Analysis
-
max time kernel
142s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
07-12-2023 04:07
Static task
static1
Behavioral task
behavioral1
Sample
74ec10cbe8c630cd75807e89022da49876ea04bf76c3bea536c61b5cd36be0a9.exe
Resource
win7-20231023-en
General
-
Target
74ec10cbe8c630cd75807e89022da49876ea04bf76c3bea536c61b5cd36be0a9.exe
-
Size
446KB
-
MD5
3ac2f0cfc97ded7bda31835e5cc2ec7e
-
SHA1
deac90c7ef3340bff2e315e229dd9e2f752115f2
-
SHA256
74ec10cbe8c630cd75807e89022da49876ea04bf76c3bea536c61b5cd36be0a9
-
SHA512
f8b6395e7f40334123f2e6f0fe53bf1e9db7db3516a73e9e6f3aead317849bb7fa6eeadfb938b3cce50eea9dfbe602d106a6adef584845da0c41d5e962a399d8
-
SSDEEP
6144:bfu0eE6pn1nurt22Sle//O6+GsMFGV5iLXr9i49Ep6Dh:1eEonurt22R/GMkbIrM4y8Dh
Malware Config
Extracted
amadey
4.11
http://shohetrc.com
http://sibcomputer.ru
http://tve-mail.com
-
install_dir
d4dd819322
-
install_file
Utsysc.exe
-
strings_key
8419b3024d6f72beef8af6915e592308
-
url_paths
/forum/index.php
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
Utsysc.exeUtsysc.exeUtsysc.exepid process 2764 Utsysc.exe 1100 Utsysc.exe 2044 Utsysc.exe -
Loads dropped DLL 2 IoCs
Processes:
74ec10cbe8c630cd75807e89022da49876ea04bf76c3bea536c61b5cd36be0a9.exepid process 2340 74ec10cbe8c630cd75807e89022da49876ea04bf76c3bea536c61b5cd36be0a9.exe 2340 74ec10cbe8c630cd75807e89022da49876ea04bf76c3bea536c61b5cd36be0a9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
74ec10cbe8c630cd75807e89022da49876ea04bf76c3bea536c61b5cd36be0a9.exepid process 2340 74ec10cbe8c630cd75807e89022da49876ea04bf76c3bea536c61b5cd36be0a9.exe -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
74ec10cbe8c630cd75807e89022da49876ea04bf76c3bea536c61b5cd36be0a9.exeUtsysc.exetaskeng.exedescription pid process target process PID 2340 wrote to memory of 2764 2340 74ec10cbe8c630cd75807e89022da49876ea04bf76c3bea536c61b5cd36be0a9.exe Utsysc.exe PID 2340 wrote to memory of 2764 2340 74ec10cbe8c630cd75807e89022da49876ea04bf76c3bea536c61b5cd36be0a9.exe Utsysc.exe PID 2340 wrote to memory of 2764 2340 74ec10cbe8c630cd75807e89022da49876ea04bf76c3bea536c61b5cd36be0a9.exe Utsysc.exe PID 2340 wrote to memory of 2764 2340 74ec10cbe8c630cd75807e89022da49876ea04bf76c3bea536c61b5cd36be0a9.exe Utsysc.exe PID 2764 wrote to memory of 2300 2764 Utsysc.exe schtasks.exe PID 2764 wrote to memory of 2300 2764 Utsysc.exe schtasks.exe PID 2764 wrote to memory of 2300 2764 Utsysc.exe schtasks.exe PID 2764 wrote to memory of 2300 2764 Utsysc.exe schtasks.exe PID 1900 wrote to memory of 1100 1900 taskeng.exe Utsysc.exe PID 1900 wrote to memory of 1100 1900 taskeng.exe Utsysc.exe PID 1900 wrote to memory of 1100 1900 taskeng.exe Utsysc.exe PID 1900 wrote to memory of 1100 1900 taskeng.exe Utsysc.exe PID 2764 wrote to memory of 620 2764 Utsysc.exe rundll32.exe PID 2764 wrote to memory of 620 2764 Utsysc.exe rundll32.exe PID 2764 wrote to memory of 620 2764 Utsysc.exe rundll32.exe PID 2764 wrote to memory of 620 2764 Utsysc.exe rundll32.exe PID 2764 wrote to memory of 620 2764 Utsysc.exe