Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
11-12-2023 01:24
Static task
static1
Behavioral task
behavioral1
Sample
246bc43dddcb46823b81aa3aab776e87.exe
Resource
win7-20231020-en
General
-
Target
246bc43dddcb46823b81aa3aab776e87.exe
-
Size
2.5MB
-
MD5
246bc43dddcb46823b81aa3aab776e87
-
SHA1
0d8df13b80d6f50a107be6ad934d0a3353064d06
-
SHA256
a406bfcf106fa5ba45ae292a1f0e5c3e805bec1ce594f2f5b5a012e07f384801
-
SHA512
e57ede33f80d833e0d700bb7ea41592a3f15cd02c53c6a6b8526c90230c084e97adfe9e7c0c1b2d9d7a0ce1651f67eed0cce1432bc9fcee13ad2a5aefebe7505
-
SSDEEP
49152:ZdSgw81FfOUtWIzmpr2uiy1VgBEjsKuo2unZwzPoM0XbXSoxdauV:ygVFWUtWQOxiVJo2unZwKXbX/7au
Malware Config
Extracted
amadey
4.13
http://185.172.128.5
-
install_dir
4fdb51ccdc
-
install_file
Utsysc.exe
-
strings_key
11bb398ff31ee80d2c37571aecd1d36d
-
url_paths
/v8sjh3hs8/index.php
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exerundll32.exeflow pid process 7 2152 rundll32.exe 9 2228 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
Utsysc.exeUtsysc.exeUtsysc.exeUtsysc.exepid process 2408 Utsysc.exe 2724 Utsysc.exe 1456 Utsysc.exe 2428 Utsysc.exe -
Loads dropped DLL 13 IoCs
Processes:
246bc43dddcb46823b81aa3aab776e87.exerundll32.exerundll32.exerundll32.exepid process 1908 246bc43dddcb46823b81aa3aab776e87.exe 2616 rundll32.exe 2616 rundll32.exe 2616 rundll32.exe 2616 rundll32.exe 2152 rundll32.exe 2152 rundll32.exe 2152 rundll32.exe 2152 rundll32.exe 2228 rundll32.exe 2228 rundll32.exe 2228 rundll32.exe 2228 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exepid process 2152 rundll32.exe 2152 rundll32.exe 2152 rundll32.exe 2152 rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
246bc43dddcb46823b81aa3aab776e87.exepid process 1908 246bc43dddcb46823b81aa3aab776e87.exe -
Suspicious use of WriteProcessMemory 53 IoCs
Processes:
246bc43dddcb46823b81aa3aab776e87.exeUtsysc.exetaskeng.exerundll32.exerundll32.exedescription pid process target process PID 1908 wrote to memory of 2408 1908 246bc43dddcb46823b81aa3aab776e87.exe Utsysc.exe PID 1908 wrote to memory of 2408 1908 246bc43dddcb46823b81aa3aab776e87.exe Utsysc.exe PID 1908 wrote to memory of 2408 1908 246bc43dddcb46823b81aa3aab776e87.exe Utsysc.exe PID 1908 wrote to memory of 2408 1908 246bc43dddcb46823b81aa3aab776e87.exe Utsysc.exe PID 1908 wrote to memory of 2408 1908 246bc43dddcb46823b81aa3aab776e87.exe Utsysc.exe PID 1908 wrote to memory of 2408 1908 246bc43dddcb46823b81aa3aab776e87.exe Utsysc.exe PID 1908 wrote to memory of 2408 1908 246bc43dddcb46823b81aa3aab776e87.exe Utsysc.exe PID 2408 wrote to memory of 2372 2408 Utsysc.exe schtasks.exe PID 2408 wrote to memory of 2372 2408 Utsysc.exe schtasks.exe PID 2408 wrote to memory of 2372 2408 Utsysc.exe schtasks.exe PID 2408 wrote to memory of 2372 2408 Utsysc.exe schtasks.exe PID 2972 wrote to memory of 2724 2972 taskeng.exe Utsysc.exe PID 2972 wrote to memory of 2724 2972 taskeng.exe Utsysc.exe PID 2972 wrote to memory of 2724 2972 taskeng.exe Utsysc.exe PID 2972 wrote to memory of 2724 2972 taskeng.exe Utsysc.exe