Analysis
-
max time kernel
103s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 10:04
Behavioral task
behavioral1
Sample
172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01.exe
Resource
win10v2004-20230915-en
General
-
Target
172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01.exe
-
Size
6.9MB
-
MD5
56c197e493f74f9233a16cdefab3109f
-
SHA1
af35bd2fd5d884bdf6bea8aac695e98f5a00715a
-
SHA256
172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01
-
SHA512
d2830cfebfaa859f5fca15e3c81799e99c3cb31f72b1075d8828f03a490bfe6196b34d35bbcaede32a6d63d5c2d9bc17bea009e1bd8787cb4397f6627328b086
-
SSDEEP
98304:ULop5mhzd71cBjG9Azp56BV8cM0AnwGSOnTXsYGeCW1zbiG54WeOVEMMRHGV7E:0op5mqU9KE8nNZnTXaexbZWsMGV7E
Malware Config
Extracted
amadey
3.89
http://5.42.64.33/vu3skClDn/index.php
-
install_dir
a304d35d74
-
install_file
yiueea.exe
-
strings_key
3ae6c4e6339065c6f5a368011bb5cb8c
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
clip.exeLEAJ.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ clip.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ LEAJ.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
clip.exeLEAJ.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion clip.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion LEAJ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion LEAJ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion clip.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
clip.exeLEAJ.exe172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation clip.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation LEAJ.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation 172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01.exe -
Executes dropped EXE 2 IoCs
Processes:
clip.exeLEAJ.exepid Process 3092 clip.exe 4144 LEAJ.exe -
Processes:
resource yara_rule behavioral2/memory/4888-2-0x0000000000620000-0x0000000001090000-memory.dmp vmprotect behavioral2/memory/4888-1-0x0000000000620000-0x0000000001090000-memory.dmp vmprotect behavioral2/memory/4888-5-0x0000000000620000-0x0000000001090000-memory.dmp vmprotect behavioral2/memory/3908-67-0x0000000000620000-0x0000000001090000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clip.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000071051\\clip.exe" 172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01.exe -
Processes:
clip.exeLEAJ.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA clip.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA LEAJ.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
clip.exeLEAJ.exepid Process 3092 clip.exe 4144 LEAJ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 1924 schtasks.exe 212 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 2332 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01.exepid Process 4888 172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01.exe 4888 172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01.execlip.execmd.exeLEAJ.exedescription pid Process procid_target PID 4888 wrote to memory of 1924 4888 172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01.exe 85 PID 4888 wrote to memory of 1924 4888 172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01.exe 85 PID 4888 wrote to memory of 1924 4888 172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01.exe 85 PID 4888 wrote to memory of 3092 4888 172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01.exe 92 PID 4888 wrote to memory of 3092 4888 172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01.exe 92 PID 4888 wrote to memory of 3092 4888 172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01.exe 92 PID 3092 wrote to memory of 3372 3092 clip.exe 95 PID 3092 wrote to memory of 3372 3092 clip.exe 95 PID 3092 wrote to memory of 3372 3092 clip.exe 95 PID 3372 wrote to memory of 2332 3372 cmd.exe 98 PID 3372 wrote to memory of 2332 3372 cmd.exe 98 PID 3372 wrote to memory of 2332 3372 cmd.exe 98 PID 3372 wrote to memory of 4144 3372 cmd.exe 101 PID 3372 wrote to memory of 4144 3372 cmd.exe 101 PID 3372 wrote to memory of 4144 3372 cmd.exe 101 PID 4144 wrote to memory of 212 4144 LEAJ.exe 102 PID 4144 wrote to memory of 212 4144 LEAJ.exe 102 PID 4144 wrote to memory of 212 4144 LEAJ.