rundll32.exe PID 2764 wrote to memory of 620 2764 Utsysc.exe rundll32.exe PID 2764 wrote to memory of 620 2764 Utsysc.exe rundll32.exe PID 2764 wrote to memory of 1388 2764 Utsysc.exe rundll32.exe PID 2764 wrote to memory of 1388 2764 Utsysc.exe rundll32.exe PID 2764 wrote to memory of 1388 2764 Utsysc.exe rundll32.exe PID 2764 wrote to memory of 1388 2764 Utsysc.exe rundll32.exe PID 2764 wrote to memory of 1388 2764 Utsysc.exe rundll32.exe PID 2764 wrote to memory of 1388 2764 Utsysc.exe rundll32.exe PID 2764 wrote to memory of 1388 2764 Utsysc.exe rundll32.exe PID 2764 wrote to memory of 2976 2764 Utsysc.exe rundll32.exe PID 2764 wrote to memory of 2976 2764 Utsysc.exe rundll32.exe PID 2764 wrote to memory of 2976 2764 Utsysc.exe rundll32.exe PID 2764 wrote to memory of 2976 2764 Utsysc.exe rundll32.exe PID 2764 wrote to memory of 2976 2764 Utsysc.exe rundll32.exe PID 2764 wrote to memory of 2976 2764 Utsysc.exe rundll32.exe PID 2764 wrote to memory of 2976 2764 Utsysc.exe rundll32.exe PID 1900 wrote to memory of 2044 1900 taskeng.exe Utsysc.exe PID 1900 wrote to memory of 2044 1900 taskeng.exe Utsysc.exe PID 1900 wrote to memory of 2044 1900 taskeng.exe Utsysc.exe PID 1900 wrote to memory of 2044 1900 taskeng.exe Utsysc.exe PID 2764 wrote to memory of 1952 2764 Utsysc.exe rundll32.exe PID 2764 wrote to memory of 1952 2764 Utsysc.exe rundll32.exe PID 2764 wrote to memory of 1952 2764 Utsysc.exe rundll32.exe PID 2764 wrote to memory of 1952 2764 Utsysc.exe rundll32.exe PID 2764 wrote to memory of 1952 2764 Utsysc.exe rundll32.exe PID 2764 wrote to memory of 1952 2764 Utsysc.exe rundll32.exe PID 2764 wrote to memory of 1952 2764 Utsysc.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\74ec10cbe8c630cd75807e89022da49876ea04bf76c3bea536c61b5cd36be0a9.exe"C:\Users\Admin\AppData\Local\Temp\74ec10cbe8c630cd75807e89022da49876ea04bf76c3bea536c61b5cd36be0a9.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe"C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe" /F3⤵
- Creates scheduled task(s)
PID:2300 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main3⤵PID:620
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main3⤵PID:1388
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\clip64.dll, Main3⤵PID:2976
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\clip64.dll, Main3⤵PID:1952
-
C:\Windows\system32\taskeng.exetaskeng.exe {DA71E30B-E0C9-4DFE-ABCD-C3167265F016} S-1-5-21-2085049433-1067986815-1244098655-1000:AHLBRYJO\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe2⤵
- Executes dropped EXE
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe2⤵
- Executes dropped EXE
PID:2044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD5d020301e1f7a1e2abf8fd4a598555112
SHA18c10fbcab6ea80126e5d0d6fb618b9d7f497765f
SHA2569d619c3fbf39faa7a7008aff2e646d7796560add8b7d7fb31a7c6fb4af0b3aaa
SHA5126d933df9976c3434b0f175c4887d1dcfac503cb8a25b19e173980f77b39f9d2bdd0e19931a2f8295c6e114379f77558e649b23873ff52d95af79af011dddfdef
-
Filesize
446KB
