Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 02:17
Static task
static1
Behavioral task
behavioral1
Sample
c534aca3cc4244dc3ae7bee791ee85ae.exe
Resource
win7-20231215-en
General
-
Target
c534aca3cc4244dc3ae7bee791ee85ae.exe
-
Size
482KB
-
MD5
c534aca3cc4244dc3ae7bee791ee85ae
-
SHA1
58dd83c3e3b5b88d51e7392a704a08b0eb2cdfd5
-
SHA256
08e893cc397572a8f7d3871e0037027556acf986455fdace296d8d618b7a651a
-
SHA512
16d631f6b16a0e26a6ee9446db7448eeb34a5de48f2d53fab0538a4daceb4266f4459e1629e26291cba5bac9d83d2c6d289ab628d535005a7bdf54a5d51698d1
-
SSDEEP
12288:M+dGf/lHLV+p1wiywrLkvcbjv69D51DMCafSMV:ddUdkgQLkgK51DNaf
Malware Config
Extracted
amadey
4.14
http://anfesq.com
http://cbinr.com
http://rimakc.ru
-
install_dir
68fd3d7ade
-
install_file
Utsysc.exe
-
strings_key
27ec7fd6f50f63b8af0c1d3deefcc8fe
-
url_paths
/forum/index.php
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 2460 Utsysc.exe 240 Utsysc.exe 1084 Utsysc.exe 1620 Utsysc.exe -
Loads dropped DLL 2 IoCs
pid Process 776 c534aca3cc4244dc3ae7bee791ee85ae.exe 776 c534aca3cc4244dc3ae7bee791ee85ae.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2784 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 776 c534aca3cc4244dc3ae7bee791ee85ae.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 776 wrote to memory of 2460 776 c534aca3cc4244dc3ae7bee791ee85ae.exe 28 PID 776 wrote to memory of 2460 776 c534aca3cc4244dc3ae7bee791ee85ae.exe 28 PID 776 wrote to memory of 2460 776 c534aca3cc4244dc3ae7bee791ee85ae.exe 28 PID 776 wrote to memory of 2460 776 c534aca3cc4244dc3ae7bee791ee85ae.exe 28 PID 2460 wrote to memory of 2784 2460 Utsysc.exe 29 PID 2460 wrote to memory of 2784 2460 Utsysc.exe 29 PID 2460 wrote to memory of 2784 2460 Utsysc.exe 29 PID 2460 wrote to memory of 2784 2460 Utsysc.exe 29 PID 1080 wrote to memory of 240 1080 taskeng.exe 33 PID 1080 wrote to memory of 240 1080 taskeng.exe 33 PID 1080 wrote to memory of 240 1080 taskeng.exe 33 PID 1080 wrote to memory of 240 1080 taskeng.exe 33 PID 1080 wrote to memory of 1084 1080 taskeng.exe 36 PID 1080 wrote to memory of 1084 1080 taskeng.exe 36 PID 1080 wrote to memory of 1084 1080 taskeng.exe 36 PID 1080 wrote to memory of 1084 1080 taskeng.exe 36 PID 1080 wrote to memory of 1620 1080 taskeng.exe 37 PID 1080 wrote to memory of 1620 1080 taskeng.exe 37 PID 1080 wrote to memory of 1620 1080 taskeng.exe 37 PID 1080 wrote to memory of 1620 1080 taskeng.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\c534aca3cc4244dc3ae7bee791ee85ae.exe"C:\Users\Admin\AppData\Local\Temp\c534aca3cc4244dc3ae7bee791ee85ae.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe"C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe" /F3⤵
- Creates scheduled task(s)
PID:2784
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {29622D4A-E327-448E-A955-9B6C29E25BC4} S-1-5-21-3427588347-1492276948-3422228430-1000:QVMRJQQO\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe2⤵
- Executes dropped EXE
PID:240
-
-
C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe2⤵
- Executes dropped EXE
PID:1084
-
-
C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe2⤵
- Executes dropped EXE
PID:1620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD5fbf0ff51191d0c5343cb94142aa1ed88
SHA1100966b06d8722adde33c370ebb9272b8f58f05f
SHA25619afae68de89c6c0b375d975dcd85a77946b127ebec91c9ec1d3927cc955206d
SHA512c5183ea989edd0bcff8ef6c75328fbe73ab7df2308c5aaeabde2b61593b5c6a9f9310c933898634d08c538986dc0c32d0836c4f991cfd7c533486d216105c6f1
-
Filesize
482KB
MD5c534aca3cc4244dc3ae7bee791ee85ae
SHA158dd83c3e3b5b88d51e7392a704a08b0eb2cdfd5
SHA25608e893cc397572a8f7d3871e0037027556acf986455fdace296d8d618b7a651a
SHA51216d631f6b16a0e26a6ee9446db7448eeb34a5de48f2d53fab0538a4daceb4266f4459e1629e26291cba5bac9d83d2c6d289ab628d535005a7bdf54a5d51698d1