Analysis
-
max time kernel
178s -
max time network
220s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2023 15:16
Behavioral task
behavioral1
Sample
79f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71.exe
Resource
win7-20231023-en
General
-
Target
79f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71.exe
-
Size
437KB
-
MD5
625cb97439daa80940791f626bb4765c
-
SHA1
af462cf5435efceefcd6786f212e192403e80c4b
-
SHA256
79f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71
-
SHA512
145f8dba2288b45ef2f0ba1582861131501fb90697dfd1a79bfcdb93fa1d9110283ccb95e24317876082c7b5b24e32f2d7f954d93cb0cac2d819dec920d00891
-
SSDEEP
12288:C+mHU45lKN78RhFkvULfYOmBpumeYDDtKf:Ce45lKh87zLwp7Kf
Malware Config
Extracted
amadey
4.12
http://bitcoinstorm.cc
http://blackgold.top
http://emancipation1866.top
-
strings_key
550b275dd5aea0a3932bf7e10871e2c7
-
url_paths
/g9sdjScV2/index.php
/vdhe8ejs3/index.php
/ghndbncg3S/index.php
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
79f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71.exeUtsysc.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2598572287-1024438387-935107970-1000\Control Panel\International\Geo\Nation 79f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71.exe Key value queried \REGISTRY\USER\S-1-5-21-2598572287-1024438387-935107970-1000\Control Panel\International\Geo\Nation Utsysc.exe -
Executes dropped EXE 3 IoCs
Processes:
Utsysc.exeUtsysc.exeUtsysc.exepid process 3628 Utsysc.exe 1624 Utsysc.exe 3148 Utsysc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
79f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71.exepid process 4992 79f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
79f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71.exeUtsysc.exedescription pid process target process PID 4992 wrote to memory of 3628 4992 79f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71.exe Utsysc.exe PID 4992 wrote to memory of 3628 4992 79f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71.exe Utsysc.exe PID 4992 wrote to memory of 3628 4992 79f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71.exe Utsysc.exe PID 3628 wrote to memory of 3532 3628 Utsysc.exe schtasks.exe PID 3628 wrote to memory of 3532 3628 Utsysc.exe schtasks.exe PID 3628 wrote to memory of 3532 3628 Utsysc.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\79f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71.exe"C:\Users\Admin\AppData\Local\Temp\79f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\d8bf47ee03\Utsysc.exe"C:\Users\Admin\AppData\Local\Temp\d8bf47ee03\Utsysc.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\d8bf47ee03\Utsysc.exe" /F3⤵
- Creates scheduled task(s)
PID:3532
-
C:\Users\Admin\AppData\Local\Temp\d8bf47ee03\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\d8bf47ee03\Utsysc.exe1⤵
- Executes dropped EXE
PID:1624
-
C:\Users\Admin\AppData\Local\Temp\d8bf47ee03\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\d8bf47ee03\Utsysc.exe1⤵
- Executes dropped EXE
PID:3148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5ffd24056a119879dbba3fb149efb1c6b
SHA10126b5395c276dc51bbfeafaf57ba1cbd2cce43e
SHA256bb321344b566b8922d1a85ade23966f35d1fc17ace5ab06cd94f1a58019b90fd
SHA512ea698ec02bf2dcde77707c3ae20d1c18b11a14e68ef744a65a38ce12020dc03ebea7eecbf7fa02327bd8e361fe3990ac19bf50749b531b9adb0432b22e958061
-
Filesize
437KB
MD5625cb97439daa80940791f626bb4765c
SHA1af462cf5435efceefcd6786f212e192403e80c4b
SHA25679f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71
SHA512145f8dba2288b45ef2f0ba1582861131501fb90697dfd1a79bfcdb93fa1d9110283ccb95e24317876082c7b5b24e32f2d7f954d93cb0cac2d819dec920d00891
-
Filesize
437KB
MD5625cb97439daa80940791f626bb4765c
SHA1af462cf5435efceefcd6786f212e192403e80c4b
SHA25679f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71
SHA512145f8dba2288b45ef2f0ba1582861131501fb90697dfd1a79bfcdb93fa1d9110283ccb95e24317876082c7b5b24e32f2d7f954d93cb0cac2d819dec920d00891
-
Filesize
437KB
MD5625cb97439daa80940791f626bb4765c
SHA1af462cf5435efceefcd6786f212e192403e80c4b
SHA25679f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71
SHA512145f8dba2288b45ef2f0ba1582861131501fb90697dfd1a79bfcdb93fa1d9110283ccb95e24317876082c7b5b24e32f2d7f954d93cb0cac2d819dec920d00891
-
Filesize
437KB
MD5625cb97439daa80940791f626bb4765c
SHA1af462cf5435efceefcd6786f212e192403e80c4b
SHA25679f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71
SHA512145f8dba2288b45ef2f0ba1582861131501fb90697dfd1a79bfcdb93fa1d9110283ccb95e24317876082c7b5b24e32f2d7f954d93cb0cac2d819dec920d00891
-
Filesize
437KB
MD5625cb97439daa80940791f626bb4765c
SHA1af462cf5435efceefcd6786f212e192403e80c4b
SHA25679f5147260484890fd1fab7a78619de557103717e124f1c249addc530b737a71
SHA512145f8dba2288b45ef2f0ba1582861131501fb90697dfd1a79bfcdb93fa1d9110283ccb95e24317876082c7b5b24e32f2d7f954d93cb0cac2d819dec920d00891
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5