Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01-09-2024 01:38
Static task
static1
Behavioral task
behavioral1
Sample
bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe
Resource
win10v2004-20240802-en
General
-
Target
bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe
-
Size
1.3MB
-
MD5
046ebd7e0f619f33de609ea3f126b0d3
-
SHA1
37a0b634955eb29f9bc7d3d434838cd729bb7e17
-
SHA256
bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555
-
SHA512
39afa534b862f9faebb4aa1ff4144a7d53f62adfd389531f75bdf10865fe8d846e79b3138ec90f2e9d4eb92a72e7a856f0c7be857a892a54eb2f2503f3030d10
-
SSDEEP
24576:39O/bmU++vQu1TL9yJ5d2m8y7i1HlcoGpJ042jJpUeBk2h:3k/X+75dAyMGDP2dpUYXh
Malware Config
Extracted
amadey
4.41
1176f2
http://185.215.113.19
-
install_dir
417fd29867
-
install_file
ednfoki.exe
-
strings_key
183201dc3defc4394182b4bff63c4065
-
url_paths
/CoreOPT/index.php
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 2804 created 1200 2804 Shipment.pif 21 PID 2804 created 1200 2804 Shipment.pif 21 -
Downloads MZ/PE file
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardTrack.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardTrack.url cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2804 Shipment.pif -
Loads dropped DLL 1 IoCs
pid Process 2244 cmd.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 320 tasklist.exe 3040 tasklist.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\ProjectionAcademy bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe File opened for modification C:\Windows\ChipSeems bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe File opened for modification C:\Windows\LaboratoriesFriend bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe File opened for modification C:\Windows\ConditionSuperintendent bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe File opened for modification C:\Windows\AyePercent bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe File opened for modification C:\Windows\CuDefense bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Shipment.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1760 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 2804 Shipment.pif 2804 Shipment.pif 2804 Shipment.pif 2804 Shipment.pif 2804 Shipment.pif 2804 Shipment.pif 2804 Shipment.pif 2804 Shipment.pif 2804 Shipment.pif 2804 Shipment.pif 2804 Shipment.pif 2804 Shipment.pif 2804 Shipment.pif 2804 Shipment.pif 2804 Shipment.pif -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 320 tasklist.exe Token: SeDebugPrivilege 3040 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2804 Shipment.pif 2804 Shipment.pif 2804 Shipment.pif -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2804 Shipment.pif 2804 Shipment.pif 2804 Shipment.pif -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 1644 wrote to memory of 2244 1644 bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe 30 PID 1644 wrote to memory of 2244 1644 bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe 30 PID 1644 wrote to memory of 2244 1644 bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe 30 PID 1644 wrote to memory of 2244 1644 bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe 30 PID 2244 wrote to memory of 320 2244 cmd.exe 32 PID 2244 wrote to memory of 320 2244 cmd.exe 32 PID 2244 wrote to memory of 320 2244 cmd.exe 32 PID 2244 wrote to memory of 320 2244 cmd.exe 32 PID 2244 wrote to memory of 3012 2244 cmd.exe 33 PID 2244 wrote to memory of 3012 2244 cmd.exe 33 PID 2244 wrote to memory of 3012 2244 cmd.exe 33 PID 2244 wrote to memory of 3012 2244 cmd.exe 33 PID 2244 wrote to memory of 3040 2244 cmd.exe 35 PID 2244 wrote to memory of 3040 2244 cmd.exe 35 PID 2244 wrote to memory of 3040 2244 cmd.exe 35 PID 2244 wrote to memory of 3040 2244 cmd.exe 35 PID 2244 wrote to memory of 2788 2244 cmd.exe 36 PID 2244 wrote to memory of 2788 2244 cmd.exe 36 PID 2244 wrote to memory of 2788 2244 cmd.exe 36 PID 2244 wrote to memory of 2788 2244 cmd.exe 36 PID 2244 wrote to memory of 2644 2244 cmd.exe 37 PID 2244 wrote to memory of 2644 2244 cmd.exe 37 PID 2244 wrote to memory of 2644 2244 cmd.exe 37 PID 2244 wrote to memory of 2644 2244 cmd.exe 37 PID 2244 wrote to memory of 332 2244 cmd.exe 38 PID 2244 wrote to memory of 332 2244 cmd.exe 38 PID 2244 wrote to memory of 332 2244 cmd.exe 38 PID 2244 wrote to memory of 332 2244 cmd.exe 38 PID 2244 wrote to memory of 2232 2244 cmd.exe 39 PID 2244 wrote to memory of 2232 2244 cmd.exe 39 PID 2244 wrote to memory of 2232 2244 cmd.exe 39 PID 2244 wrote to memory of 2232 2244 cmd.exe 39 PID 2244 wrote to memory of 2804 2244 cmd.exe 40 PID 2244 wrote to memory of 2804 2244 cmd.exe 40 PID 2244 wrote to memory of 2804 2244 cmd.exe 40 PID 2244 wrote to memory of 2804 2244 cmd.exe 40 PID 2244 wrote to memory of 1720 2244 cmd.exe 41 PID 2244 wrote to memory of 1720 2244 cmd.exe 41 PID 2244 wrote to memory of 1720 2244 cmd.exe 41 PID 2244 wrote to memory of 1720 2244 cmd.exe 41 PID 2804 wrote to memory of 2632 2804 Shipment.pif 42 PID 2804 wrote to memory of 2632 2804 Shipment.pif 42 PID 2804 wrote to memory of 2632 2804 Shipment.pif 42 PID 2804 wrote to memory of 2632 2804 Shipment.pif 42 PID 2804 wrote to memory of 2712 2804 Shipment.pif 44 PID 2804 wrote to memory of 2712 2804 Shipment.pif 44 PID 2804 wrote to memory of 2712 2804 Shipment.pif 44 PID 2804 wrote to memory of 2712 2804 Shipment.pif 44 PID 2632 wrote to memory of 1760 2632 cmd.exe 46 PID 2632 wrote to memory of 1760 2632 cmd.exe 46 PID 2632 wrote to memory of 1760 2632 cmd.exe 46 PID 2632 wrote to memory of 1760 2632 cmd.exe 46
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe"C:\Users\Admin\AppData\Local\Temp\bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Honda Honda.bat & Honda.bat & exit3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:320
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"4⤵
- System Location Discovery: System Language Discovery
PID:3012
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"4⤵
- System Location Discovery: System Language Discovery
PID:2788
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 5919504⤵
- System Location Discovery: System Language Discovery
PID:2644
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "BachelorRayPotentialBeats" Itsa4⤵