MD53ac2f0cfc97ded7bda31835e5cc2ec7e
SHA1deac90c7ef3340bff2e315e229dd9e2f752115f2
SHA25674ec10cbe8c630cd75807e89022da49876ea04bf76c3bea536c61b5cd36be0a9
SHA512f8b6395e7f40334123f2e6f0fe53bf1e9db7db3516a73e9e6f3aead317849bb7fa6eeadfb938b3cce50eea9dfbe602d106a6adef584845da0c41d5e962a399d8
-
Filesize
446KB
MD53ac2f0cfc97ded7bda31835e5cc2ec7e
SHA1deac90c7ef3340bff2e315e229dd9e2f752115f2
SHA25674ec10cbe8c630cd75807e89022da49876ea04bf76c3bea536c61b5cd36be0a9
SHA512f8b6395e7f40334123f2e6f0fe53bf1e9db7db3516a73e9e6f3aead317849bb7fa6eeadfb938b3cce50eea9dfbe602d106a6adef584845da0c41d5e962a399d8
-
Filesize
446KB
MD53ac2f0cfc97ded7bda31835e5cc2ec7e
SHA1deac90c7ef3340bff2e315e229dd9e2f752115f2
SHA25674ec10cbe8c630cd75807e89022da49876ea04bf76c3bea536c61b5cd36be0a9
SHA512f8b6395e7f40334123f2e6f0fe53bf1e9db7db3516a73e9e6f3aead317849bb7fa6eeadfb938b3cce50eea9dfbe602d106a6adef584845da0c41d5e962a399d8
-
Filesize
446KB
MD53ac2f0cfc97ded7bda31835e5cc2ec7e
SHA1deac90c7ef3340bff2e315e229dd9e2f752115f2
SHA25674ec10cbe8c630cd75807e89022da49876ea04bf76c3bea536c61b5cd36be0a9
SHA512f8b6395e7f40334123f2e6f0fe53bf1e9db7db3516a73e9e6f3aead317849bb7fa6eeadfb938b3cce50eea9dfbe602d106a6adef584845da0c41d5e962a399d8
-
Filesize
446KB
MD53ac2f0cfc97ded7bda31835e5cc2ec7e
SHA1deac90c7ef3340bff2e315e229dd9e2f752115f2
SHA25674ec10cbe8c630cd75807e89022da49876ea04bf76c3bea536c61b5cd36be0a9
SHA512f8b6395e7f40334123f2e6f0fe53bf1e9db7db3516a73e9e6f3aead317849bb7fa6eeadfb938b3cce50eea9dfbe602d106a6adef584845da0c41d5e962a399d8
-
Filesize
66KB
MD59b0507b53287ffe4c3af7ea8413b3998
SHA1a042a1973f9714866e8156a8f714926c2bb02b3f
SHA25670746fa232ede6a0818ad60d2552f22b5cce9b06181c6bfa1808fe5a1c313db1
SHA512a46f2e4380c13b4f48f3e8e60522f6e707a0c198e53fa37ae478f2323017e1106e77f1542db3c01c9d534c59c5ec0cd4f604886fb8d04bab77b06bc13464f521
-
Filesize
66KB
MD59b0507b53287ffe4c3af7ea8413b3998
SHA1a042a1973f9714866e8156a8f714926c2bb02b3f
SHA25670746fa232ede6a0818ad60d2552f22b5cce9b06181c6bfa1808fe5a1c313db1
SHA512a46f2e4380c13b4f48f3e8e60522f6e707a0c198e53fa37ae478f2323017e1106e77f1542db3c01c9d534c59c5ec0cd4f604886fb8d04bab77b06bc13464f521
-
Filesize
66KB
MD59b0507b53287ffe4c3af7ea8413b3998
SHA1a042a1973f9714866e8156a8f714926c2bb02b3f
SHA25670746fa232ede6a0818ad60d2552f22b5cce9b06181c6bfa1808fe5a1c313db1
SHA512a46f2e4380c13b4f48f3e8e60522f6e707a0c198e53fa37ae478f2323017e1106e77f1542db3c01c9d534c59c5ec0cd4f604886fb8d04bab77b06bc13464f521
-
Filesize
446KB
MD53ac2f0cfc97ded7bda31835e5cc2ec7e
SHA1deac90c7ef3340bff2e315e229dd9e2f752115f2
SHA25674ec10cbe8c630cd75807e89022da49876ea04bf76c3bea536c61b5cd36be0a9
SHA512f8b6395e7f40334123f2e6f0fe53bf1e9db7db3516a73e9e6f3aead317849bb7fa6eeadfb938b3cce50eea9dfbe602d106a6adef584845da0c41d5e962a399d8
-
Filesize
446KB
MD53ac2f0cfc97ded7bda31835e5cc2ec7e
SHA1deac90c7ef3340bff2e315e229dd9e2f752115f2
SHA25674ec10cbe8c630cd75807e89022da49876ea04bf76c3bea536c61b5cd36be0a9
SHA512f8b6395e7f40334123f2e6f0fe53bf1e9db7db3516a73e9e6f3aead317849bb7fa6eeadfb938b3cce50eea9dfbe602d106a6adef584845da0c41d5e962a399d8