Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 18:16
Static task
static1
Behavioral task
behavioral1
Sample
1858dd5e996c40a7e75c2c118262917bc9dc7e779e55de52579cd06b40559ddc.exe
Resource
win7-20240903-en
General
-
Target
1858dd5e996c40a7e75c2c118262917bc9dc7e779e55de52579cd06b40559ddc.exe
-
Size
231KB
-
MD5
d2d53693ba630167f3d1689defd2277a
-
SHA1
e652a4df2934ef3187d7e62450b732ba9d35fdf6
-
SHA256
1858dd5e996c40a7e75c2c118262917bc9dc7e779e55de52579cd06b40559ddc
-
SHA512
bb015c508c2462fd2c563893961fa598ffe7b1c67bc587d013b1681fd5d77e8253995e08f9cdf34c0a21ea1e238f5c5091c20ac979c5c95e704728b16913d413
-
SSDEEP
6144:AWgLu75uLPm/xUzXpxpbcpLFWS/nU8VIfsLknImS9:AWgiFgPm/xUNx4LNs8afk3X
Malware Config
Extracted
amadey
3.50
0237fa
http://193.56.146.194
-
install_dir
50c1695437
-
install_file
rovwer.exe
-
strings_key
b6d412dd2efdf33d84e939e52040748f
-
url_paths
/h49vlBP/index.php
Signatures
-
Amadey family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 1858dd5e996c40a7e75c2c118262917bc9dc7e779e55de52579cd06b40559ddc.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation rovwer.exe -
Executes dropped EXE 4 IoCs
pid Process 4700 rovwer.exe 2840 rovwer.exe 2200 rovwer.exe 2468 rovwer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 2076 3304 WerFault.exe 82 4812 2840 WerFault.exe 103 4280 2200 WerFault.exe 109 3012 2468 WerFault.exe 113 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1858dd5e996c40a7e75c2c118262917bc9dc7e779e55de52579cd06b40559ddc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rovwer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4492 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3304 wrote to memory of 4700 3304 1858dd5e996c40a7e75c2c118262917bc9dc7e779e55de52579cd06b40559ddc.exe 83 PID 3304 wrote to memory of 4700 3304 1858dd5e996c40a7e75c2c118262917bc9dc7e779e55de52579cd06b40559ddc.exe 83 PID 3304 wrote to memory of 4700 3304 1858dd5e996c40a7e75c2c118262917bc9dc7e779e55de52579cd06b40559ddc.exe 83 PID 4700 wrote to memory of 4492 4700 rovwer.exe 87 PID 4700 wrote to memory of 4492 4700 rovwer.exe 87 PID 4700 wrote to memory of 4492 4700 rovwer.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\1858dd5e996c40a7e75c2c118262917bc9dc7e779e55de52579cd06b40559ddc.exe"C:\Users\Admin\AppData\Local\Temp\1858dd5e996c40a7e75c2c118262917bc9dc7e779e55de52579cd06b40559ddc.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4492
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3304 -s 11442⤵
- Program crash
PID:2076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3304 -ip 33041⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵
- Executes dropped EXE
PID:2840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 4162⤵
- Program crash
PID:4812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2840 -ip 28401⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵
- Executes dropped EXE
PID:2200 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2200 -s 4242⤵
- Program crash
PID:4280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2200 -ip 22001⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵
- Executes dropped EXE
PID:2468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2468 -s 2162⤵
- Program crash
PID:3012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2468 -ip 24681⤵PID:2148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD58d94f9616b429353dd0c3c62350d6861
SHA16a5a23b8485961fae177b83a265aa029a670994e
SHA25696cdd34fa4cceeefe793e8f032334d0c025b964478c0bc3b1e421cbf732604a5
SHA5124367fef623cf75f3765d7b052cfbda583a67175fbf50eac4f588201636e15b33366b6ddd3855bc5016249909a4cd1999b6ac92f53c2a841c2452c7f8eda98b3f
-
Filesize
231KB
MD5d2d53693ba630167f3d1689defd2277a
SHA1e652a4df2934ef3187d7e62450b732ba9d35fdf6
SHA2561858dd5e996c40a7e75c2c118262917bc9dc7e779e55de52579cd06b40559ddc
SHA512bb015c508c2462fd2c563893961fa598ffe7b1c67bc587d013b1681fd5d77e8253995e08f9cdf34c0a21ea1e238f5c5091c20ac979c5c95e704728b16913d413