Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231201-en -
resource tags
arch:x64arch:x86image:win7-20231201-enlocale:en-usos:windows7-x64system -
submitted
03-12-2023 16:34
Static task
static1
Behavioral task
behavioral1
Sample
906f443ff2f5e59b38d0da12090ae17e.exe
Resource
win7-20231201-en
General
-
Target
906f443ff2f5e59b38d0da12090ae17e.exe
-
Size
375KB
-
MD5
906f443ff2f5e59b38d0da12090ae17e
-
SHA1
1e50f93e2a49cf1325c291eb8c491e00e84e80d8
-
SHA256
35444ec8434846a91960534af1f3cf875096c4c5aa869e7612a06327ddf616bd
-
SHA512
f4238ff549af3e0a20e53a98680de3b00db296aaf733f60992d9c7738f46febad44f4214b683c422f3dfd04d4389f3956e8076ffb6c13faa0be46e80c6012b68
-
SSDEEP
6144:9bgwg3Zl1zv+E53TbUBdxz+xdcPX8aiirmcDtczEcmTPO3:90B1zv+2PUHJCdcfPiiyGCMW
Malware Config
Extracted
amadey
4.11
http://shohetrc.com
http://sibcomputer.ru
http://tve-mail.com
-
install_dir
d4dd819322
-
install_file
Utsysc.exe
-
strings_key
8419b3024d6f72beef8af6915e592308
-
url_paths
/forum/index.php
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
Utsysc.exeUtsysc.exeUtsysc.exepid process 2828 Utsysc.exe 1252 Utsysc.exe 2288 Utsysc.exe -
Loads dropped DLL 2 IoCs
Processes:
906f443ff2f5e59b38d0da12090ae17e.exepid process 1924 906f443ff2f5e59b38d0da12090ae17e.exe 1924 906f443ff2f5e59b38d0da12090ae17e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
906f443ff2f5e59b38d0da12090ae17e.exepid process 1924 906f443ff2f5e59b38d0da12090ae17e.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
906f443ff2f5e59b38d0da12090ae17e.exeUtsysc.exetaskeng.exedescription pid process target process PID 1924 wrote to memory of 2828 1924 906f443ff2f5e59b38d0da12090ae17e.exe Utsysc.exe PID 1924 wrote to memory of 2828 1924 906f443ff2f5e59b38d0da12090ae17e.exe Utsysc.exe PID 1924 wrote to memory of 2828 1924 906f443ff2f5e59b38d0da12090ae17e.exe Utsysc.exe PID 1924 wrote to memory of 2828 1924 906f443ff2f5e59b38d0da12090ae17e.exe Utsysc.exe PID 2828 wrote to memory of 2108 2828 Utsysc.exe schtasks.exe PID 2828 wrote to memory of 2108 2828 Utsysc.exe schtasks.exe PID 2828 wrote to memory of 2108 2828 Utsysc.exe schtasks.exe PID 2828 wrote to memory of 2108 2828 Utsysc.exe schtasks.exe PID 1796 wrote to memory of 1252 1796 taskeng.exe Utsysc.exe PID 1796 wrote to memory of 1252 1796 taskeng.exe Utsysc.exe PID 1796 wrote to memory of 1252 1796 taskeng.exe Utsysc.exe PID 1796 wrote to memory of 1252 1796 taskeng.exe Utsysc.exe PID 1796 wrote to memory of 2288 1796 taskeng.exe Utsysc.exe PID 1796 wrote to memory of 2288 1796 taskeng.exe Utsysc.exe PID 1796 wrote to memory of 2288 1796 taskeng.exe Utsysc.exe PID 1796 wrote to memory of 2288 1796 taskeng.exe Utsysc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\906f443ff2f5e59b38d0da12090ae17e.exe"C:\Users\Admin\AppData\Local\Temp\906f443ff2f5e59b38d0da12090ae17e.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe"C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe" /F3⤵
