Analysis
-
max time kernel
242s -
max time network
256s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 14:23
Behavioral task
behavioral1
Sample
c3f84229638feb29c56f2866fb5d143cc06baabeb44ac2c7682464d017339a4e.exe
Resource
win7-20230831-en
General
-
Target
c3f84229638feb29c56f2866fb5d143cc06baabeb44ac2c7682464d017339a4e.exe
-
Size
239KB
-
MD5
31338f428fbfca51e7492c8616a39a55
-
SHA1
e81a26285f7fa5d6a0b06c3dccca5339435fe5ea
-
SHA256
c3f84229638feb29c56f2866fb5d143cc06baabeb44ac2c7682464d017339a4e
-
SHA512
eb5203eb52f7b8f3a1d172a190110713853643812724302b1549c1e63535b73f74237a83a530eb7063130a32521209e8319f1116311934bb65258e6582fe0e81
-
SSDEEP
6144:V7Vj3uVUn27+6qQx41QPF2nnugMeS2SpY:xwYfQx9FOnugMeS2
Malware Config
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation c3f84229638feb29c56f2866fb5d143cc06baabeb44ac2c7682464d017339a4e.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation explonde.exe -
Executes dropped EXE 3 IoCs
pid Process 2576 explonde.exe 2216 explonde.exe 2204 explonde.exe -
Loads dropped DLL 1 IoCs
pid Process 4548 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 812 schtasks.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3276 wrote to memory of 2576 3276 c3f84229638feb29c56f2866fb5d143cc06baabeb44ac2c7682464d017339a4e.exe 88 PID 3276 wrote to memory of 2576 3276 c3f84229638feb29c56f2866fb5d143cc06baabeb44ac2c7682464d017339a4e.exe 88 PID 3276 wrote to memory of 2576 3276 c3f84229638feb29c56f2866fb5d143cc06baabeb44ac2c7682464d017339a4e.exe 88 PID 2576 wrote to memory of 812 2576 explonde.exe 89 PID 2576 wrote to memory of 812 2576 explonde.exe 89 PID 2576 wrote to memory of 812 2576 explonde.exe 89 PID 2576 wrote to memory of 4432 2576 explonde.exe 91 PID 2576 wrote to memory of 4432 2576 explonde.exe 91 PID 2576 wrote to memory of 4432 2576 explonde.exe 91 PID 4432 wrote to memory of 3868 4432 cmd.exe 93 PID 4432 wrote to memory of 3868 4432 cmd.exe 93 PID 4432 wrote to memory of 3868 4432 cmd.exe 93 PID 4432 wrote to memory of 3664 4432 cmd.exe 94 PID 4432 wrote to memory of 3664 4432 cmd.exe 94 PID 4432 wrote to memory of 3664 4432 cmd.exe 94 PID 4432 wrote to memory of 4640 4432 cmd.exe 95 PID 4432 wrote to memory of 4640 4432 cmd.exe 95 PID 4432 wrote to memory of 4640 4432 cmd.exe 95 PID 4432 wrote to memory of 4316 4432 cmd.exe 96 PID 4432 wrote to memory of 4316 4432 cmd.exe 96 PID 4432 wrote to memory of 4316 4432 cmd.exe 96 PID 4432 wrote to memory of 808 4432 cmd.exe 97 PID 4432 wrote to memory of 808 4432 cmd.exe 97 PID 4432 wrote to memory of 808 4432 cmd.exe 97 PID 4432 wrote to memory of 4920 4432 cmd.exe 98 PID 4432 wrote to memory of 4920 4432 cmd.exe 98 PID 4432 wrote to memory of 4920 4432 cmd.exe 98 PID 2576 wrote to memory of 4548 2576 explonde.exe 101 PID 2576 wrote to memory of 4548 2576 explonde.exe 101 PID 2576 wrote to memory of 4548 2576 explonde.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3f84229638feb29c56f2866fb5d143cc06baabeb44ac2c7682464d017339a4e.exe"C:\Users\Admin\AppData\Local\Temp\c3f84229638feb29c56f2866fb5d143cc06baabeb44ac2c7682464d017339a4e.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F3⤵
- Creates scheduled task(s)
PID:812
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:3868
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"4⤵PID:3664
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E4⤵PID:4640
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:4316
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"4⤵PID:808
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E4⤵PID:4920
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Loads dropped DLL
PID:4548
-
-
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:2216
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:2204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239KB
MD531338f428fbfca51e7492c8616a39a55
SHA1e81a26285f7fa5d6a0b06c3dccca5339435fe5ea
SHA256c3f84229638feb29c56f2866fb5d143cc06baabeb44ac2c7682464d017339a4e
SHA512eb5203eb52f7b8f3a1d172a190110713853643812724302b1549c1e63535b73f74237a83a530eb7063130a32521209e8319f1116311934bb65258e6582fe0e81
-
Filesize
239KB
MD531338f428fbfca51e7492c8616a39a55
SHA1e81a26285f7fa5d6a0b06c3dccca5339435fe5ea
SHA256c3f84229638feb29c56f2866fb5d143cc06baabeb44ac2c7682464d017339a4e
SHA512eb5203eb52f7b8f3a1d172a190110713853643812724302b1549c1e63535b73f74237a83a530eb7063130a32521209e8319f1116311934bb65258e6582fe0e81
-
Filesize
239KB
MD531338f428fbfca51e7492c8616a39a55
SHA1e81a26285f7fa5d6a0b06c3dccca5339435fe5ea
SHA256c3f84229638feb29c56f2866fb5d143cc06baabeb44ac2c7682464d017339a4e
SHA512eb5203eb52f7b8f3a1d172a190110713853643812724302b1549c1e63535b73f74237a83a530eb7063130a32521209e8319f1116311934bb65258e6582fe0e81
-
Filesize
239KB
MD531338f428fbfca51e7492c8616a39a55
SHA1e81a26285f7fa5d6a0b06c3dccca5339435fe5ea
SHA256c3f84229638feb29c56f2866fb5d143cc06baabeb44ac2c7682464d017339a4e
SHA512eb5203eb52f7b8f3a1d172a190110713853643812724302b1549c1e63535b73f74237a83a530eb7063130a32521209e8319f1116311934bb65258e6582fe0e81
-
Filesize
239KB
MD531338f428fbfca51e7492c8616a39a55
SHA1e81a26285f7fa5d6a0b06c3dccca5339435fe5ea
SHA256c3f84229638feb29c56f2866fb5d143cc06baabeb44ac2c7682464d017339a4e
SHA512eb5203eb52f7b8f3a1d172a190110713853643812724302b1549c1e63535b73f74237a83a530eb7063130a32521209e8319f1116311934bb65258e6582fe0e81
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d