\Local\Temp\7eda5dba702f83ca43a8201d9d77e7d4d3efe45bcb44466c484401d17c81a671.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F3⤵
- Creates scheduled task(s)
PID:4360
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:3456
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"4⤵PID:3524
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E4⤵PID:4772
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:3444
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"4⤵PID:1644
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E4⤵PID:1692
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Loads dropped DLL
PID:3684
-
-
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:1608
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:4008
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:3448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239KB
MD55e68964ac8629a36bd6cce50fc694e6d
SHA1069596b4aa701c38beeea6c8e6666feed87fb171
SHA2567eda5dba702f83ca43a8201d9d77e7d4d3efe45bcb44466c484401d17c81a671
SHA512042a2b89162c13305f4ecbefa1eb99af629dc41db01a0babc8d022a63271887df3b2a3aea126c083d201e282b6492605d99c57c31ddb8b20684316c01ee9117c
-
Filesize
239KB
MD55e68964ac8629a36bd6cce50fc694e6d
SHA1069596b4aa701c38beeea6c8e6666feed87fb171
SHA2567eda5dba702f83ca43a8201d9d77e7d4d3efe45bcb44466c484401d17c81a671
SHA512042a2b89162c13305f4ecbefa1eb99af629dc41db01a0babc8d022a63271887df3b2a3aea126c083d201e282b6492605d99c57c31ddb8b20684316c01ee9117c
-
Filesize
239KB
MD55e68964ac8629a36bd6cce50fc694e6d
SHA1069596b4aa701c38beeea6c8e6666feed87fb171
SHA2567eda5dba702f83ca43a8201d9d77e7d4d3efe45bcb44466c484401d17c81a671
SHA512042a2b89162c13305f4ecbefa1eb99af629dc41db01a0babc8d022a63271887df3b2a3aea126c083d201e282b6492605d99c57c31ddb8b20684316c01ee9117c
-
Filesize
239KB
MD55e68964ac8629a36bd6cce50fc694e6d
SHA1069596b4aa701c38beeea6c8e6666feed87fb171
SHA2567eda5dba702f83ca43a8201d9d77e7d4d3efe45bcb44466c484401d17c81a671
SHA512042a2b89162c13305f4ecbefa1eb99af629dc41db01a0babc8d022a63271887df3b2a3aea126c083d201e282b6492605d99c57c31ddb8b20684316c01ee9117c
-
Filesize
239KB
MD55e68964ac8629a36bd6cce50fc694e6d
SHA1069596b4aa701c38beeea6c8e6666feed87fb171
SHA2567eda5dba702f83ca43a8201d9d77e7d4d3efe45bcb44466c484401d17c81a671
SHA512042a2b89162c13305f4ecbefa1eb99af629dc41db01a0babc8d022a63271887df3b2a3aea126c083d201e282b6492605d99c57c31ddb8b20684316c01ee9117c
-
Filesize
239KB
MD55e68964ac8629a36bd6cce50fc694e6d
SHA1069596b4aa701c38beeea6c8e6666feed87fb171
SHA2567eda5dba702f83ca43a8201d9d77e7d4d3efe45bcb44466c484401d17c81a671
SHA512042a2b89162c13305f4ecbefa1eb99af629dc41db01a0babc8d022a63271887df3b2a3aea126c083d201e282b6492605d99c57c31ddb8b20684316c01ee9117c
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d