Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231201-en -
resource tags
arch:x64arch:x86image:win7-20231201-enlocale:en-usos:windows7-x64system -
submitted
03-12-2023 16:29
Static task
static1
Behavioral task
behavioral1
Sample
c963942b7b60bf1352d07f136ce4d5f0.exe
Resource
win7-20231201-en
General
-
Target
c963942b7b60bf1352d07f136ce4d5f0.exe
-
Size
453KB
-
MD5
c963942b7b60bf1352d07f136ce4d5f0
-
SHA1
7bafedd3874b3f1ebc6d668ee90fa8f58a020370
-
SHA256
29b841e7b3965ad49e90253946da782bd0c82c42691f3d02811c75ae08df76f3
-
SHA512
ff1673b3a8df1a25c8dafc1b21ff3ac72b917d51497d447992e3143f58c5df2815fcc89d506a0af6cca7f92b8f065d4e3143bc423f17feae26d68b527e977ccb
-
SSDEEP
6144:JWithdJ7T88JJdDkELkbO+IAGkqOjIHROoSvdZ1m4TzzWCB/ZiaM:Mi1JfbJJd4O+IAGFcSROZZ1lD7B8aM
Malware Config
Extracted
amadey
4.13
http://77.91.76.37
-
install_dir
c508585d38
-
install_file
Utsysc.exe
-
strings_key
c736fd5bdd26ef77013837dee2004742
-
url_paths
/g8samsA2/index.php
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
Utsysc.exeUtsysc.exeUtsysc.exeUtsysc.exepid process 2740 Utsysc.exe 2344 Utsysc.exe 1648 Utsysc.exe 1840 Utsysc.exe -
Loads dropped DLL 2 IoCs
Processes:
c963942b7b60bf1352d07f136ce4d5f0.exepid process 1972 c963942b7b60bf1352d07f136ce4d5f0.exe 1972 c963942b7b60bf1352d07f136ce4d5f0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
c963942b7b60bf1352d07f136ce4d5f0.exepid process 1972 c963942b7b60bf1352d07f136ce4d5f0.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
c963942b7b60bf1352d07f136ce4d5f0.exeUtsysc.exetaskeng.exedescription pid process target process PID 1972 wrote to memory of 2740 1972 c963942b7b60bf1352d07f136ce4d5f0.exe Utsysc.exe PID 1972 wrote to memory of 2740 1972 c963942b7b60bf1352d07f136ce4d5f0.exe Utsysc.exe PID 1972 wrote to memory of 2740 1972 c963942b7b60bf1352d07f136ce4d5f0.exe Utsysc.exe PID 1972 wrote to memory of 2740 1972 c963942b7b60bf1352d07f136ce4d5f0.exe Utsysc.exe PID 2740 wrote to memory of 2356 2740 Utsysc.exe schtasks.exe PID 2740 wrote to memory of 2356 2740 Utsysc.exe schtasks.exe PID 2740 wrote to memory of 2356 2740 Utsysc.exe schtasks.exe PID 2740 wrote to memory of 2356 2740 Utsysc.exe schtasks.exe PID 2712 wrote to memory of 2344 2712 taskeng.exe Utsysc.exe PID 2712 wrote to memory of 2344 2712 taskeng.exe Utsysc.exe PID 2712 wrote to memory of 2344 2712 taskeng.exe Utsysc.exe PID 2712 wrote to memory of 2344 2712 taskeng.exe Utsysc.exe PID 2712 wrote to memory of 1648 2712 taskeng.exe Utsysc.exe PID 2712 wrote to memory of 1648 2712 taskeng.exe Utsysc.exe PID 2712 wrote to memory of 1648 2712 taskeng.exe Utsysc.exe PID 2712 wrote to memory of 1648 2712 taskeng.exe Utsysc.exe PID 2712 wrote to memory of 1840 2712 taskeng.exe Utsysc.exe PID 2712 wrote to memory of 1840 2712 taskeng.exe Utsysc.exe PID 2712 wrote to memory of 1840 2712 taskeng.exe Utsysc.exe PID 2712 wrote to memory of 1840 2712 taskeng.exe Utsysc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c963942b7b60bf1352d07f136ce4d5f0.exe"C:\Users\Admin\AppData\Local\Temp\c963942b7b60bf1352d07f136ce4d5f0.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\c508585d38\Utsysc.exe"C:\Users\Admin\AppData\Local\Temp\c508585d38\Utsysc.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\c508585d38\Utsysc.exe" /F3⤵
- Creates scheduled task(s)
PID:2356
-
