Analysis
-
max time kernel
1s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 14:31
Static task
static1
Behavioral task
behavioral1
Sample
1b7bea48afdc1505a415847495c9f242.exe
Resource
win7-20231215-en
General
-
Target
1b7bea48afdc1505a415847495c9f242.exe
-
Size
322KB
-
MD5
1b7bea48afdc1505a415847495c9f242
-
SHA1
63e907076b1d7abc88c4ed47b2c39e7f0541671e
-
SHA256
d24a79e9dc77ef3602b64baf9ca453761ec86a32de4bf43aec7b80018bf393b6
-
SHA512
c2dea07b4d6bcbb86bdd9bc2cc8cbe58e713573f7495ae2166c6a71d692159f610b610fc482710767526b0e83062aebc26088967039e6c5390abdb6eb6da86db
-
SSDEEP
6144:vk3xGtaKlclY5g7TW+38Aarti7CJ6NYCoPOXLBu/J7CzV:+xGtaOcl/7b38AaZL6NGuEB7aV
Malware Config
Extracted
amadey
2.50
http://185.215.113.206
-
install_dir
bd1299733e
-
install_file
rnyuf.exe
-
strings_key
ad15f4a6e80870b6c41345d8514d8ee1
-
url_paths
/k8FppT/index.php
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2668 rnyuf.exe -
Loads dropped DLL 2 IoCs
pid Process 816 1b7bea48afdc1505a415847495c9f242.exe 816 1b7bea48afdc1505a415847495c9f242.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2928 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 816 wrote to memory of 2668 816 1b7bea48afdc1505a415847495c9f242.exe 28 PID 816 wrote to memory of 2668 816 1b7bea48afdc1505a415847495c9f242.exe 28 PID 816 wrote to memory of 2668 816 1b7bea48afdc1505a415847495c9f242.exe 28 PID 816 wrote to memory of 2668 816 1b7bea48afdc1505a415847495c9f242.exe 28 PID 2668 wrote to memory of 2804 2668 rnyuf.exe 32 PID 2668 wrote to memory of 2804 2668 rnyuf.exe 32 PID 2668 wrote to memory of 2804 2668 rnyuf.exe 32 PID 2668 wrote to memory of 2804 2668 rnyuf.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b7bea48afdc1505a415847495c9f242.exe"C:\Users\Admin\AppData\Local\Temp\1b7bea48afdc1505a415847495c9f242.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe"C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rnyuf.exe /TR "C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe" /F3⤵
- Creates scheduled task(s)
PID:2928
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\bd1299733e\3⤵PID:2804
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\bd1299733e\4⤵PID:2608
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {7A203F07-280B-4FC9-B871-AB75D47EE0F1} S-1-5-21-3818056530-936619650-3554021955-1000:SFVRQGEO\Admin:Interactive:[1]1⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exeC:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe2⤵PID:2472
-
-
C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exeC:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe2⤵PID:600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5fabb5f4c1de02d1cb8a0f20adf18ca80
SHA1337616b92aefcf104e104b01f8faaa8e6824e3ab
SHA256fc20d069cf1d19d47c79d6718a8db710959f2afd585aaed6ca3542aefe857589
SHA512b8d329aa8026e9dce36c139ef88490b993b547f0107b417fb4d87d74edea64915805a7f177ee1269f2121b5d2c2251116d634dae72928bd7a9df94a588eedca8
-
Filesize
322KB
MD51b7bea48afdc1505a415847495c9f242
SHA163e907076b1d7abc88c4ed47b2c39e7f0541671e
SHA256d24a79e9dc77ef3602b64baf9ca453761ec86a32de4bf43aec7b80018bf393b6
SHA512c2dea07b4d6bcbb86bdd9bc2cc8cbe58e713573f7495ae2166c6a71d692159f610b610fc482710767526b0e83062aebc26088967039e6c5390abdb6eb6da86db
-
Filesize
93KB
MD526702d4e7badc138403385a3ec5067cf
SHA1cd21966f959fcf594428c418784e8d0cc7098f33
SHA25690d4ca0f9ee998ef503045c06bd24a09c5dda51f1fbcf57401971e922f346392
SHA5122b98b8a2ce4b2ddb48506ffaf5ac3a36e0a0f0ab072a7a976bd38f4d34c3e68b5fdccdd8a4754a33b64d7e2d93144210fa6b848c9a366bb076dc391500e581b5