Overview
overview
10Static
static
102LRS3ODTLG...JL.exe
windows10-1703-x64
102LRS3ODTLG...JL.exe
windows11-21h2-x64
106G2SZLVHVH...3B.exe
windows10-1703-x64
106G2SZLVHVH...3B.exe
windows11-21h2-x64
106TS3GUANXW9E1KF8.exe
windows10-1703-x64
106TS3GUANXW9E1KF8.exe
windows11-21h2-x64
10G9NB5XSAH0XAAPCN.exe
windows10-1703-x64
6G9NB5XSAH0XAAPCN.exe
windows11-21h2-x64
6PV0HLG9QQ3...NU.exe
windows10-1703-x64
10PV0HLG9QQ3...NU.exe
windows11-21h2-x64
10Protect544cd51a.dll
windows10-1703-x64
1Protect544cd51a.dll
windows11-21h2-x64
1PsExec.exe
windows10-1703-x64
1PsExec.exe
windows11-21h2-x64
1W7W5WFGX1D...7O.exe
windows10-1703-x64
3W7W5WFGX1D...7O.exe
windows11-21h2-x64
6skz3rpen.kc1.exe
windows10-1703-x64
1skz3rpen.kc1.exe
windows11-21h2-x64
1Analysis
-
max time kernel
91s -
max time network
114s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
26-01-2024 19:03
Behavioral task
behavioral1
Sample
2LRS3ODTLG3KRVJA1CCVAQPPFCFWXJL.exe
Resource
win10-20231215-en
Behavioral task
behavioral2
Sample
2LRS3ODTLG3KRVJA1CCVAQPPFCFWXJL.exe
Resource
win11-20231222-en
Behavioral task
behavioral3
Sample
6G2SZLVHVHUJV21JB2FOVQKM701Z63B.exe
Resource
win10-20231215-en
Behavioral task
behavioral4
Sample
6G2SZLVHVHUJV21JB2FOVQKM701Z63B.exe
Resource
win11-20231215-en
Behavioral task
behavioral5
Sample
6TS3GUANXW9E1KF8.exe
Resource
win10-20231220-en
Behavioral task
behavioral6
Sample
6TS3GUANXW9E1KF8.exe
Resource
win11-20231215-en
Behavioral task
behavioral7
Sample
G9NB5XSAH0XAAPCN.exe
Resource
win10-20231215-en
Behavioral task
behavioral8
Sample
G9NB5XSAH0XAAPCN.exe
Resource
win11-20231222-en
Behavioral task
behavioral9
Sample
PV0HLG9QQ3YXXG1AJAMYRYE08NU.exe
Resource
win10-20231220-en
Behavioral task
behavioral10
Sample
PV0HLG9QQ3YXXG1AJAMYRYE08NU.exe
Resource
win11-20231215-en
Behavioral task
behavioral11
Sample
Protect544cd51a.dll
Resource
win10-20231215-en
Behavioral task
behavioral12
Sample
Protect544cd51a.dll
Resource
win11-20231215-en
Behavioral task
behavioral13
Sample
PsExec.exe
Resource
win10-20231215-en
Behavioral task
behavioral14
Sample
PsExec.exe
Resource
win11-20231215-en
Behavioral task
behavioral15
Sample
W7W5WFGX1D82S3EIURREUP57O.exe
Resource
win10-20231215-en
Behavioral task
behavioral16
Sample
W7W5WFGX1D82S3EIURREUP57O.exe
Resource
win11-20231222-en
Behavioral task
behavioral17
Sample
skz3rpen.kc1.exe
Resource
win10-20231215-en
Behavioral task
behavioral18
Sample
skz3rpen.kc1.exe
Resource
win11-20231215-en
General
-
Target
6G2SZLVHVHUJV21JB2FOVQKM701Z63B.exe
-
Size
4.5MB
-
MD5
37bb6dd5e4a0d91aef18c328fee94f89
-
SHA1
72c55abc1527c898153631f1e1233c48440d4ddd
-
SHA256
9571aa429ecf266de879d8a0e207e4240263e6031adc65293fce003fc8316b57
-
SHA512
693a47726692bf6853cc1da84bdb9a72c9fba9167c58ad79cf02df67be4993b9575287de5fe0221349e2be39c83d7d1cec00e4bb445a26ddf1726f9da3feb7da
-
SSDEEP
98304:ZfPdaLQlaZm8vWMTEGky215OS870Bh8/eSKl:ZfP8caA8vWYEGkKS870Bh8/eP
Malware Config
Extracted
amadey
4.15
http://185.172.128.63
-
install_dir
6187fcb526
-
install_file
Dctooux.exe
-
strings_key
cd3b2619c9009c441355ae581d53163e
-
url_paths
/v8sjh3hs8/index.php
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
powershell.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Windows\CurrentVersion\Run\Visual_background_for_video_chatting = "C:\\Users\\Admin\\AppData\\Local\\Visual_background_for_video_chatting\\Visual_background_for_video_chatting.exe" powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
6G2SZLVHVHUJV21JB2FOVQKM701Z63B.exedescription pid Process procid_target PID 4452 set thread context of 4632 4452 6G2SZLVHVHUJV21JB2FOVQKM701Z63B.exe 73 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepid Process 4556 powershell.exe 4556 powershell.exe 4556 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid Process Token: SeDebugPrivilege 4556 powershell.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
6G2SZLVHVHUJV21JB2FOVQKM701Z63B.exedescription pid Process procid_target PID 4452 wrote to memory of 4632 4452 6G2SZLVHVHUJV21JB2FOVQKM701Z63B.exe 73 PID 4452 wrote to memory of 4632 4452 6G2SZLVHVHUJV21JB2FOVQKM701Z63B.exe 73 PID 4452 wrote to memory of 4632 4452 6G2SZLVHVHUJV21JB2FOVQKM701Z63B.exe 73 PID 4452 wrote to memory of 4632 4452 6G2SZLVHVHUJV21JB2FOVQKM701Z63B.exe 73 PID 4452 wrote to memory of 4632 4452 6G2SZLVHVHUJV21JB2FOVQKM701Z63B.exe 73 PID 4452 wrote to memory of 4632 4452 6G2SZLVHVHUJV21JB2FOVQKM701Z63B.exe 73 PID 4452 wrote to memory of 4632 4452 6G2SZLVHVHUJV21JB2FOVQKM701Z63B.exe 73 PID 4452 wrote to memory of 4632 4452 6G2SZLVHVHUJV21JB2FOVQKM701Z63B.exe 73 PID 4452 wrote to memory of 4632 4452 6G2SZLVHVHUJV21JB2FOVQKM701Z63B.exe 73 PID 4452 wrote to memory of 4632 4452 6G2SZLVHVHUJV21JB2FOVQKM701Z63B.exe 73 PID 4452 wrote to memory of 4556 4452 6G2SZLVHVHUJV21JB2FOVQKM701Z63B.exe 74 PID 4452 wrote to memory of 4556 4452 6G2SZLVHVHUJV21JB2FOVQKM701Z63B.exe 74 PID 4452 wrote to memory of 4556 4452 6G2SZLVHVHUJV21JB2FOVQKM701Z63B.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\6G2SZLVHVHUJV21JB2FOVQKM701Z63B.exe"C:\Users\Admin\AppData\Local\Temp\6G2SZLVHVHUJV21JB2FOVQKM701Z63B.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe2⤵PID:4632
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Visual_background_for_video_chatting';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Visual_background_for_video_chatting' -Value '"C:\Users\Admin\AppData\Local\Visual_background_for_video_chatting\Visual_background_for_video_chatting.exe"' -PropertyType 'String'2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a