- System Location Discovery: System Language Discovery
PID:332
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Competent + ..\Screw + ..\Whom + ..\Reveal + ..\Provides + ..\Still + ..\Entrepreneurs + ..\Greatest + ..\Corporate + ..\Wireless E4⤵
- System Location Discovery: System Language Discovery
PID:2232
-
-
C:\Users\Admin\AppData\Local\Temp\591950\Shipment.pifShipment.pif E4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2804
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 54⤵
- System Location Discovery: System Language Discovery
PID:1720
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "Statistics" /tr "wscript //B 'C:\Users\Admin\AppData\Local\TrackGuard Technologies\GuardTrack.js'" /sc minute /mo 5 /F2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Statistics" /tr "wscript //B 'C:\Users\Admin\AppData\Local\TrackGuard Technologies\GuardTrack.js'" /sc minute /mo 5 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1760
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardTrack.url" & echo URL="C:\Users\Admin\AppData\Local\TrackGuard Technologies\GuardTrack.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardTrack.url" & exit2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.3MB
MD5cfc1a0b3dde8d2c81750a59a016ab5c4
SHA198874625561529f76b039f3e274be4400aa35d80
SHA2560309d52f0c55715859aab3552dff19bc8529cb48e95576ad3d979b0154390609
SHA512d74335d5a78a4d414bf79dcd13659ef0abad1a02e31aa48bf2087499cd29e1a7907a87339521a3483db3d9458df29c09b7032339d8f83bc651149c9e0c558248
-
Filesize
72KB
MD5174dfc0a4ecd5c41d7fc635e7aac9646
SHA18d194d106d6339c61e2ab50b967468812c381764
SHA256e0c5a9e8b1690d5c923fb1ae4a74ae89fee16ed4bfee3fee9a706aa3c147e352
SHA5126aa81d0530a84966239a0325a06c4701051e4895eaa581bf7032be24aaff3f395166c30dc88045b8369dec89028c411f26556ca8e922e72123c81f47dd07e1a7
-
Filesize
773KB
MD56a22704ae494645ca19955de0cb879bc
SHA1acc40b89422c32563656441519df5d2199772398
SHA256f4e8beb419142c0b8152cd8028b95a877b938a1f400c610dee9e4139484385d6
SHA5123852d5e7d29be2b89008c9a970d4770a5d4599d6f75b4927fb56ca12fdc7ba5db0d2a6425786ec71a57a86342fcfc669e6cfb724683922feb5175dd369a5d687
-
Filesize
85KB
MD5d79ddda7e49b51bb69f59808170a5e63
SHA1b791857ae7b920d50f2fc97f0895f289c6a9e8bd
SHA256609b33673ba3698de21d56bce0a871d9d96269c7d86bc087419610452675a90e
SHA5124f977ba99b3f88d60380f81efc0b74bbe4ae29573e0e8caf0f5899e83f29be895391ff374a0e557b5be4eecd241829a442c92fa72f5dddcb440a45cc4356a157
-
Filesize
65KB
MD557b8ab1323416077ed8bb346dd2daa09
SHA143116dae9716caf4e7f43943a89e357204c842f8
SHA2561a8d43ecf42d62c9f4dfdad24c25136a028760a19cf4fd27336bfbb0962426b9
SHA5121899d8ce43c0e18ff3d7ea833680921a717d098fd2c4f8f5ded7007aa31f9946d6895f65364b17ba7da2f77afa5ef3782eefce562314776bc7fc8b5cb45b1f37
-
Filesize
92KB
MD51c78ead3742c95a2c4df31c8d71e0f1b
SHA1a075cca4d9d8fa5fe3ddbf1f2d6e120208cb5b17
SHA256b25e0f67c38257dbc0ab9a7d6af8870c878211abd4e51b8db52d9c3e2272652d
SHA51209a234d52b31b38a4071078abdc9a976aa58716a7ba9f1832b84966f039b621044eaaa641fdb2c919fe5334902e4dbaa8e3fd19a638583120f881cde218b9112
-
Filesize
98KB
MD5043e35e2330184d548101dfdb638be96
SHA1f73e6f2af1052b4810820c68f9693e90f6a07d6d
