Analysis
-
max time kernel
1s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20231130-en -
resource tags
arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2023 19:10
Behavioral task
behavioral1
Sample
58233388d4840d05814fac8b1d2c844c2d224a013194b1cbcfb8a7adca6e18a1.exe
Resource
win7-20231020-en
General
-
Target
58233388d4840d05814fac8b1d2c844c2d224a013194b1cbcfb8a7adca6e18a1.exe
-
Size
2.2MB
-
MD5
1d32535deb1c523d0be798ff37593efa
-
SHA1
af8d446c2b97ee254b06924423b17cd95e8c0d27
-
SHA256
58233388d4840d05814fac8b1d2c844c2d224a013194b1cbcfb8a7adca6e18a1
-
SHA512
3aab24ce42cc650dafb71f68acc0e63c92a8c87e6d9eef653d2eddc36891801fb03ec0dd70c7d8feff03aa27560e4bce7d7bbff6abd44ecbb7f8f893f429a085
-
SSDEEP
49152:HM864hpl6/xzfnZHKEI92BtxHWfq7918JgFOwZko:s81pg+EIYBtZWfq7918exb
Malware Config
Extracted
amadey
4.13
http://185.172.128.125
-
install_dir
4fdb51ccdc
-
install_file
Utsysc.exe
-
strings_key
a70b05054314f381be1ab9a5cdc8b250
-
url_paths
/u6vhSc3PPq/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
58233388d4840d05814fac8b1d2c844c2d224a013194b1cbcfb8a7adca6e18a1.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 58233388d4840d05814fac8b1d2c844c2d224a013194b1cbcfb8a7adca6e18a1.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
58233388d4840d05814fac8b1d2c844c2d224a013194b1cbcfb8a7adca6e18a1.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 58233388d4840d05814fac8b1d2c844c2d224a013194b1cbcfb8a7adca6e18a1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 58233388d4840d05814fac8b1d2c844c2d224a013194b1cbcfb8a7adca6e18a1.exe -
Processes:
resource yara_rule behavioral2/memory/2228-0-0x0000000000330000-0x0000000000A26000-memory.dmp themida behavioral2/memory/2228-10-0x0000000000330000-0x0000000000A26000-memory.dmp themida behavioral2/memory/2228-11-0x0000000000330000-0x0000000000A26000-memory.dmp themida behavioral2/memory/2228-12-0x0000000000330000-0x0000000000A26000-memory.dmp themida behavioral2/memory/2228-13-0x0000000000330000-0x0000000000A26000-memory.dmp themida behavioral2/memory/2228-9-0x0000000000330000-0x0000000000A26000-memory.dmp themida behavioral2/memory/2228-14-0x0000000000330000-0x0000000000A26000-memory.dmp themida behavioral2/memory/2228-15-0x0000000000330000-0x0000000000A26000-memory.dmp themida behavioral2/memory/2228-16-0x0000000000330000-0x0000000000A26000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe themida behavioral2/memory/2228-29-0x0000000000330000-0x0000000000A26000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe themida C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe themida behavioral2/memory/1864-38-0x0000000000600000-0x0000000000CF6000-memory.dmp themida behavioral2/memory/1864-40-0x0000000000600000-0x0000000000CF6000-memory.dmp themida behavioral2/memory/1864-44-0x0000000000600000-0x0000000000CF6000-memory.dmp themida behavioral2/memory/1864-42-0x0000000000600000-0x0000000000CF6000-memory.dmp themida behavioral2/memory/1864-45-0x0000000000600000-0x0000000000CF6000-memory.dmp themida behavioral2/memory/1864-47-0x0000000000600000-0x0000000000CF6000-memory.dmp themida behavioral2/memory/1864-46-0x0000000000600000-0x0000000000CF6000-memory.dmp themida behavioral2/memory/1864-37-0x0000000000600000-0x0000000000CF6000-memory.dmp themida behavioral2/memory/1864-31-0x0000000000600000-0x0000000000CF6000-memory.dmp themida behavioral2/memory/1864-48-0x0000000000600000-0x0000000000CF6000-memory.dmp themida behavioral2/memory/4528-69-0x0000000000600000-0x0000000000CF6000-memory.dmp themida behavioral2/memory/4528-71-0x0000000000600000-0x0000000000CF6000-memory.dmp themida behavioral2/memory/4528-72-0x0000000000600000-0x0000000000CF6000-memory.dmp themida behavioral2/memory/4528-76-0x0000000000600000-0x0000000000CF6000-memory.dmp themida behavioral2/memory/4528-75-0x0000000000600000-0x0000000000CF6000-memory.dmp themida behavioral2/memory/4528-74-0x0000000000600000-0x0000000000CF6000-memory.dmp themida behavioral2/memory/4528-73-0x0000000000600000-0x0000000000CF6000-memory.dmp