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01.exe"C:\Users\Admin\AppData\Local\Temp\172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN 172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01.exe /TR "C:\Users\Admin\AppData\Local\Temp\172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01.exe" /F2⤵
- Creates scheduled task(s)
PID:1924
-
-
C:\Users\Admin\AppData\Local\Temp\1000071051\clip.exe"C:\Users\Admin\AppData\Local\Temp\1000071051\clip.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\s2dw.0.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:2332
-
-
C:\ProgramData\presepuesto\LEAJ.exe"C:\ProgramData\presepuesto\LEAJ.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /RL HIGHEST /tn "LEAJ" /tr C:\ProgramData\presepuesto\LEAJ.exe /f5⤵
- Creates scheduled task(s)
PID:212
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01.exeC:\Users\Admin\AppData\Local\Temp\172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01.exe1⤵PID:3908
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.6MB
MD555a7682ff0b918010481c8daa6b76a32
SHA1e18309e4cd12d8217bc0d0f2ae3d58bf1a70cf5e
SHA256033b38832db481d558743cc807a3657423535cc01d2e57fbca9035fa581e863d
SHA512794d5c4d0ec7d5e00931251cfbc9d6da56d1d9964d43272849f4a424a448dba6c1549fa1f011bd8d07c31230922bd76e6cb69e11c4438b552fce98b9589de606
-
Filesize
5.6MB
MD555a7682ff0b918010481c8daa6b76a32
SHA1e18309e4cd12d8217bc0d0f2ae3d58bf1a70cf5e
SHA256033b38832db481d558743cc807a3657423535cc01d2e57fbca9035fa581e863d
SHA512794d5c4d0ec7d5e00931251cfbc9d6da56d1d9964d43272849f4a424a448dba6c1549fa1f011bd8d07c31230922bd76e6cb69e11c4438b552fce98b9589de606
-
Filesize
5.6MB
MD555a7682ff0b918010481c8daa6b76a32
SHA1e18309e4cd12d8217bc0d0f2ae3d58bf1a70cf5e
SHA256033b38832db481d558743cc807a3657423535cc01d2e57fbca9035fa581e863d
SHA512794d5c4d0ec7d5e00931251cfbc9d6da56d1d9964d43272849f4a424a448dba6c1549fa1f011bd8d07c31230922bd76e6cb69e11c4438b552fce98b9589de606
-
Filesize
5.6MB
MD555a7682ff0b918010481c8daa6b76a32
SHA1e18309e4cd12d8217bc0d0f2ae3d58bf1a70cf5e
SHA256033b38832db481d558743cc807a3657423535cc01d2e57fbca9035fa581e863d
SHA512794d5c4d0ec7d5e00931251cfbc9d6da56d1d9964d43272849f4a424a448dba6c1549fa1f011bd8d07c31230922bd76e6cb69e11c4438b552fce98b9589de606
-
Filesize
5.6MB
MD555a7682ff0b918010481c8daa6b76a32
SHA1e18309e4cd12d8217bc0d0f2ae3d58bf1a70cf5e
SHA256033b38832db481d558743cc807a3657423535cc01d2e57fbca9035fa581e863d
SHA512794d5c4d0ec7d5e00931251cfbc9d6da56d1d9964d43272849f4a424a448dba6c1549fa1f011bd8d07c31230922bd76e6cb69e11c4438b552fce98b9589de606
-
Filesize
196B
MD562962daa1b19bbcc2db10b7bfd531ea6
SHA1d64bae91091eda6a7532ebec06aa70893b79e1f8
SHA25680c3fe2ae1062abf56456f52518bd670f9ec3917b7f85e152b347ac6b6faf880
SHA5129002a0475fdb38541e78048709006926655c726e93e823b84e2dbf5b53fd539a5342e7266447d23db0e5528e27a19961b115b180c94f2272ff124c7e5c8304e7
-
Filesize
175B
MD5c9aca48452f32aa7d94fff7e0c7bb294
SHA1c502c69b7dbc64ee047f273b1899e6c8172f876d
SHA2569169429724b3cc265685f9b3d4ec06d244f88bd5b613388bb7c50910e2158e50
SHA51299cbb46385d9eb1e0595e51aca0f9f98f360b355616e08d34541b6a0f2c32b1fb87b5f8d2ae59b3e1cb6db770d3e23b5c2938664ef13550fa512f4679fedd0d6