PID 2972 wrote to memory of 2724 2972 taskeng.exe Utsysc.exe PID 2972 wrote to memory of 2724 2972 taskeng.exe Utsysc.exe PID 2972 wrote to memory of 2724 2972 taskeng.exe Utsysc.exe PID 2408 wrote to memory of 2616 2408 Utsysc.exe rundll32.exe PID 2408 wrote to memory of 2616 2408 Utsysc.exe rundll32.exe PID 2408 wrote to memory of 2616 2408 Utsysc.exe rundll32.exe PID 2408 wrote to memory of 2616 2408 Utsysc.exe rundll32.exe PID 2408 wrote to memory of 2616 2408 Utsysc.exe rundll32.exe PID 2408 wrote to memory of 2616 2408 Utsysc.exe rundll32.exe PID 2408 wrote to memory of 2616 2408 Utsysc.exe rundll32.exe PID 2616 wrote to memory of 2152 2616 rundll32.exe rundll32.exe PID 2616 wrote to memory of 2152 2616 rundll32.exe rundll32.exe PID 2616 wrote to memory of 2152 2616 rundll32.exe rundll32.exe PID 2616 wrote to memory of 2152 2616 rundll32.exe rundll32.exe PID 2152 wrote to memory of 2620 2152 rundll32.exe netsh.exe PID 2152 wrote to memory of 2620 2152 rundll32.exe netsh.exe PID 2152 wrote to memory of 2620 2152 rundll32.exe netsh.exe PID 2408 wrote to memory of 2228 2408 Utsysc.exe rundll32.exe PID 2408 wrote to memory of 2228 2408 Utsysc.exe rundll32.exe PID 2408 wrote to memory of 2228 2408 Utsysc.exe rundll32.exe PID 2408 wrote to memory of 2228 2408 Utsysc.exe rundll32.exe PID 2408 wrote to memory of 2228 2408 Utsysc.exe rundll32.exe PID 2408 wrote to memory of 2228 2408 Utsysc.exe rundll32.exe PID 2408 wrote to memory of 2228 2408 Utsysc.exe rundll32.exe PID 2972 wrote to memory of 1456 2972 taskeng.exe Utsysc.exe PID 2972 wrote to memory of 1456 2972 taskeng.exe Utsysc.exe PID 2972 wrote to memory of 1456 2972 taskeng.exe Utsysc.exe PID 2972 wrote to memory of 1456 2972 taskeng.exe Utsysc.exe PID 2972 wrote to memory of 1456 2972 taskeng.exe Utsysc.exe PID 2972 wrote to memory of 1456 2972 taskeng.exe Utsysc.exe PID 2972 wrote to memory of 1456 2972 taskeng.exe Utsysc.exe PID 2972 wrote to memory of 2428 2972 taskeng.exe Utsysc.exe PID 2972 wrote to memory of 2428 2972 taskeng.exe Utsysc.exe PID 2972 wrote to memory of 2428 2972 taskeng.exe Utsysc.exe PID 2972 wrote to memory of 2428 2972 taskeng.exe Utsysc.exe PID 2972 wrote to memory of 2428 2972 taskeng.exe Utsysc.exe PID 2972 wrote to memory of 2428 2972 taskeng.exe Utsysc.exe PID 2972 wrote to memory of 2428 2972 taskeng.exe Utsysc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\246bc43dddcb46823b81aa3aab776e87.exe"C:\Users\Admin\AppData\Local\Temp\246bc43dddcb46823b81aa3aab776e87.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe"C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe" /F3⤵
- Creates scheduled task(s)
PID:2372 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll, Main3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵PID:2620
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\80c6bf70bf3f8f\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2228
-
C:\Windows\system32\taskeng.exetaskeng.exe {980AF3C6-A4DB-4304-B7B0-608B83F6D049} S-1-5-21-1154728922-3261336865-3456416385-1000:TLIDUQCQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe2⤵