themida behavioral2/memory/4528-70-0x0000000000600000-0x0000000000CF6000-memory.dmp themida behavioral2/memory/4528-68-0x0000000000600000-0x0000000000CF6000-memory.dmp themida behavioral2/memory/4528-60-0x0000000000600000-0x0000000000CF6000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe themida behavioral2/memory/2280-85-0x0000000000600000-0x0000000000CF6000-memory.dmp themida behavioral2/memory/2280-93-0x0000000000600000-0x0000000000CF6000-memory.dmp themida behavioral2/memory/2280-95-0x0000000000600000-0x0000000000CF6000-memory.dmp themida behavioral2/memory/2280-94-0x0000000000600000-0x0000000000CF6000-memory.dmp themida behavioral2/memory/2280-96-0x0000000000600000-0x0000000000CF6000-memory.dmp themida behavioral2/memory/2280-97-0x0000000000600000-0x0000000000CF6000-memory.dmp themida behavioral2/memory/2280-98-0x0000000000600000-0x0000000000CF6000-memory.dmp themida behavioral2/memory/2280-100-0x0000000000600000-0x0000000000CF6000-memory.dmp themida behavioral2/memory/2280-101-0x0000000000600000-0x0000000000CF6000-memory.dmp themida behavioral2/memory/2280-99-0x0000000000600000-0x0000000000CF6000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe themida -
Processes:
58233388d4840d05814fac8b1d2c844c2d224a013194b1cbcfb8a7adca6e18a1.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 58233388d4840d05814fac8b1d2c844c2d224a013194b1cbcfb8a7adca6e18a1.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
58233388d4840d05814fac8b1d2c844c2d224a013194b1cbcfb8a7adca6e18a1.exepid process 2228 58233388d4840d05814fac8b1d2c844c2d224a013194b1cbcfb8a7adca6e18a1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
58233388d4840d05814fac8b1d2c844c2d224a013194b1cbcfb8a7adca6e18a1.exepid process 2228 58233388d4840d05814fac8b1d2c844c2d224a013194b1cbcfb8a7adca6e18a1.exe 2228 58233388d4840d05814fac8b1d2c844c2d224a013194b1cbcfb8a7adca6e18a1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\58233388d4840d05814fac8b1d2c844c2d224a013194b1cbcfb8a7adca6e18a1.exe"C:\Users\Admin\AppData\Local\Temp\58233388d4840d05814fac8b1d2c844c2d224a013194b1cbcfb8a7adca6e18a1.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe"C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe"2⤵PID:1864
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe" /F3⤵
- Creates scheduled task(s)
PID:2012
-
C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe1⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe1⤵PID:2280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD51d32535deb1c523d0be798ff37593efa
SHA1af8d446c2b97ee254b06924423b17cd95e8c0d27
SHA25658233388d4840d05814fac8b1d2c844c2d224a013194b1cbcfb8a7adca6e18a1
SHA5123aab24ce42cc650dafb71f68acc0e63c92a8c87e6d9eef653d2eddc36891801fb03ec0dd70c7d8feff03aa27560e4bce7d7bbff6abd44ecbb7f8f893f429a085
-
Filesize
2.2MB
MD51d32535deb1c523d0be798ff37593efa
SHA1af8d446c2b97ee254b06924423b17cd95e8c0d27
SHA25658233388d4840d05814fac8b1d2c844c2d224a013194b1cbcfb8a7adca6e18a1
SHA5123aab24ce42cc650dafb71f68acc0e63c92a8c87e6d9eef653d2eddc36891801fb03ec0dd70c7d8feff03aa27560e4bce7d7bbff6abd44ecbb7f8f893f429a085
-
Filesize
2.2MB
MD51d32535deb1c523d0be798ff37593efa
SHA1af8d446c2b97ee254b06924423b17cd95e8c0d27
SHA25658233388d4840d05814fac8b1d2c844c2d224a013194b1cbcfb8a7adca6e18a1
SHA5123aab24ce42cc650dafb71f68acc0e63c92a8c87e6d9eef653d2eddc36891801fb03ec0dd70c7d8feff03aa27560e4bce7d7bbff6abd44ecbb7f8f893f429a085
-
Filesize
2.2MB
MD51d32535deb1c523d0be798ff37593efa
SHA1af8d446c2b97ee254b06924423b17cd95e8c0d27
SHA25658233388d4840d05814fac8b1d2c844c2d224a013194b1cbcfb8a7adca6e18a1
SHA5123aab24ce42cc650dafb71f68acc0e63c92a8c87e6d9eef653d2eddc36891801fb03ec0dd70c7d8feff03aa27560e4bce7d7bbff6abd44ecbb7f8f893f429a085
-
Filesize
2.2MB
MD51d32535deb1c523d0be798ff37593efa
SHA1af8d446c2b97ee254b06924423b17cd95e8c0d27
SHA25658233388d4840d05814fac8b1d2c844c2d224a013194b1cbcfb8a7adca6e18a1
SHA5123aab24ce42cc650dafb71f68acc0e63c92a8c87e6d9eef653d2eddc36891801fb03ec0dd70c7d8feff03aa27560e4bce7d7bbff6abd44ecbb7f8f893f429a085