Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 10:51
Static task
static1
Behavioral task
behavioral1
Sample
167442cdddc3ad06aa3cd879ebacd81a.exe
Resource
win7-20231215-en
General
-
Target
167442cdddc3ad06aa3cd879ebacd81a.exe
-
Size
317KB
-
MD5
167442cdddc3ad06aa3cd879ebacd81a
-
SHA1
246a74400c573f1035acbc1da4c3776c4d8ad58b
-
SHA256
b812dbe9129d88c1678a30de2ef373f01f7f6077c15b5652acbc18692427c8be
-
SHA512
2b72fedf0e62213a3c926b2bc40f1c8ea72495d05343f20e14a62a40cca9d48a2c64d12d7d23c00462ee4f24f6413b2f91573f76d61cee58445c6ea48b2e6e20
-
SSDEEP
6144:572yjcT7NjWEpGwZKFM8+a+e4cZNvemhN5h9ZnTJkz:cocT7NjEwZA2a+rQNvhhN5h9Za
Malware Config
Extracted
amadey
2.50
http://185.215.113.206
-
install_dir
bd1299733e
-
install_file
rnyuf.exe
-
strings_key
ad15f4a6e80870b6c41345d8514d8ee1
-
url_paths
/k8FppT/index.php
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2324 rnyuf.exe 2076 rnyuf.exe 812 rnyuf.exe -
Loads dropped DLL 2 IoCs
pid Process 1612 167442cdddc3ad06aa3cd879ebacd81a.exe 1612 167442cdddc3ad06aa3cd879ebacd81a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2332 schtasks.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1612 wrote to memory of 2324 1612 167442cdddc3ad06aa3cd879ebacd81a.exe 28 PID 1612 wrote to memory of 2324 1612 167442cdddc3ad06aa3cd879ebacd81a.exe 28 PID 1612 wrote to memory of 2324 1612 167442cdddc3ad06aa3cd879ebacd81a.exe 28 PID 1612 wrote to memory of 2324 1612 167442cdddc3ad06aa3cd879ebacd81a.exe 28 PID 2324 wrote to memory of 2720 2324 rnyuf.exe 30 PID 2324 wrote to memory of 2720 2324 rnyuf.exe 30 PID 2324 wrote to memory of 2720 2324 rnyuf.exe 30 PID 2324 wrote to memory of 2720 2324 rnyuf.exe 30 PID 2324 wrote to memory of 2332 2324 rnyuf.exe 32 PID 2324 wrote to memory of 2332 2324 rnyuf.exe 32 PID 2324 wrote to memory of 2332 2324 rnyuf.exe 32 PID 2324 wrote to memory of 2332 2324 rnyuf.exe 32 PID 2720 wrote to memory of 2592 2720 cmd.exe 33 PID 2720 wrote to memory of 2592 2720 cmd.exe 33 PID 2720 wrote to memory of 2592 2720 cmd.exe 33 PID 2720 wrote to memory of 2592 2720 cmd.exe 33 PID 1352 wrote to memory of 2076 1352 taskeng.exe 38 PID 1352 wrote to memory of 2076 1352 taskeng.exe 38 PID 1352 wrote to memory of 2076 1352 taskeng.exe 38 PID 1352 wrote to memory of 2076 1352 taskeng.exe 38 PID 1352 wrote to memory of 812 1352 taskeng.exe 39 PID 1352 wrote to memory of 812 1352 taskeng.exe 39 PID 1352 wrote to memory of 812 1352 taskeng.exe 39 PID 1352 wrote to memory of 812 1352 taskeng.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\167442cdddc3ad06aa3cd879ebacd81a.exe"C:\Users\Admin\AppData\Local\Temp\167442cdddc3ad06aa3cd879ebacd81a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe"C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\bd1299733e\3⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\bd1299733e\4⤵PID:2592
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rnyuf.exe /TR "C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe" /F3⤵
- Creates scheduled task(s)
PID:2332
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {C4DF8775-9ED2-45EA-8DC3-F5CFDB1B6914} S-1-5-21-1603059206-2004189698-4139800220-1000:AILVMYUM\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exeC:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe2⤵
- Executes dropped EXE
PID:2076
-
-
C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exeC:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe2⤵
- Executes dropped EXE
PID:812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5eccc47df0f3bc4512f34d89bbb871aef
SHA19e94248c36c6a73a51802fab1e8378219964b99a
SHA256fe3bf4b1731bb6f56991ef412e8c5fd43e32d97f97aaa6a8ccb91a771f6b3a4a
SHA5120d73f128085e4ba303482ba3bb979ab6d53aed1d67f97427482d2857261c99f743274ace2fea6960ba0e7312f3df3841a6dede75b3f9b2185f9f03e46921cf0d
-
Filesize
128KB
MD532c57d8f44fd9e70a88265c85d839256
SHA192aeca60abaa1621ff7ff9875a8867e927be0ec0
SHA256c96b3d151c7c97f4dc006161ee02dd520da297a23402bfdeabcc509628aaabda
SHA5125a5534d739ffda9494030d779d5f19281d0a5e69a637c41262069fa2436cc42d8f406fc83814c4f3f538839cfbcc2c0788206c65074ae3d60031ca209beae270
-
Filesize
64KB
MD549da4d97a512ebe8aaf15ff252d1c4bf
SHA18d4a1ece150448179ecda2463f619b08d5da872e
SHA25638b6f70a7a7ea41a883065a34d6694afbc33d37309c18e6e636720320ad7ad21
SHA512a246ee90d9f505ae33163d78a6d00b631812c19f8cf65c4775c303fb11cf80d981b1c24111d5755450c6f00e9b225603239ab4473e69b45b592f2922f966c440
-
Filesize
317KB
MD5167442cdddc3ad06aa3cd879ebacd81a
SHA1246a74400c573f1035acbc1da4c3776c4d8ad58b
SHA256b812dbe9129d88c1678a30de2ef373f01f7f6077c15b5652acbc18692427c8be
SHA5122b72fedf0e62213a3c926b2bc40f1c8ea72495d05343f20e14a62a40cca9d48a2c64d12d7d23c00462ee4f24f6413b2f91573f76d61cee58445c6ea48b2e6e20