C:\Windows\system32\taskeng.exetaskeng.exe {2D6A5589-CBC1-46C8-A965-9DD1DC7EC016} S-1-5-21-1502336823-1680518048-858510903-1000:XARGEIVJ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\c508585d38\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\c508585d38\Utsysc.exe2⤵
- Executes dropped EXE
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\c508585d38\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\c508585d38\Utsysc.exe2⤵
- Executes dropped EXE
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\c508585d38\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\c508585d38\Utsysc.exe2⤵
- Executes dropped EXE
PID:1840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD51329799c448888d13d4b106a209d48fd
SHA116d773aee1296b820e9660581df6fa8feba269f8
SHA25616f4d5672352366dd8e4aab0db33b0392eb5ab7c4ab529494405f9ff13b6e6dc
SHA512f767bd0c7db445c5c5f30d843962f20be5c135da2815a71f082cb2e594594d9ff9299784a26191642af4ac62710652d7890d649c9430cf0015116d32ea0282db
-
Filesize
453KB
MD5c963942b7b60bf1352d07f136ce4d5f0
SHA17bafedd3874b3f1ebc6d668ee90fa8f58a020370
SHA25629b841e7b3965ad49e90253946da782bd0c82c42691f3d02811c75ae08df76f3
SHA512ff1673b3a8df1a25c8dafc1b21ff3ac72b917d51497d447992e3143f58c5df2815fcc89d506a0af6cca7f92b8f065d4e3143bc423f17feae26d68b527e977ccb
-
Filesize
453KB
MD5c963942b7b60bf1352d07f136ce4d5f0
SHA17bafedd3874b3f1ebc6d668ee90fa8f58a020370
SHA25629b841e7b3965ad49e90253946da782bd0c82c42691f3d02811c75ae08df76f3
SHA512ff1673b3a8df1a25c8dafc1b21ff3ac72b917d51497d447992e3143f58c5df2815fcc89d506a0af6cca7f92b8f065d4e3143bc423f17feae26d68b527e977ccb
-
Filesize
453KB
MD5c963942b7b60bf1352d07f136ce4d5f0
SHA17bafedd3874b3f1ebc6d668ee90fa8f58a020370
SHA25629b841e7b3965ad49e90253946da782bd0c82c42691f3d02811c75ae08df76f3
SHA512ff1673b3a8df1a25c8dafc1b21ff3ac72b917d51497d447992e3143f58c5df2815fcc89d506a0af6cca7f92b8f065d4e3143bc423f17feae26d68b527e977ccb
-
Filesize
453KB
MD5c963942b7b60bf1352d07f136ce4d5f0
SHA17bafedd3874b3f1ebc6d668ee90fa8f58a020370
SHA25629b841e7b3965ad49e90253946da782bd0c82c42691f3d02811c75ae08df76f3
SHA512ff1673b3a8df1a25c8dafc1b21ff3ac72b917d51497d447992e3143f58c5df2815fcc89d506a0af6cca7f92b8f065d4e3143bc423f17feae26d68b527e977ccb
-
Filesize
453KB
MD5c963942b7b60bf1352d07f136ce4d5f0
SHA17bafedd3874b3f1ebc6d668ee90fa8f58a020370
SHA25629b841e7b3965ad49e90253946da782bd0c82c42691f3d02811c75ae08df76f3
SHA512ff1673b3a8df1a25c8dafc1b21ff3ac72b917d51497d447992e3143f58c5df2815fcc89d506a0af6cca7f92b8f065d4e3143bc423f17feae26d68b527e977ccb
-
Filesize
453KB
MD5c963942b7b60bf1352d07f136ce4d5f0
SHA17bafedd3874b3f1ebc6d668ee90fa8f58a020370
SHA25629b841e7b3965ad49e90253946da782bd0c82c42691f3d02811c75ae08df76f3
SHA512ff1673b3a8df1a25c8dafc1b21ff3ac72b917d51497d447992e3143f58c5df2815fcc89d506a0af6cca7f92b8f065d4e3143bc423f17feae26d68b527e977ccb
-
Filesize
453KB
MD5c963942b7b60bf1352d07f136ce4d5f0
SHA17bafedd3874b3f1ebc6d668ee90fa8f58a020370
SHA25629b841e7b3965ad49e90253946da782bd0c82c42691f3d02811c75ae08df76f3
SHA512ff1673b3a8df1a25c8dafc1b21ff3ac72b917d51497d447992e3143f58c5df2815fcc89d506a0af6cca7f92b8f065d4e3143bc423f17feae26d68b527e977ccb
-
Filesize
453KB
MD5c963942b7b60bf1352d07f136ce4d5f0
SHA17bafedd3874b3f1ebc6d668ee90fa8f58a020370
SHA25629b841e7b3965ad49e90253946da782bd0c82c42691f3d02811c75ae08df76f3
SHA512ff1673b3a8df1a25c8dafc1b21ff3ac72b917d51497d447992e3143f58c5df2815fcc89d506a0af6cca7f92b8f065d4e3143bc423f17feae26d68b527e977ccb