Analysis
-
max time kernel
202s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2023 18:59
Static task
static1
Behavioral task
behavioral1
Sample
a8424e307924a420ddc4c9ec4ffc7fad.exe
Resource
win7-20231020-en
General
-
Target
a8424e307924a420ddc4c9ec4ffc7fad.exe
-
Size
430KB
-
MD5
a8424e307924a420ddc4c9ec4ffc7fad
-
SHA1
b975360d1500688152825f0888df0433d2a9d822
-
SHA256
67909ab71ebdcfd08df25ecd355c568a3c6717fffc20096fc729a6671e833cc4
-
SHA512
01dc09df1200c944afee7da2c7598150c637057c527400ee3e1e75f959b90b76d49d563089f7d49ea7543a35badde9a71d7dc1ad2269ab04c301ff496af3d376
-
SSDEEP
6144:IYN96UZx2WAIFYwOj9HlH8qAFQVXN9Vubg1X67pb9O/8fgNoFybLz/mjR+vx9x:NZQsoHRo1pb9/DybLq0vd
Malware Config
Extracted
amadey
4.11
http://shohetrc.com
http://sibcomputer.ru
http://tve-mail.com
-
install_dir
d4dd819322
-
install_file
Utsysc.exe
-
strings_key
8419b3024d6f72beef8af6915e592308
-
url_paths
/forum/index.php
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a8424e307924a420ddc4c9ec4ffc7fad.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2598572287-1024438387-935107970-1000\Control Panel\International\Geo\Nation a8424e307924a420ddc4c9ec4ffc7fad.exe -
Executes dropped EXE 1 IoCs
Processes:
Utsysc.exepid process 3844 Utsysc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 19 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3552 992 WerFault.exe a8424e307924a420ddc4c9ec4ffc7fad.exe 4376 992 WerFault.exe a8424e307924a420ddc4c9ec4ffc7fad.exe 2972 992 WerFault.exe a8424e307924a420ddc4c9ec4ffc7fad.exe 2196 992 WerFault.exe a8424e307924a420ddc4c9ec4ffc7fad.exe 3084 992 WerFault.exe a8424e307924a420ddc4c9ec4ffc7fad.exe 3288 992 WerFault.exe a8424e307924a420ddc4c9ec4ffc7fad.exe 1332 992 WerFault.exe a8424e307924a420ddc4c9ec4ffc7fad.exe 4912 992 WerFault.exe a8424e307924a420ddc4c9ec4ffc7fad.exe 336 992 WerFault.exe a8424e307924a420ddc4c9ec4ffc7fad.exe 4792 992 WerFault.exe a8424e307924a420ddc4c9ec4ffc7fad.exe 4828 992 WerFault.exe a8424e307924a420ddc4c9ec4ffc7fad.exe 4172 3844 WerFault.exe Utsysc.exe 3116 3844 WerFault.exe Utsysc.exe 3768 3844 WerFault.exe Utsysc.exe 3032 3844 WerFault.exe Utsysc.exe 908 3844 WerFault.exe Utsysc.exe 3140 3844 WerFault.exe Utsysc.exe 2608 3844 WerFault.exe Utsysc.exe 2524 3844 WerFault.exe Utsysc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
a8424e307924a420ddc4c9ec4ffc7fad.exepid process 992 a8424e307924a420ddc4c9ec4ffc7fad.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
a8424e307924a420ddc4c9ec4ffc7fad.exedescription pid process target process PID 992 wrote to memory of 3844 992 a8424e307924a420ddc4c9ec4ffc7fad.exe Utsysc.exe PID 992 wrote to memory of 3844 992 a8424e307924a420ddc4c9ec4ffc7fad.exe Utsysc.exe PID 992 wrote to memory of 3844 992 a8424e307924a420ddc4c9ec4ffc7fad.exe Utsysc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8424e307924a420ddc4c9ec4ffc7fad.exe"C:\Users\Admin\AppData\Local\Temp\a8424e307924a420ddc4c9ec4ffc7fad.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 992 -s 5442⤵
- Program crash
PID:3552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 992 -s 6922⤵
- Program crash
PID:4376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 992 -s 7522⤵
- Program crash
PID:2972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 992 -s 8682⤵
- Program crash
PID:2196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 992 -s 9082⤵
- Program crash
PID:3084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 992 -s 9082⤵
- Program crash
PID:3288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 992 -s 8802⤵
- Program crash
PID:1332 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 992 -s 11482⤵
- Program crash
PID:4912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 992 -s 11682⤵
- Program crash
PID:336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 992 -s 11802⤵
- Program crash
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe"C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe"2⤵
- Executes dropped EXE
PID:3844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3844 -s 5683⤵
- Program crash
PID:4172 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3844 -s 8043⤵
- Program crash
PID:3116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3844 -s 8523⤵
- Program crash
PID:3768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3844 -s 10363⤵
- Program crash
PID:3032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3844 -s 8483⤵
- Program crash
PID:908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3844 -s 10523⤵
- Program crash
PID:3140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3844 -s 10843⤵
- Program crash
PID:2608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3844 -s 10923⤵
- Program crash
PID:2524 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 992 -s 13602⤵
- Program crash
PID:4828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 992 -ip 9921⤵PID:1860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 992 -ip 9921⤵PID:3032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 992 -ip 9921⤵PID:4584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 992 -ip 9921⤵PID:972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 992 -ip 9921⤵PID:2176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 992 -ip 9921⤵PID:3260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 992 -ip 9921⤵PID:2120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 992 -ip 9921⤵PID:656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 992 -ip 9921⤵PID:1432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 992 -ip 9921⤵PID:1640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 992 -ip 9921⤵PID:1860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3844 -ip 38441⤵PID:4432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3844 -ip 38441⤵PID:1276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3844 -ip 38441⤵PID:1900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3844 -ip 38441⤵PID:3856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3844 -ip 38441⤵PID:4376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3844 -ip 38441⤵PID:972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 3844 -ip 38441⤵PID:116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3844 -ip 38441⤵PID:2512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
430KB
MD5a8424e307924a420ddc4c9ec4ffc7fad
SHA1b975360d1500688152825f0888df0433d2a9d822
SHA25667909ab71ebdcfd08df25ecd355c568a3c6717fffc20096fc729a6671e833cc4
SHA51201dc09df1200c944afee7da2c7598150c637057c527400ee3e1e75f959b90b76d49d563089f7d49ea7543a35badde9a71d7dc1ad2269ab04c301ff496af3d376
-
Filesize
430KB
MD5a8424e307924a420ddc4c9ec4ffc7fad
SHA1b975360d1500688152825f0888df0433d2a9d822
SHA25667909ab71ebdcfd08df25ecd355c568a3c6717fffc20096fc729a6671e833cc4
SHA51201dc09df1200c944afee7da2c7598150c637057c527400ee3e1e75f959b90b76d49d563089f7d49ea7543a35badde9a71d7dc1ad2269ab04c301ff496af3d376
-
Filesize
430KB
MD5a8424e307924a420ddc4c9ec4ffc7fad
SHA1b975360d1500688152825f0888df0433d2a9d822
SHA25667909ab71ebdcfd08df25ecd355c568a3c6717fffc20096fc729a6671e833cc4
SHA51201dc09df1200c944afee7da2c7598150c637057c527400ee3e1e75f959b90b76d49d563089f7d49ea7543a35badde9a71d7dc1ad2269ab04c301ff496af3d376