Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
01-12-2023 15:16
Behavioral task
behavioral1
Sample
79f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71.exe
Resource
win7-20231023-en
General
-
Target
79f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71.exe
-
Size
437KB
-
MD5
625cb97439daa80940791f626bb4765c
-
SHA1
af462cf5435efceefcd6786f212e192403e80c4b
-
SHA256
79f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71
-
SHA512
145f8dba2288b45ef2f0ba1582861131501fb90697dfd1a79bfcdb93fa1d9110283ccb95e24317876082c7b5b24e32f2d7f954d93cb0cac2d819dec920d00891
-
SSDEEP
12288:C+mHU45lKN78RhFkvULfYOmBpumeYDDtKf:Ce45lKh87zLwp7Kf
Malware Config
Extracted
amadey
4.12
http://bitcoinstorm.cc
http://blackgold.top
http://emancipation1866.top
-
strings_key
550b275dd5aea0a3932bf7e10871e2c7
-
url_paths
/g9sdjScV2/index.php
/vdhe8ejs3/index.php
/ghndbncg3S/index.php
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
Utsysc.exeUtsysc.exeUtsysc.exepid process 2704 Utsysc.exe 1492 Utsysc.exe 2180 Utsysc.exe -
Loads dropped DLL 1 IoCs
Processes:
79f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71.exepid process 2668 79f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
79f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71.exepid process 2668 79f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
79f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71.exeUtsysc.exetaskeng.exedescription pid process target process PID 2668 wrote to memory of 2704 2668 79f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71.exe Utsysc.exe PID 2668 wrote to memory of 2704 2668 79f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71.exe Utsysc.exe PID 2668 wrote to memory of 2704 2668 79f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71.exe Utsysc.exe PID 2668 wrote to memory of 2704 2668 79f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71.exe Utsysc.exe PID 2704 wrote to memory of 2644 2704 Utsysc.exe schtasks.exe PID 2704 wrote to memory of 2644 2704 Utsysc.exe schtasks.exe PID 2704 wrote to memory of 2644 2704 Utsysc.exe schtasks.exe PID 2704 wrote to memory of 2644 2704 Utsysc.exe schtasks.exe PID 2940 wrote to memory of 1492 2940 taskeng.exe Utsysc.exe PID 2940 wrote to memory of 1492 2940 taskeng.exe Utsysc.exe PID 2940 wrote to memory of 1492 2940 taskeng.exe Utsysc.exe PID 2940 wrote to memory of 1492 2940 taskeng.exe Utsysc.exe PID 2940 wrote to memory of 2180 2940 taskeng.exe Utsysc.exe PID 2940 wrote to memory of 2180 2940 taskeng.exe Utsysc.exe PID 2940 wrote to memory of 2180 2940 taskeng.exe Utsysc.exe PID 2940 wrote to memory of 2180 2940 taskeng.exe Utsysc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\79f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71.exe"C:\Users\Admin\AppData\Local\Temp\79f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\d8bf47ee03\Utsysc.exe"C:\Users\Admin\AppData\Local\Temp\d8bf47ee03\Utsysc.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\d8bf47ee03\Utsysc.exe" /F3⤵
- Creates scheduled task(s)
PID:2644
-
C:\Windows\system32\taskeng.exetaskeng.exe {8AB88D29-A892-41A7-BCA5-80400CCCC95A} S-1-5-21-2085049433-1067986815-1244098655-1000:AHLBRYJO\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\d8bf47ee03\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\d8bf47ee03\Utsysc.exe2⤵
- Executes dropped EXE
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\d8bf47ee03\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\d8bf47ee03\Utsysc.exe2⤵
- Executes dropped EXE
PID:2180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD53b5b4b60c325075361ae9d4e7b1b9f34
SHA1daf7d816af57cce1a15e39d5cf9f59efceb00b37
SHA256953556cb170c3469a6775d629b24ef575f77ce1df0b3e68b5d145f346cc8f017
SHA512933cb71666639465d77c4f5fa04222c55ca8477f96921a73c6588522ddc4d4ebfa26f65e6aca47fa23958da42e8fad8b01d65e2b22c29e1811f12dc1bc7da2d8
-
Filesize
437KB
MD5625cb97439daa80940791f626bb4765c
SHA1af462cf5435efceefcd6786f212e192403e80c4b
SHA25679f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71
SHA512145f8dba2288b45ef2f0ba1582861131501fb90697dfd1a79bfcdb93fa1d9110283ccb95e24317876082c7b5b24e32f2d7f954d93cb0cac2d819dec920d00891
-
Filesize
437KB
MD5625cb97439daa80940791f626bb4765c
SHA1af462cf5435efceefcd6786f212e192403e80c4b
SHA25679f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71
SHA512145f8dba2288b45ef2f0ba1582861131501fb90697dfd1a79bfcdb93fa1d9110283ccb95e24317876082c7b5b24e32f2d7f954d93cb0cac2d819dec920d00891
-
Filesize
437KB
MD5625cb97439daa80940791f626bb4765c
SHA1af462cf5435efceefcd6786f212e192403e80c4b
SHA25679f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71
SHA512145f8dba2288b45ef2f0ba1582861131501fb90697dfd1a79bfcdb93fa1d9110283ccb95e24317876082c7b5b24e32f2d7f954d93cb0cac2d819dec920d00891
-
Filesize
437KB
MD5625cb97439daa80940791f626bb4765c
SHA1af462cf5435efceefcd6786f212e192403e80c4b
SHA25679f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71
SHA512145f8dba2288b45ef2f0ba1582861131501fb90697dfd1a79bfcdb93fa1d9110283ccb95e24317876082c7b5b24e32f2d7f954d93cb0cac2d819dec920d00891
-
Filesize
437KB
MD5625cb97439daa80940791f626bb4765c
SHA1af462cf5435efceefcd6786f212e192403e80c4b
SHA25679f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71
SHA512145f8dba2288b45ef2f0ba1582861131501fb90697dfd1a79bfcdb93fa1d9110283ccb95e24317876082c7b5b24e32f2d7f954d93cb0cac2d819dec920d00891
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
437KB
MD5625cb97439daa80940791f626bb4765c
SHA1af462cf5435efceefcd6786f212e192403e80c4b
SHA25679f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71
SHA512145f8dba2288b45ef2f0ba1582861131501fb90697dfd1a79bfcdb93fa1d9110283ccb95e24317876082c7b5b24e32f2d7f954d93cb0cac2d819dec920d00891