- Executes dropped EXE
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe2⤵
- Executes dropped EXE
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe2⤵
- Executes dropped EXE
PID:2428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5b817961d87a2fb31cf78af0a4c15488e
SHA18d6af0c5a9e2ad30f08163d8f54bf61d33c3161d
SHA2565b24c6c108c6a6aec43a05ba2d6506a3fd83b6301e0b29dd11f3e803b6f67902
SHA5127af468583683e66b10403298ba513b058b4309e25ea3e945a2609694b98b7b290981af697bca0d8fedf78d924e1c0411b5e1db40fa1564b87bced96433fac044
-
Filesize
413KB
MD57c7dd8ca17f4b6fd3104f58c0cd2296f
SHA14a3f341cc2b4f172bfda0d8c6788a59d6cbb180c
SHA25661a5a308617eaf659761e09ce8e752c0faaba44ce6f141b16d19b882eb54b799
SHA512bbd2f44221ae7ddee10cbf4332cc602734b48d2de2f5ab29ef87b51ede5ebfdd3d085ab24245ccbfb6ce76e5836d98fd91fcbd9cc50bde68f105650e2d0eb92c
-
Filesize
338KB
MD5c1a1033663268050f0d0fc502b62439b
SHA161fae59371c7f019fcc571d3d32b7c00087a7475
SHA2567ddde3b8f97ca082cef86f5e9a346e4a8212f8064d674e925497ec7c4b508760
SHA51213bef3d14931590e7350b184528622a83dd48271edeb31d7aeb0c1bc223e9f77212b5e025c52cb236982a7babf15134f41ec2cd7d64b51b2c1bff74024184e05
-
Filesize
2.5MB
MD5246bc43dddcb46823b81aa3aab776e87
SHA10d8df13b80d6f50a107be6ad934d0a3353064d06
SHA256a406bfcf106fa5ba45ae292a1f0e5c3e805bec1ce594f2f5b5a012e07f384801
SHA512e57ede33f80d833e0d700bb7ea41592a3f15cd02c53c6a6b8526c90230c084e97adfe9e7c0c1b2d9d7a0ce1651f67eed0cce1432bc9fcee13ad2a5aefebe7505
-
Filesize
399KB
MD5413da62dcb4343e2b00369427a919e2a
SHA16cda29b56e6ea81cdd6fabdb8127fe4df33d6335
SHA256b8d5cbbdbb6f8db18e7bc8959d4b8ef56dc01e57a7a38b054594919b30802963
SHA512cafaf033609175312fecc6de39e88a0aba03f6165465ad5cb1a38d2bacd5370bf13f5f2d790f5d139b752f377a39eba0af035a7a3f3a1a1afdb55d3847ba5555
-
Filesize
2.3MB
MD5375d6832f4a88e9dab6a104885722172
SHA1a256fc3510563e6536038aaf16fd1d465eb7a4b8
SHA25681a0200888e7c842530d0071df2d930afd0928991c0fec4dbc973170c43b3f28
SHA512c9e56f1ab81bee203a265ee34c9024e32c6a298600109fa781f73dafc26a5bc7f77c3ced9576b6c202afb71604acbabf81754a3e5c093fbe6799ac6c5d876463
-
Filesize
709KB
MD53cc3cec313adb055208d5cbc84a949dc
SHA136ea9f240f6cdd6128cc7976483b06a2a7f2d59d
SHA256a921fa9402b313c9ac16fee3a58117609e861c10b83ce3c09309410c71c92512
SHA5122c4a6c5cabda7d889c9ef32d983f3d7adf9e7dbe10cf9777931df921c55a9c1f3daadda010577ee37181b20a8bdbd19397daf3eee515085b464be62bd5639d2d
-
Filesize
102KB
MD5c06513af505f65393b4ebcd2a11a2ee4
SHA16e9e8a6b93fc9afbcc781790881d821b0bfb0821
SHA256f5d35a2366cf13312a30c9384f1ac30d9dc9ced46fa6b1b9c2d0621493cc2495
SHA512b90b8dc0571b2dde83c5ceaa4f12f203973bc2049663c0a840fa20a900bc7018f1f392f10273a607e816ccaf8a2b4f70bbc30b354437a2c9aecf5626b7c0a5ce
-
Filesize
134KB
MD57e5d2361a38404320c13561dc9f1f29d
SHA11d3de12b8a39264b7d8c80c36dd0e02bbe76dff3
SHA25636e3169c48a72837348171c4ea1e778324a96f1fbb42655ab78d739f6fed0881
SHA5128637beac45849cef4c98baa023941126967c70130f16f8afe72fdc14091d7151374a4cc141f613082b36180813616533a6c9702cec497bf93ad5a914e5c04ea9
-
