Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2024 05:23
Static task
static1
Behavioral task
behavioral1
Sample
e0dfb50d544ec355cd56374677e97e1e.exe
Resource
win7-20240221-en
General
-
Target
e0dfb50d544ec355cd56374677e97e1e.exe
-
Size
4.1MB
-
MD5
e0dfb50d544ec355cd56374677e97e1e
-
SHA1
c4cb9fa8cdfab22b77c9c84cbb353c37edfd58d6
-
SHA256
0aca64d7066e48d14f232f01d55d128b875b2de0a29f1e7fee7e980e5a5a9a53
-
SHA512
016308415cb45a702756a27bd37dab1fda9d57924896ac37e12ac77dd0c09e240ee5de90c5dd092174d34fbcf1289fe5617b0b0297b0f09fd5a8bbe94553a225
-
SSDEEP
98304:JbnQlG+e2f0tl5t/+VO9ql3+Mmw2m7c57giraEkq1AIcO:JbQl3mtR/tc+MYQdIb
Malware Config
Extracted
amadey
2.31
-
install_dir
8a643770bf
-
install_file
drbux.exe
-
strings_key
a4b4e846f6cf1a081d182d6cd3bf1ee7
-
url_paths
/hfV3vDtt/index.php
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
e0dfb50d544ec355cd56374677e97e1e.exedrbux.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation e0dfb50d544ec355cd56374677e97e1e.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation drbux.exe -
Executes dropped EXE 3 IoCs
Processes:
drbux.exedrbux.exedrbux.exepid process 4736 drbux.exe 3944 drbux.exe 3384 drbux.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
e0dfb50d544ec355cd56374677e97e1e.exedrbux.execmd.exedescription pid process target process PID 2044 wrote to memory of 4736 2044 e0dfb50d544ec355cd56374677e97e1e.exe drbux.exe PID 2044 wrote to memory of 4736 2044 e0dfb50d544ec355cd56374677e97e1e.exe drbux.exe PID 2044 wrote to memory of 4736 2044 e0dfb50d544ec355cd56374677e97e1e.exe drbux.exe PID 4736 wrote to memory of 1908 4736 drbux.exe cmd.exe PID 4736 wrote to memory of 1908 4736 drbux.exe cmd.exe PID 4736 wrote to memory of 1908 4736 drbux.exe cmd.exe PID 4736 wrote to memory of 2520 4736 drbux.exe schtasks.exe PID 4736 wrote to memory of 2520 4736 drbux.exe schtasks.exe PID 4736 wrote to memory of 2520 4736 drbux.exe schtasks.exe PID 1908 wrote to memory of 3776 1908 cmd.exe reg.exe PID 1908 wrote to memory of 3776 1908 cmd.exe reg.exe PID 1908 wrote to memory of 3776 1908 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0dfb50d544ec355cd56374677e97e1e.exe"C:\Users\Admin\AppData\Local\Temp\e0dfb50d544ec355cd56374677e97e1e.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\8a643770bf\drbux.exe"C:\Users\Admin\AppData\Local\Temp\8a643770bf\drbux.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\8a643770bf\3⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\8a643770bf\4⤵PID:3776
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN drbux.exe /TR "C:\Users\Admin\AppData\Local\Temp\8a643770bf\drbux.exe" /F3⤵
- Creates scheduled task(s)
PID:2520
-
-
-
C:\Users\Admin\AppData\Local\Temp\8a643770bf\drbux.exeC:\Users\Admin\AppData\Local\Temp\8a643770bf\drbux.exe1⤵
- Executes dropped EXE
PID:3944
-
C:\Users\Admin\AppData\Local\Temp\8a643770bf\drbux.exeC:\Users\Admin\AppData\Local\Temp\8a643770bf\drbux.exe1⤵
- Executes dropped EXE
PID:3384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD56fb78257fafc2d4f2e3cbe8456d98502
SHA13000c69f4ece07cef80241dcde48b32f74f37f7d
SHA256dd0de0c8be5548751d36fa7a292fc9f6fcd851482270c0bb35d13ab95001e552
SHA5126bdb92b7d9f9bc9d0cc90e7ecff2e5c126ac6383a34818b74ce2675d248400617b92b212270f2dddd234a9bb1c931902af9602fcca053af48b590290874a1dab
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
4.1MB
MD5e0dfb50d544ec355cd56374677e97e1e
SHA1c4cb9fa8cdfab22b77c9c84cbb353c37edfd58d6
SHA2560aca64d7066e48d14f232f01d55d128b875b2de0a29f1e7fee7e980e5a5a9a53
SHA512016308415cb45a702756a27bd37dab1fda9d57924896ac37e12ac77dd0c09e240ee5de90c5dd092174d34fbcf1289fe5617b0b0297b0f09fd5a8bbe94553a225
-
Filesize
2.3MB
MD507380d660b7eb00c7fdac1b6413c78f6
SHA1e4bcb2deaae674329df93bc518f304a5f57b2feb
SHA256408c3ab62ba8c4dbb5efa16e3081f9b77a6bbd08b346223dde1882691973d654
SHA512fc06f11f3e9c684b8d9818bc02f96ff4467ff764165ed2e3fe00f7f39301384648a7595a2ff3773ea706dc4db9228fe559c35ed1f134a83eb55ed1a4c437b5a2