SHA2562d081c4a75403c808336cd690598e765d1277cea32e3cea2cb7bc0e62ad35c77
SHA512d764704f01b91644df122c4eff4dba404a46bc436c45f5406509e509213306a0cded57cbbeca20a6b474c656c294a91e2ea16025b267af34f4760fc02a8d69c5
-
Filesize
12KB
MD5cef464062b7e5b404539d0c443917907
SHA101802c968d8917fab13d71bfe4ed62e36e965745
SHA2565c1046ea8e740faaaf01e2818ebf5cea15d398594a26b8bb76e8b3da6dbd1bba
SHA512a5e335a7be3bc40b5dd30e40813bae8cd51761c2bfb8d4e2b6ad067cf8dd429aec85ad70534780de6d8fa8e996f310fb3d73334c83eb6ec92816c497c303e6b5
-
Filesize
868B
MD520ca365e882b4c4a95b110e62f8a4c08
SHA1662e9b589d89de106713f361d8b2536740554785
SHA2562739a9b72a38c08a6385701c6bafeb7fdd7fae8b33ace80732ec934ec8518c6c
SHA5129682a8935932673b2c1c5fda831c5b1e53219dbd74dbf96e483cdec68db6b31a69d714f6257c62a708bf0b6a2773f5f01efc86cb54fcc084341a862ed6e4d6fb
-
Filesize
80KB
MD572dcad57e5699dc20cb41f6ae4acd115
SHA1cb7e6842f24319262605ea2c1bf3a7eae60358af
SHA256945d570376b997851fd74131bcf117aad625341fcb7b756409e7cb711632cb0c
SHA5125f251f25514d5d138d20b308c2c162daf9520dde28f25379d09acaf1f2fc67bcf9a3bfa62a42d83c19febfd28809e82561aa2b19614735037930964d1aa18afd
-
Filesize
74KB
MD5d6a091e43db1334c92a9163fb999aa13
SHA1380674ed8d23c1ec2f9a5f5b0167970b296772a7
SHA2562299a0df735b5c6a171ddd6a1b009756c19ec3bb1383bef34bca8fa7f4a6cf09
SHA5124142fc9995b083bc2d3d9b5c2789ea564117ed0ede14a1aa510e9b32b8fdcd149350ce8069ec168141e720d4ffaa246bc7a4585fdff4466343ca3f4d206719f8
-
Filesize
871KB
MD5ea1cfad1b98da498addad255609d0e5f
SHA114fa7e96806624330a8899b215550122aeb94c91
SHA256da224ea0c81fd05189621037f4f0b856f47dd1fb0841d4142395f638da7eb802
SHA512ede7fa0fc6922366dd7319bdc0a00af36b39d506ee246a18d66641374a04727318abdc8832944995c4374487515b38017a081ffbfa17f566b1c83fac59e39442
-
Filesize
68KB
MD55fc7641883018edbf0ead49af5ec3cbc
SHA1b021e03764aa36d5b5176ab9dbd825001d9797c8
SHA256419e973c6e735bba8b60704a962e0b79d285e7a09cb317aefab1ed001a1bf344
SHA512698c1ee8137077116160e8958daabed29da1bfc2c9ce9795a5242fbd8a61fd2d425aa5722542d60f8df15c2af19a3ecb4a7d3628c9fdbf40f46a37769647eade
-
Filesize
82KB
MD55737221e4786a16db1d00b526a889913
SHA1b44ef92d0f12e91e236f96359fa3667c773703ab
SHA256743304691772b7f4b1254b7ec4defe408abd5380c260906ff5d51018cc51c7f4
SHA5120b3219ff89bd5f80aa83682c6193c8f540058262231f343ab11ebccb7849cf45b1b2850494150522479735304cd255e4bc25c1bd76a42f7482e43a3f60d000ef
-
Filesize
66KB
MD5cf18a7ed11645523addbd2fbb31b014d
SHA109caf4ed6b6822e838d3512ce5a75e4125192c5f
SHA25627dbf0e6f006ae0f7fa94cd33287e7f3ab85e1fa637636eff8e94eb649e45990
SHA512f1cfc3fbaccfcd199b99ac647a2a0f76a05a7db1b655fa2e9de44def1630bebbfdbbd814225664f2d7d7015ff73b87c02242bec5105460459694f03e836f0d56
-
Filesize
63KB
MD5df9a85af5771ea736a104b6e3eb86f0b
SHA1319cb80eed888d089ab5b6944adbcbe89c3195eb
SHA256cee5172f67cacbc90062c13713a08561b6984cb6c3c98663b7e541445b2fd492
SHA5128e7aedbe38bedf9a0c167f778eb7678b6ad73f56e1f1196eaf771c01b8d6cd2a99ff015190efcf3f7e340979e501172d2d606e3e3b9ae53873ab9244aaf10eb9
-
Filesize
872KB
MD518ce19b57f43ce0a5af149c96aecc685
SHA11bd5ca29fc35fc8ac346f23b155337c5b28bbc36
SHA256d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd
SHA512a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558