Analysis
-
max time kernel
144s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
02-12-2023 07:34
Static task
static1
Behavioral task
behavioral1
Sample
67909ab71ebdcfd08df25ecd355c568a3c6717fffc20096fc729a6671e833cc4.exe
Resource
win7-20231023-en
General
-
Target
67909ab71ebdcfd08df25ecd355c568a3c6717fffc20096fc729a6671e833cc4.exe
-
Size
430KB
-
MD5
a8424e307924a420ddc4c9ec4ffc7fad
-
SHA1
b975360d1500688152825f0888df0433d2a9d822
-
SHA256
67909ab71ebdcfd08df25ecd355c568a3c6717fffc20096fc729a6671e833cc4
-
SHA512
01dc09df1200c944afee7da2c7598150c637057c527400ee3e1e75f959b90b76d49d563089f7d49ea7543a35badde9a71d7dc1ad2269ab04c301ff496af3d376
-
SSDEEP
6144:IYN96UZx2WAIFYwOj9HlH8qAFQVXN9Vubg1X67pb9O/8fgNoFybLz/mjR+vx9x:NZQsoHRo1pb9/DybLq0vd
Malware Config
Extracted
amadey
http://arrunda.ru
http://soetegem.com
http://tceducn.com
-
strings_key
eb714cabd2548b4a03c45f723f838bdc
-
url_paths
/forum/index.php
Extracted
amadey
4.11
http://shohetrc.com
http://sibcomputer.ru
http://tve-mail.com
-
install_dir
d4dd819322
-
install_file
Utsysc.exe
-
strings_key
8419b3024d6f72beef8af6915e592308
-
url_paths
/forum/index.php
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 21 940 rundll32.exe 25 1360 rundll32.exe 29 692 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 1104 Utsysc.exe 2964 Utsysc.exe 1524 Utsysc.exe 2004 Utsysc.exe -
Loads dropped DLL 14 IoCs
pid Process 2360 67909ab71ebdcfd08df25ecd355c568a3c6717fffc20096fc729a6671e833cc4.exe 2360 67909ab71ebdcfd08df25ecd355c568a3c6717fffc20096fc729a6671e833cc4.exe 940 rundll32.exe 940 rundll32.exe 940 rundll32.exe 940 rundll32.exe 1360 rundll32.exe 1360 rundll32.exe 1360 rundll32.exe 1360 rundll32.exe 692 rundll32.exe 692 rundll32.exe 692 rundll32.exe 692 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2720 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2360 67909ab71ebdcfd08df25ecd355c568a3c6717fffc20096fc729a6671e833cc4.exe -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 2360 wrote to memory of 1104 2360 67909ab71ebdcfd08df25ecd355c568a3c6717fffc20096fc729a6671e833cc4.exe 28 PID 2360 wrote to memory of 1104 2360 67909ab71ebdcfd08df25ecd355c568a3c6717fffc20096fc729a6671e833cc4.exe 28 PID 2360 wrote to memory of 1104 2360 67909ab71ebdcfd08df25ecd355c568a3c6717fffc20096fc729a6671e833cc4.exe 28 PID 2360 wrote to memory of 1104 2360 67909ab71ebdcfd08df25ecd355c568a3c6717fffc20096fc729a6671e833cc4.exe 28 PID 1104 wrote to memory of 2720 1104 Utsysc.exe 29 PID 1104 wrote to memory of 2720 1104 Utsysc.exe 29 PID 1104 wrote to memory of 2720 1104 Utsysc.exe 29 PID 1104 wrote to memory of 2720 1104 Utsysc.exe 29 PID 2524 wrote to memory of 2964 2524 taskeng.exe 34 PID 2524 wrote to memory of 2964 2524 taskeng.exe 34 PID 2524 wrote to memory of 2964 2524 taskeng.exe 34 PID 2524 wrote to memory of 2964 2524 taskeng.exe 34 PID 1104 wrote to memory of 1984 1104 Utsysc.exe 38 PID 1104 wrote to memory of 1984 1104 Utsysc.exe 38 PID 1104 wrote to memory of 1984 1104 Utsysc.exe 38 PID 1104 wrote to memory of 1984 1104 Utsysc.exe 38 PID 1104 wrote to memory of 1984 1104 Utsysc.exe 38 PID 1104 wrote to memory of 1984 1104 Utsysc.exe 38 PID 1104 wrote to memory of 1984 1104 Utsysc.exe 38 PID 1104 wrote to memory