Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 01:14
Static task
static1
Behavioral task
behavioral1
Sample
2228e230da3c69acba17d21614710ed7.exe
Resource
win7-20231215-en
General
-
Target
2228e230da3c69acba17d21614710ed7.exe
-
Size
482KB
-
MD5
2228e230da3c69acba17d21614710ed7
-
SHA1
d393023a13d593b78a39ffddf13de02dd4f969d7
-
SHA256
cfa888e64110e06bbe0d79f2664f048d6eee82a2278dff86c21e1ae6bb6b51f5
-
SHA512
3c79c9a56185c2019c844e2b6c731eac268567c6ac962e8e5e316cc0532f971e327c8236e7866ffedb41d001edb5e7d5969b353e270e995c1a5af5db007fa7c4
-
SSDEEP
12288:H+dGf/lHLV+p1VBxjTOYzHHYbkoYDK8kpDpD5fdMV:edUdkn5TOcnYbkK8kpDpD5f
Malware Config
Extracted
amadey
4.14
http://anfesq.com
http://cbinr.com
http://rimakc.ru
-
install_dir
68fd3d7ade
-
install_file
Utsysc.exe
-
strings_key
27ec7fd6f50f63b8af0c1d3deefcc8fe
-
url_paths
/forum/index.php
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 2228e230da3c69acba17d21614710ed7.exe Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation Utsysc.exe -
Executes dropped EXE 3 IoCs
pid Process 764 Utsysc.exe 4784 Utsysc.exe 4148 Utsysc.exe -
Loads dropped DLL 6 IoCs
pid Process 2292 rundll32.exe 2888 rundll32.exe 1892 rundll32.exe 3928 rundll32.exe 3144 rundll32.exe 1312 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 3084 4140 WerFault.exe 86 3772 4140 WerFault.exe 86 3348 4784 WerFault.exe 109 3140 4784 WerFault.exe 109 4492 4148 WerFault.exe 129 4504 4148 WerFault.exe 129 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2200 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4140 2228e230da3c69acba17d21614710ed7.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4140 wrote to memory of 764 4140 2228e230da3c69acba17d21614710ed7.exe 92 PID 4140 wrote to memory of 764 4140 2228e230da3c69acba17d21614710ed7.exe 92 PID 4140 wrote to memory of 764 4140 2228e230da3c69acba17d21614710ed7.exe 92 PID 764 wrote to memory of 2200 764 Utsysc.exe 96 PID 764 wrote to memory of 2200 764 Utsysc.exe 96 PID 764 wrote to memory of 2200 764 Utsysc.exe 96 PID 764 wrote to memory of 2292 764 Utsysc.exe 119 PID 764 wrote to memory of 2292 764 Utsysc.exe 119 PID 764 wrote to memory of 2292 764 Utsysc.exe 119 PID 2292 wrote to memory of 2888 2292 rundll32.exe 120 PID 2292 wrote to memory of 2888 2292 rundll32.exe 120 PID 764 wrote to memory of 1892 764 Utsysc.exe 124 PID 764 wrote to memory of 1892 764 Utsysc.exe 124 PID 764 wrote to memory of 1892 764 Utsysc.exe 124 PID 1892 wrote to memory of 3928 1892 rundll32.exe 125 PID 1892 wrote to memory of 3928 1892 rundll32.exe 125 PID 764 wrote to memory of 3144 764 Utsysc.exe 135 PID 764 wrote to memory of 3144 764 Utsysc.exe 135 PID 764 wrote to memory of 3144 764 Utsysc.exe 135 PID 3144 wrote to memory of 1312 3144 rundll32.exe 136 PID 3144 wrote to memory of 1312 3144 rundll32.exe 136
Processes
-
C:\Users\Admin\AppData\Local\Temp\2228e230da3c69acba17d21614710ed7.exe"C:\Users\Admin\AppData\Local\Temp\2228e230da3c69acba17d21614710ed7.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe"C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe" /F3⤵
- Creates scheduled task(s)
PID:2200
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main4⤵
- Loads dropped DLL
PID:2888
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main4⤵
- Loads dropped DLL
PID:3928
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main4⤵
- Loads dropped DLL
PID:1312
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 12762⤵
- Program crash
PID:3084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 14882⤵
- Program crash
PID:3772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4140 -ip 41401⤵PID:4640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4140 -ip 41401⤵PID:3680
-
C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe1⤵
- Executes dropped EXE
PID:4784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 4322⤵
- Program crash
PID:3348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 4762⤵
- Program crash
PID:3140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4784 -ip 47841⤵PID:448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4784 -ip 47841⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe1⤵
- Executes dropped EXE
PID:4148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4148 -s 4322⤵
- Program crash
PID:4492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4148 -s 4562⤵
- Program crash
PID:4504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4148 -ip 41481⤵PID:3516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 4148 -ip 41481⤵PID:844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD5b77750e2cc3aebb496589f149004d73c
SHA1b3122572e44a4d83e138f31a6b1c3ded2b07ea13
SHA256dc0148f5c89bd34eb11a87eb940b0018fd0020f7dc4353ad89d89311023ebac3
SHA5122a2b25c8580ad48b021f9862fdcf9eae09eda72ce32514f3a0099bda958eb1d3d80cbc63c62d2f504bf163378cbc65e2fb310bb2f9f2238f85edb6c26b9a7607
-
Filesize
482KB
MD52228e230da3c69acba17d21614710ed7
SHA1d393023a13d593b78a39ffddf13de02dd4f969d7
SHA256cfa888e64110e06bbe0d79f2664f048d6eee82a2278dff86c21e1ae6bb6b51f5
SHA5123c79c9a56185c2019c844e2b6c731eac268567c6ac962e8e5e316cc0532f971e327c8236e7866ffedb41d001edb5e7d5969b353e270e995c1a5af5db007fa7c4
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63