Filesize
835KB
MD53d42c99243f47960df420fe07f115217
SHA143c74a04995716f67d6d421466f578a3f53078cb
SHA25675fd9d33e270bfa73247beda61b8687b5f0e7a584352d2caf2212fe0928f3db8
SHA512e3b167eded9d92f832c3253f66d22dceb85597fc0c8646c016fd422695755fd7d3d7ed37679ea15d636b0273e37d000844774eea6ff3e7bcee0e95fc51b9c960
-
Filesize
906KB
MD583925adc03659d31bc0c9a3d78af50f7
SHA1fb886e79111340055ce2fb902ff20722638b53e7
SHA25631ee8bd5e2600a4c88493894c3099389cd0a0c8ae00d2849214de7b91984c06c
SHA512af0ec51ed3d9eb26f99023040a66942b2c71285176657462e1e958d6f56ae3b6c67bcefcccfe63cb2e51bbbd18e1e91ca11aee40daebb76a1289f13bbf74e96c
-
Filesize
556KB
MD509fe2ecb009437a9a3333065dfcf7e01
SHA1e01a76e91d9a05afd0810238beca928abaac32b0
SHA2566492578c3ff6ba7854adc052ae43a438d30307ebc6287f3a175bf182122e08ce
SHA51208deecddc91144c72f543e14c4dd126d418c779654d396bee9155ec65d9fc9b832872a4a179da27cb68935f2b0194b17ce8a03e047632f7ed0099b2d6b57ba5a
-
Filesize
114KB
MD5320bb25e561a63b40a059af074a92742
SHA1da21906f136f4e4a6d36706ee10305db0f3649f8
SHA2564f18f6988ec51723dc07cc25b0bbb7d73d8704163805984bc01f5edd527abbec
SHA51224369e34d220063923060e1cde3c5f61346d934695f5ad207f7a329c5e1ff75de26d33b7b835d117c4f3d549cb9113245f41e377daee7482b96a528b86cd427d
-
Filesize
478KB
MD5cd51f0ceb854693c32229e66c28f7c25
SHA1d1b8d5be4192151c51b112f53d6a6774ceb20b8f
SHA2561ed754f07927c40c556216c0f34c561ce4441f666c0d09b9cae7bde2b58b4763
SHA51268afd2e2d871ccb7f7cd1d8c366fe65af0c2590a19876adc113b5a112f0f009cebb31509e4555a3c7ac41431c2472e87421a7d5ea4a8047b5f2c8957ec47cf1a
-
Filesize
518KB
MD5794691d072e9ce645baca19ed7bf0e40
SHA132a343dc266b8101a5aadb0bd96b2a609b49240b
SHA256dbc4d6435944b63a36c45b5140d1bf9ecf55a80225843fa051ac65f8457f1ba6
SHA5120ef847674bf3fdad69a3f7798baed188632fc172157c33fc3e9024ad314606aaa5519d07975b77ba9ae5d9247dd65a9f1e4e85dadd18ac9c64203e11e19f5f7e
-
Filesize
424KB
MD558393d81657a93057437d6e0511cf98e
SHA146c04df597ff68a031c6e4259af9bf7b5fca9752
SHA2567cf8257a55e25d1ad5bd0bbc89919bb8846c8a5538d0b8c1ab94be479652b5f3
SHA5129a7a798936ee90b2d4b9026db57b9f8042307c2e50430a619618efad0858ea01b46227c698bf8218b0e66d57be7a58d8a59a481e91409ceb2115ec7a94581237
-
Filesize
269KB
MD5c6b406348068b269d292876ac4fac5c1
SHA1bc186366a1b86c0b747a2931fea44caa12eae08d
SHA256a72d01c0acd992ba83e7fa86e1f050a202e43d794b01ef14c46f1f514d30095c
SHA5126e36b69c7b4119b90ce70f1f05aa759b86acd5b640b7e05a25a8f5c5380d266cf1d899e7a9f213dbc66188ed353a27fff87b088fc8c0ae7fba8c57bf7da5b634
-
Filesize
573KB
MD55c7b413c446a082442a2d3ae964883f2
SHA1c70ae792732da5983392a5ea956a4a2abc4f908c
SHA2560c1e3f016f164469dc5ed8aab7c29f96d936993c2fbd95199febefe13f56ffc0
SHA512531a28b8aa91e0b8d6eb35e16798d1b6abb495ec9afe781a0b92b672829c6b21d33518ecd2fd26774fa0596a604fe0adea40c438a483569d00c0f2e9a2ab8485
-
Filesize
270KB
MD5fb15c083133bbd382b742de33b8a10f9
SHA1f41dfa18737253e1c96b9677b1d3c18edab9c201
SHA256fbb85e29ca62b62df3148c51b29ff65b38bc21f838e7753469d609df17e7a5ac
SHA512334625ba2b7ab78d54529bd1db04400854defa27211c56b45e027d0a41bee9767891775aeb83122e4f23cc3d9b8b283c4c36f89aa6fafff92101b1f416004a6e