Analysis
-
max time kernel
139s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2023 16:49
Behavioral task
behavioral1
Sample
f169750c922fd27298748f97c1a9e2b8442fb4d2d5d85f35f61528c4df6b3718.exe
Resource
win7-20231129-en
General
-
Target
f169750c922fd27298748f97c1a9e2b8442fb4d2d5d85f35f61528c4df6b3718.exe
-
Size
425KB
-
MD5
b0aa0a177f2193739bb3ee81245dbe67
-
SHA1
683cc9723ede300b072d2124c031d7dd0a0cf472
-
SHA256
f169750c922fd27298748f97c1a9e2b8442fb4d2d5d85f35f61528c4df6b3718
-
SHA512
cccfab49f7669895f6404417299ca022876f2e904e3cb25eb6d0af00b46e56ceebf1f9e3ac04c427bce4cac423e7d77f28a57e1f435624777ba8b51d45ccd692
-
SSDEEP
12288:bSIX87D533xNzxb9XdEpxDYsF4m98uH+WYcCF:S7D533xNzl9N+YOD/CF
Malware Config
Extracted
amadey
4.11
http://shohetrc.com
http://sibcomputer.ru
http://tve-mail.com
-
install_dir
d4dd819322
-
install_file
Utsysc.exe
-
strings_key
8419b3024d6f72beef8af6915e592308
-
url_paths
/forum/index.php
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
f169750c922fd27298748f97c1a9e2b8442fb4d2d5d85f35f61528c4df6b3718.exeUtsysc.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3635043082-2972811465-3176142135-1000\Control Panel\International\Geo\Nation f169750c922fd27298748f97c1a9e2b8442fb4d2d5d85f35f61528c4df6b3718.exe Key value queried \REGISTRY\USER\S-1-5-21-3635043082-2972811465-3176142135-1000\Control Panel\International\Geo\Nation Utsysc.exe -
Executes dropped EXE 3 IoCs
Processes:
Utsysc.exeUtsysc.exeUtsysc.exepid process 3080 Utsysc.exe 4088 Utsysc.exe 1560 Utsysc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
f169750c922fd27298748f97c1a9e2b8442fb4d2d5d85f35f61528c4df6b3718.exepid process 2016 f169750c922fd27298748f97c1a9e2b8442fb4d2d5d85f35f61528c4df6b3718.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
f169750c922fd27298748f97c1a9e2b8442fb4d2d5d85f35f61528c4df6b3718.exeUtsysc.exedescription pid process target process PID 2016 wrote to memory of 3080 2016 f169750c922fd27298748f97c1a9e2b8442fb4d2d5d85f35f61528c4df6b3718.exe Utsysc.exe PID 2016 wrote to memory of 3080 2016 f169750c922fd27298748f97c1a9e2b8442fb4d2d5d85f35f61528c4df6b3718.exe Utsysc.exe PID 2016 wrote to memory of 3080 2016 f169750c922fd27298748f97c1a9e2b8442fb4d2d5d85f35f61528c4df6b3718.exe Utsysc.exe PID 3080 wrote to memory of 544 3080 Utsysc.exe schtasks.exe PID 3080 wrote to memory of 544 3080 Utsysc.exe schtasks.exe PID 3080 wrote to memory of 544 3080 Utsysc.exe schtasks.exe PID 3080 wrote to memory of 1376 3080 Utsysc.exe rundll32.exe PID 3080 wrote to memory of 1376 3080 Utsysc.exe rundll32.exe PID 3080 wrote to memory of 1376 3080 Utsysc.exe rundll32.exe PID 3080 wrote to memory of 3832 3080 Utsysc.exe rundll32.exe PID 3080 wrote to memory of 3832 3080 Utsysc.exe rundll32.exe PID 3080 wrote to memory of 3832 3080 Utsysc.exe rundll32.exe PID 3080 wrote to memory of 3960 3080 Utsysc.exe rundll32.exe PID 3080 wrote to memory of 3960 3080 Utsysc.exe rundll32.exe PID 3080 wrote to memory of 3960 3080 Utsysc.exe rundll32.exe PID 3080 wrote to memory of 3048 3080 Utsysc.exe rundll32.exe PID 3080 wrote to memory of 3048 3080 Utsysc.exe rundll32.exe PID 3080 wrote to memory of 3048 3080 Utsysc.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f169750c922fd27298748f97c1a9e2b8442fb4d2d5d85f35f61528c4df6b3718.exe"C:\Users\Admin\AppData\Local\Temp\f169750c922fd27298748f97c1a9e2b8442fb4d2d5d85f35f61528c4df6b3718.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe"C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe" /F3⤵
- Creates scheduled task(s)
PID:544 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main3⤵PID:1376
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main3⤵PID:3832
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\clip64.dll, Main3⤵PID:3960
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\clip64.dll, Main3⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe1⤵
- Executes dropped EXE
PID:4088
-
C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe1⤵
- Executes dropped EXE
PID:1560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD598376be132caf49beb999be180c5f581
SHA15f90a879256895a9232fbb45bf732869792e4a43
SHA25686269a5f0d03e56bd83748c12d227c75af72a95862f72898ec9c5bf2aca65b03
SHA51211b95eecb1135498c8fe989cec450c7aa513f0854c77a39c9206d4d358febd1607dd3f958d89830b4bf7d97020d45941148eca53c5fb9e32fe223b83c406f828
-
Filesize
425KB
MD5b0aa0a177f2193739bb3ee81245dbe67
SHA1683cc9723ede300b072d2124c031d7dd0a0cf472
SHA256f169750c922fd27298748f97c1a9e2b8442fb4d2d5d85f35f61528c4df6b3718
SHA512cccfab49f7669895f6404417299ca022876f2e904e3cb25eb6d0af00b46e56ceebf1f9e3ac04c427bce4cac423e7d77f28a57e1f435624777ba8b51d45ccd692
-
Filesize
256KB
MD56c560cbc082455c74fd6e2f668ed539f
SHA13894f25dfad4de9de1fcf17daa0c8fb85915033e
SHA2566515ffbc04c150dff779ae80eee776534433a5887b5a919ce050da3e0dd8d782
SHA5129e926684dab887b76858a039166d38b97a9d2f93da541017a9c715196d5c92189ccc1df1eee7b846d51832a01484e574cb53fe9286f1cf78bd5a9f9f8b74e670
-
Filesize
128KB
MD5c5555e4ec0941cd9abf86b8ad14d82be
SHA1addd26a1607b31950466f4324467af8375cec9bc
SHA256a4ded7a82aecd6df0ee25040e604c6cffa1ce165c6b6ef2b673c799fb566f84e
SHA51281d6cd6a21eabeedf76380d6fae2e70e2eff03dbd21c78a6a182c51b714f47026c6c7e4fd4f365da017351d1e4f031b2b06620908a7e0b9b6d716ce9228cc02b
-
Filesize
66KB
MD59b0507b53287ffe4c3af7ea8413b3998
SHA1a042a1973f9714866e8156a8f714926c2bb02b3f
SHA25670746fa232ede6a0818ad60d2552f22b5cce9b06181c6bfa1808fe5a1c313db1
SHA512a46f2e4380c13b4f48f3e8e60522f6e707a0c198e53fa37ae478f2323017e1106e77f1542db3c01c9d534c59c5ec0cd4f604886fb8d04bab77b06bc13464f521