of 2780 1104 Utsysc.exe 39 PID 1104 wrote to memory of 2780 1104 Utsysc.exe 39 PID 1104 wrote to memory of 2780 1104 Utsysc.exe 39 PID 1104 wrote to memory of 2780 1104 Utsysc.exe 39 PID 1104 wrote to memory of 2780 1104 Utsysc.exe 39 PID 1104 wrote to memory of 2780 1104 Utsysc.exe 39 PID 1104 wrote to memory of 2780 1104 Utsysc.exe 39 PID 1104 wrote to memory of 940 1104 Utsysc.exe 40 PID 1104 wrote to memory of 940 1104 Utsysc.exe 40 PID 1104 wrote to memory of 940 1104 Utsysc.exe 40 PID 1104 wrote to memory of 940 1104 Utsysc.exe 40 PID 1104 wrote to memory of 940 1104 Utsysc.exe 40 PID 1104 wrote to memory of 940 1104 Utsysc.exe 40 PID 1104 wrote to memory of 940 1104 Utsysc.exe 40 PID 2524 wrote to memory of 1524 2524 taskeng.exe 42 PID 2524 wrote to memory of 1524 2524 taskeng.exe 42 PID 2524 wrote to memory of 1524 2524 taskeng.exe 42 PID 2524 wrote to memory of 1524 2524 taskeng.exe 42 PID 1104 wrote to memory of 1360 1104 Utsysc.exe 43 PID 1104 wrote to memory of 1360 1104 Utsysc.exe 43 PID 1104 wrote to memory of 1360 1104 Utsysc.exe 43 PID 1104 wrote to memory of 1360 1104 Utsysc.exe 43 PID 1104 wrote to memory of 1360 1104 Utsysc.exe 43 PID 1104 wrote to memory of 1360 1104 Utsysc.exe 43 PID 1104 wrote to memory of 1360 1104 Utsysc.exe 43 PID 1104 wrote to memory of 692 1104 Utsysc.exe 45 PID 1104 wrote to memory of 692 1104 Utsysc.exe 45 PID 1104 wrote to memory of 692 1104 Utsysc.exe 45 PID 1104 wrote to memory of 692 1104 Utsysc.exe 45 PID 1104 wrote to memory of 692 1104 Utsysc.exe 45 PID 1104 wrote to memory of 692 1104 Utsysc.exe 45 PID 1104 wrote to memory of 692 1104 Utsysc.exe 45 PID 2524 wrote to memory of 2004 2524 taskeng.exe 47 PID 2524 wrote to memory of 2004 2524 taskeng.exe 47 PID 2524 wrote to memory of 2004 2524 taskeng.exe 47 PID 2524 wrote to memory of 2004 2524 taskeng.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\67909ab71ebdcfd08df25ecd355c568a3c6717fffc20096fc729a6671e833cc4.exe"C:\Users\Admin\AppData\Local\Temp\67909ab71ebdcfd08df25ecd355c568a3c6717fffc20096fc729a6671e833cc4.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe"C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe" /F3⤵
- Creates scheduled task(s)
PID:2720
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main3⤵PID:1984
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main3⤵PID:2780
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:940
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1360
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:692
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {465F201A-93DB-4D43-A194-4B8BC235C591} S-1-5-21-2085049433-1067986815-1244098655-1000:AHLBRYJO\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe2⤵
- Executes dropped EXE
PID:2964
-
-
C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe2⤵
- Executes dropped EXE
PID:1524
-
-
C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe2⤵
- Executes dropped EXE
PID:2004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD51d9ae18c3db8344e1ac5ae45411bd985
SHA16c7f5faf0d600f3e122ea1fcdfa850b4ef8491a3
SHA256a7a89dd67fe595d58c16ef46e82731f242e3c6dd3de1986af50cbbbbc0fe25a5
