Analysis
-
max time kernel
160s -
max time network
197s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 19:47
Behavioral task
behavioral1
Sample
94cb4900add242e9bfbf9c8e50431018f2c5eb48a0d074100a19428dac5145e5.exe
Resource
win7-20230831-en
General
-
Target
94cb4900add242e9bfbf9c8e50431018f2c5eb48a0d074100a19428dac5145e5.exe
-
Size
238KB
-
MD5
11528cc873ed72e010f233b70e945561
-
SHA1
6d25459f7d4efdd5f68077d2e67c0894ff4f61bf
-
SHA256
94cb4900add242e9bfbf9c8e50431018f2c5eb48a0d074100a19428dac5145e5
-
SHA512
2bdb38ed6b7ca4715424bc0331f14e20d99418dd6a8ebb55c7e0c90e87a9c3d361d34df60d7f81743592d7cf1cce48b6d74293fd1f092881a08127a362f75047
-
SSDEEP
6144:V7Vj3uVUn27+6qQx41QPF2nnugMeS2SpY:xwYfQx9FOnugMeS2
Malware Config
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2788 explonde.exe 3032 explonde.exe -
Loads dropped DLL 5 IoCs
pid Process 2800 94cb4900add242e9bfbf9c8e50431018f2c5eb48a0d074100a19428dac5145e5.exe 364 rundll32.exe 364 rundll32.exe 364 rundll32.exe 364 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2352 schtasks.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2800 wrote to memory of 2788 2800 94cb4900add242e9bfbf9c8e50431018f2c5eb48a0d074100a19428dac5145e5.exe 28 PID 2800 wrote to memory of 2788 2800 94cb4900add242e9bfbf9c8e50431018f2c5eb48a0d074100a19428dac5145e5.exe 28 PID 2800 wrote to memory of 2788 2800 94cb4900add242e9bfbf9c8e50431018f2c5eb48a0d074100a19428dac5145e5.exe 28 PID 2800 wrote to memory of 2788 2800 94cb4900add242e9bfbf9c8e50431018f2c5eb48a0d074100a19428dac5145e5.exe 28 PID 2788 wrote to memory of 2352 2788 explonde.exe 29 PID 2788 wrote to memory of 2352 2788 explonde.exe 29 PID 2788 wrote to memory of 2352 2788 explonde.exe 29 PID 2788 wrote to memory of 2352 2788 explonde.exe 29 PID 2788 wrote to memory of 2684 2788 explonde.exe 31 PID 2788 wrote to memory of 2684 2788 explonde.exe 31 PID 2788 wrote to memory of 2684 2788 explonde.exe 31 PID 2788 wrote to memory of 2684 2788 explonde.exe 31 PID 2684 wrote to memory of 2512 2684 cmd.exe 33 PID 2684 wrote to memory of 2512 2684 cmd.exe 33 PID 2684 wrote to memory of 2512 2684 cmd.exe 33 PID 2684 wrote to memory of 2512 2684 cmd.exe 33 PID 2684 wrote to memory of 2532 2684 cmd.exe 34 PID 2684 wrote to memory of 2532 2684 cmd.exe 34 PID 2684 wrote to memory of 2532 2684 cmd.exe 34 PID 2684 wrote to memory of 2532 2684 cmd.exe 34 PID 2684 wrote to memory of 2580 2684 cmd.exe 35 PID 2684 wrote to memory of 2580 2684 cmd.exe 35 PID 2684 wrote to memory of 2580 2684 cmd.exe 35 PID 2684 wrote to memory of 2580 2684 cmd.exe 35 PID 2684 wrote to memory of 2636 2684 cmd.exe 36 PID 2684 wrote to memory of 2636 2684 cmd.exe 36 PID 2684 wrote to memory of 2636 2684 cmd.exe 36 PID 2684 wrote to memory of 2636 2684 cmd.exe 36 PID 2684 wrote to memory of 2144 2684 cmd.exe 37 PID 2684 wrote to memory of 2144 2684 cmd.exe 37 PID 2684 wrote to memory of 2144 2684 cmd.exe 37 PID 2684 wrote to memory of 2144 2684 cmd.exe 37 PID 2684 wrote to memory of 2568 2684 cmd.exe 38 PID 2684 wrote to memory of 2568 2684 cmd.exe 38 PID 2684 wrote to memory of 2568 2684 cmd.exe 38 PID 2684 wrote to memory of 2568 2684 cmd.exe 38 PID 2960 wrote to memory of 3032 2960 taskeng.exe 