Analysis
-
max time kernel
137s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
16/10/2023, 13:54
Behavioral task
behavioral1
Sample
47ba290f4bcf2a712c5d95e9f2d4b84726d3a51dadf56e884d167c8abd475b91.exe
Resource
win7-20230831-en
General
-
Target
47ba290f4bcf2a712c5d95e9f2d4b84726d3a51dadf56e884d167c8abd475b91.exe
-
Size
240KB
-
MD5
4ffa27b6fa77e9e4af1acac0a0297415
-
SHA1
a896d5d9bc51e301fdde2405151666b42b37a0ad
-
SHA256
47ba290f4bcf2a712c5d95e9f2d4b84726d3a51dadf56e884d167c8abd475b91
-
SHA512
6c734fcc2da575e711e0d9c841a19901b277334d364d5f0d6f8c243e817718e6b2991d3b29d640e6543f987e72f9d66ef35ee82b746110872bd426dec3b39444
-
SSDEEP
6144:LEPAc72ss5pKL93yMax7pH3F2d1ugMeSWp:LE32xpoaxBFg1ugMeS
Malware Config
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 47ba290f4bcf2a712c5d95e9f2d4b84726d3a51dadf56e884d167c8abd475b91.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation explothe.exe -
Executes dropped EXE 3 IoCs
pid Process 4920 explothe.exe 1044 explothe.exe 4908 explothe.exe -
Loads dropped DLL 1 IoCs
pid Process 4388 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4976 schtasks.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1344 wrote to memory of 4920 1344 47ba290f4bcf2a712c5d95e9f2d4b84726d3a51dadf56e884d167c8abd475b91.exe 84 PID 1344 wrote to memory of 4920 1344 47ba290f4bcf2a712c5d95e9f2d4b84726d3a51dadf56e884d167c8abd475b91.exe 84 PID 1344 wrote to memory of 4920 1344 47ba290f4bcf2a712c5d95e9f2d4b84726d3a51dadf56e884d167c8abd475b91.exe 84 PID 4920 wrote to memory of 4976 4920 explothe.exe 85 PID 4920 wrote to memory of 4976 4920 explothe.exe 85 PID 4920 wrote to memory of 4976 4920 explothe.exe 85 PID 4920 wrote to memory of 4220 4920 explothe.exe 87 PID 4920 wrote to memory of 4220 4920 explothe.exe 87 PID 4920 wrote to memory of 4220 4920 explothe.exe 87 PID 4220 wrote to memory of 2908 4220 cmd.exe 89 PID 4220 wrote to memory of 2908 4220 cmd.exe 89 PID 4220 wrote to memory of 2908 4220 cmd.exe 89 PID 4220 wrote to memory of 2080 4220 cmd.exe 90 PID 4220 wrote to memory of 2080 4220 cmd.exe 90 PID 4220 wrote to memory of 2080 4220 cmd.exe 90 PID 4220 wrote to memory of 1264 4220 cmd.exe 91 PID 4220 wrote to memory of 1264 4220 cmd.exe 91 PID 4220 wrote to memory of 1264 4220 cmd.exe 91 PID 4220 wrote to memory of 772 4220 cmd.exe 92 PID 4220 wrote to memory of 772 4220 cmd.exe 92 PID 4220 wrote to memory of 772 4220 cmd.exe 92 PID 4220 wrote to memory of 4704 4220 cmd.exe 93 PID 4220 wrote to memory of 4704 4220 cmd.exe 93 PID 4220 wrote to memory of 4704 4220 cmd.exe 93 PID 4220 wrote to memory of 2900 4220 cmd.exe 94 PID 4220 wrote to memory of 2900 4220 cmd.exe 94 PID 4220 wrote to memory of 2900 4220 cmd.exe 94 PID 4920 wrote to memory of 4388 4920 explothe.exe 103 PID 4920 wrote to memory of 4388 4920 explothe.exe 103 PID 4920 wrote to memory of 4388 4920 explothe.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\47ba290f4bcf2a712c5d95e9f2d4b84726d3a51dadf56e884d167c8abd475b91.exe"C:\Users\Admin\AppData\Local\Temp\47ba290f4bcf2a712c5d95e9f2d4b84726d3a51dadf56e884d167c8abd475b91.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F3⤵
- Creates scheduled task(s)
PID:4976
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2908
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"4⤵PID:2080
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E4⤵PID:1264
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:772
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"4⤵PID:4704
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E4⤵PID:2900
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Loads dropped DLL
PID:4388
-
-
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:1044
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:4908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD54ffa27b6fa77e9e4af1acac0a0297415
SHA1a896d5d9bc51e301fdde2405151666b42b37a0ad
SHA25647ba290f4bcf2a712c5d95e9f2d4b84726d3a51dadf56e884d167c8abd475b91
SHA5126c734fcc2da575e711e0d9c841a19901b277334d364d5f0d6f8c243e817718e6b2991d3b29d640e6543f987e72f9d66ef35ee82b746110872bd426dec3b39444
-
Filesize
240KB
MD54ffa27b6fa77e9e4af1acac0a0297415
SHA1a896d5d9bc51e301fdde2405151666b42b37a0ad
SHA25647ba290f4bcf2a712c5d95e9f2d4b84726d3a51dadf56e884d167c8abd475b91
SHA5126c734fcc2da575e711e0d9c841a19901b277334d364d5f0d6f8c243e817718e6b2991d3b29d640e6543f987e72f9d66ef35ee82b746110872bd426dec3b39444
-
Filesize
240KB
MD54ffa27b6fa77e9e4af1acac0a0297415
SHA1a896d5d9bc51e301fdde2405151666b42b37a0ad
SHA25647ba290f4bcf2a712c5d95e9f2d4b84726d3a51dadf56e884d167c8abd475b91
SHA5126c734fcc2da575e711e0d9c841a19901b277334d364d5f0d6f8c243e817718e6b2991d3b29d640e6543f987e72f9d66ef35ee82b746110872bd426dec3b39444
-
Filesize
240KB
MD54ffa27b6fa77e9e4af1acac0a0297415
SHA1a896d5d9bc51e301fdde2405151666b42b37a0ad
SHA25647ba290f4bcf2a712c5d95e9f2d4b84726d3a51dadf56e884d167c8abd475b91
SHA5126c734fcc2da575e711e0d9c841a19901b277334d364d5f0d6f8c243e817718e6b2991d3b29d640e6543f987e72f9d66ef35ee82b746110872bd426dec3b39444
-
Filesize
240KB
MD54ffa27b6fa77e9e4af1acac0a0297415
SHA1a896d5d9bc51e301fdde2405151666b42b37a0ad
SHA25647ba290f4bcf2a712c5d95e9f2d4b84726d3a51dadf56e884d167c8abd475b91
SHA5126c734fcc2da575e711e0d9c841a19901b277334d364d5f0d6f8c243e817718e6b2991d3b29d640e6543f987e72f9d66ef35ee82b746110872bd426dec3b39444
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9