SHA512228e9146269134e1697e2bc745aa48aa02063d78761b5ab22da7a3134422d1c58eb89776e56881907b65ca8622613ee1429b7509241e77256390a0c4733108ea
-
Filesize
430KB
MD5a8424e307924a420ddc4c9ec4ffc7fad
SHA1b975360d1500688152825f0888df0433d2a9d822
SHA25667909ab71ebdcfd08df25ecd355c568a3c6717fffc20096fc729a6671e833cc4
SHA51201dc09df1200c944afee7da2c7598150c637057c527400ee3e1e75f959b90b76d49d563089f7d49ea7543a35badde9a71d7dc1ad2269ab04c301ff496af3d376
-
Filesize
430KB
MD5a8424e307924a420ddc4c9ec4ffc7fad
SHA1b975360d1500688152825f0888df0433d2a9d822
SHA25667909ab71ebdcfd08df25ecd355c568a3c6717fffc20096fc729a6671e833cc4
SHA51201dc09df1200c944afee7da2c7598150c637057c527400ee3e1e75f959b90b76d49d563089f7d49ea7543a35badde9a71d7dc1ad2269ab04c301ff496af3d376
-
Filesize
430KB
MD5a8424e307924a420ddc4c9ec4ffc7fad
SHA1b975360d1500688152825f0888df0433d2a9d822
SHA25667909ab71ebdcfd08df25ecd355c568a3c6717fffc20096fc729a6671e833cc4
SHA51201dc09df1200c944afee7da2c7598150c637057c527400ee3e1e75f959b90b76d49d563089f7d49ea7543a35badde9a71d7dc1ad2269ab04c301ff496af3d376
-
Filesize
430KB
MD5a8424e307924a420ddc4c9ec4ffc7fad
SHA1b975360d1500688152825f0888df0433d2a9d822
SHA25667909ab71ebdcfd08df25ecd355c568a3c6717fffc20096fc729a6671e833cc4
SHA51201dc09df1200c944afee7da2c7598150c637057c527400ee3e1e75f959b90b76d49d563089f7d49ea7543a35badde9a71d7dc1ad2269ab04c301ff496af3d376
-
Filesize
430KB
MD5a8424e307924a420ddc4c9ec4ffc7fad
SHA1b975360d1500688152825f0888df0433d2a9d822
SHA25667909ab71ebdcfd08df25ecd355c568a3c6717fffc20096fc729a6671e833cc4
SHA51201dc09df1200c944afee7da2c7598150c637057c527400ee3e1e75f959b90b76d49d563089f7d49ea7543a35badde9a71d7dc1ad2269ab04c301ff496af3d376
-
Filesize
430KB
MD5a8424e307924a420ddc4c9ec4ffc7fad
SHA1b975360d1500688152825f0888df0433d2a9d822
SHA25667909ab71ebdcfd08df25ecd355c568a3c6717fffc20096fc729a6671e833cc4
SHA51201dc09df1200c944afee7da2c7598150c637057c527400ee3e1e75f959b90b76d49d563089f7d49ea7543a35badde9a71d7dc1ad2269ab04c301ff496af3d376
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
66KB
MD59b0507b53287ffe4c3af7ea8413b3998
SHA1a042a1973f9714866e8156a8f714926c2bb02b3f
SHA25670746fa232ede6a0818ad60d2552f22b5cce9b06181c6bfa1808fe5a1c313db1
SHA512a46f2e4380c13b4f48f3e8e60522f6e707a0c198e53fa37ae478f2323017e1106e77f1542db3c01c9d534c59c5ec0cd4f604886fb8d04bab77b06bc13464f521
-
Filesize
66KB
MD59b0507b53287ffe4c3af7ea8413b3998
SHA1a042a1973f9714866e8156a8f714926c2bb02b3f
SHA25670746fa232ede6a0818ad60d2552f22b5cce9b06181c6bfa1808fe5a1c313db1
SHA512a46f2e4380c13b4f48f3e8e60522f6e707a0c198e53fa37ae478f2323017e1106e77f1542db3c01c9d534c59c5ec0cd4f604886fb8d04bab77b06bc13464f521
-
Filesize
430KB
MD5a8424e307924a420ddc4c9ec4ffc7fad
SHA1b975360d1500688152825f0888df0433d2a9d822
SHA25667909ab71ebdcfd08df25ecd355c568a3c6717fffc20096fc729a6671e833cc4
SHA51201dc09df1200c944afee7da2c7598150c637057c527400ee3e1e75f959b90b76d49d563089f7d49ea7543a35badde9a71d7dc1ad2269ab04c301ff496af3d376
-
Filesize
430KB
MD5a8424e307924a420ddc4c9ec4ffc7fad
SHA1b975360d1500688152825f0888df0433d2a9d822
SHA25667909ab71ebdcfd08df25ecd355c568a3c6717fffc20096fc729a6671e833cc4
SHA51201dc09df1200c944afee7da2c7598150c637057c527400ee3e1e75f959b90b76d49d563089f7d49ea7543a35badde9a71d7dc1ad2269ab04c301ff496af3d376
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7