41 PID 2960 wrote to memory of 3032 2960 taskeng.exe 41 PID 2960 wrote to memory of 3032 2960 taskeng.exe 41 PID 2960 wrote to memory of 3032 2960 taskeng.exe 41 PID 2788 wrote to memory of 364 2788 explonde.exe 42 PID 2788 wrote to memory of 364 2788 explonde.exe 42 PID 2788 wrote to memory of 364 2788 explonde.exe 42 PID 2788 wrote to memory of 364 2788 explonde.exe 42 PID 2788 wrote to memory of 364 2788 explonde.exe 42 PID 2788 wrote to memory of 364 2788 explonde.exe 42 PID 2788 wrote to memory of 364 2788 explonde.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\94cb4900add242e9bfbf9c8e50431018f2c5eb48a0d074100a19428dac5145e5.exe"C:\Users\Admin\AppData\Local\Temp\94cb4900add242e9bfbf9c8e50431018f2c5eb48a0d074100a19428dac5145e5.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F3⤵
- Creates scheduled task(s)
PID:2352
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2512
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"4⤵PID:2532
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E4⤵PID:2580
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2636
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"4⤵PID:2144
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E4⤵PID:2568
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Loads dropped DLL
PID:364
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {72C28B96-0F26-45C6-9DD9-033A7531F284} S-1-5-21-3750544865-3773649541-1858556521-1000:XOCYHKRS\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe2⤵
- Executes dropped EXE
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238KB
MD511528cc873ed72e010f233b70e945561
SHA16d25459f7d4efdd5f68077d2e67c0894ff4f61bf
SHA25694cb4900add242e9bfbf9c8e50431018f2c5eb48a0d074100a19428dac5145e5
SHA5122bdb38ed6b7ca4715424bc0331f14e20d99418dd6a8ebb55c7e0c90e87a9c3d361d34df60d7f81743592d7cf1cce48b6d74293fd1f092881a08127a362f75047
-
Filesize
238KB
MD511528cc873ed72e010f233b70e945561
SHA16d25459f7d4efdd5f68077d2e67c0894ff4f61bf
SHA25694cb4900add242e9bfbf9c8e50431018f2c5eb48a0d074100a19428dac5145e5
SHA5122bdb38ed6b7ca4715424bc0331f14e20d99418dd6a8ebb55c7e0c90e87a9c3d361d34df60d7f81743592d7cf1cce48b6d74293fd1f092881a08127a362f75047
-
Filesize
238KB
MD511528cc873ed72e010f233b70e945561
SHA16d25459f7d4efdd5f68077d2e67c0894ff4f61bf
SHA25694cb4900add242e9bfbf9c8e50431018f2c5eb48a0d074100a19428dac5145e5
SHA5122bdb38ed6b7ca4715424bc0331f14e20d99418dd6a8ebb55c7e0c90e87a9c3d361d34df60d7f81743592d7cf1cce48b6d74293fd1f092881a08127a362f75047
-
Filesize
238KB
MD511528cc873ed72e010f233b70e945561
SHA16d25459f7d4efdd5f68077d2e67c0894ff4f61bf
SHA25694cb4900add242e9bfbf9c8e50431018f2c5eb48a0d074100a19428dac5145e5
SHA5122bdb38ed6b7ca4715424bc0331f14e20d99418dd6a8ebb55c7e0c90e87a9c3d361d34df60d7f81743592d7cf1cce48b6d74293fd1f092881a08127a362f75047
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
Filesize
238KB
MD511528cc873ed72e010f233b70e945561
SHA16d25459f7d4efdd5f68077d2e67c0894ff4f61bf
SHA25694cb4900add242e9bfbf9c8e50431018f2c5eb48a0d074100a19428dac5145e5
SHA5122bdb38ed6b7ca4715424bc0331f14e20d99418dd6a8ebb55c7e0c90e87a9c3d361d34df60d7f81743592d7cf1cce48b6d74293fd1f092881a08127a362f75047
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6