- Creates scheduled task(s)
PID:2108
-
C:\Windows\system32\taskeng.exetaskeng.exe {BFA0442A-F870-469F-A15D-085903677FD9} S-1-5-21-1514849007-2165033493-4114354048-1000:NOCBBDMA\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe2⤵
- Executes dropped EXE
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe2⤵
- Executes dropped EXE
PID:2288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5caa8c67e7b5ce3f859d3c1f0b6760fb3
SHA101ae970eb289c029b14a7a182e8f23e5e722462b
SHA256ceaa944de50638c687487196b60818e4e63d4cf0404ddc09ad6ccd6803ec1d13
SHA5128dc1fa041bc2991709cfc9d50685f5415141bb0ab5a4490ff80c9ad47c6047667e609b92028cd5e83f0620b87e2307027f9b916a76a72a1b9b4fb2c4872cb9c6
-
Filesize
375KB
MD5906f443ff2f5e59b38d0da12090ae17e
SHA11e50f93e2a49cf1325c291eb8c491e00e84e80d8
SHA25635444ec8434846a91960534af1f3cf875096c4c5aa869e7612a06327ddf616bd
SHA512f4238ff549af3e0a20e53a98680de3b00db296aaf733f60992d9c7738f46febad44f4214b683c422f3dfd04d4389f3956e8076ffb6c13faa0be46e80c6012b68
-
Filesize
375KB
MD5906f443ff2f5e59b38d0da12090ae17e
SHA11e50f93e2a49cf1325c291eb8c491e00e84e80d8
SHA25635444ec8434846a91960534af1f3cf875096c4c5aa869e7612a06327ddf616bd
SHA512f4238ff549af3e0a20e53a98680de3b00db296aaf733f60992d9c7738f46febad44f4214b683c422f3dfd04d4389f3956e8076ffb6c13faa0be46e80c6012b68
-
Filesize
375KB
MD5906f443ff2f5e59b38d0da12090ae17e
SHA11e50f93e2a49cf1325c291eb8c491e00e84e80d8
SHA25635444ec8434846a91960534af1f3cf875096c4c5aa869e7612a06327ddf616bd
SHA512f4238ff549af3e0a20e53a98680de3b00db296aaf733f60992d9c7738f46febad44f4214b683c422f3dfd04d4389f3956e8076ffb6c13faa0be46e80c6012b68
-
Filesize
375KB
MD5906f443ff2f5e59b38d0da12090ae17e
SHA11e50f93e2a49cf1325c291eb8c491e00e84e80d8
SHA25635444ec8434846a91960534af1f3cf875096c4c5aa869e7612a06327ddf616bd
SHA512f4238ff549af3e0a20e53a98680de3b00db296aaf733f60992d9c7738f46febad44f4214b683c422f3dfd04d4389f3956e8076ffb6c13faa0be46e80c6012b68
-
Filesize
375KB
MD5906f443ff2f5e59b38d0da12090ae17e
SHA11e50f93e2a49cf1325c291eb8c491e00e84e80d8
SHA25635444ec8434846a91960534af1f3cf875096c4c5aa869e7612a06327ddf616bd
SHA512f4238ff549af3e0a20e53a98680de3b00db296aaf733f60992d9c7738f46febad44f4214b683c422f3dfd04d4389f3956e8076ffb6c13faa0be46e80c6012b68
-
Filesize
375KB
MD5906f443ff2f5e59b38d0da12090ae17e
SHA11e50f93e2a49cf1325c291eb8c491e00e84e80d8
SHA25635444ec8434846a91960534af1f3cf875096c4c5aa869e7612a06327ddf616bd
SHA512f4238ff549af3e0a20e53a98680de3b00db296aaf733f60992d9c7738f46febad44f4214b683c422f3dfd04d4389f3956e8076ffb6c13faa0be46e80c6012b68
-
Filesize
375KB
MD5906f443ff2f5e59b38d0da12090ae17e
SHA11e50f93e2a49cf1325c291eb8c491e00e84e80d8
SHA25635444ec8434846a91960534af1f3cf875096c4c5aa869e7612a06327ddf616bd
SHA512f4238ff549af3e0a20e53a98680de3b00db296aaf733f60992d9c7738f46febad44f4214b683c422f3dfd04d4389f3956e8076ffb6c13faa0be46e80c6012b68