Overview
overview
8Static
static
8FateInjector.exe
windows7_x64
1FateInjector.exe
windows10_x64
1Ambrosial ...21.exe
windows7_x64
8Ambrosial ...21.exe
windows10_x64
8Ambrosial.exe
windows7_x64
4Ambrosial.exe
windows10_x64
7Release_Ve...on.dll
windows7_x64
1Release_Ve...on.dll
windows10_x64
3BadManPublic.dll
windows7_x64
1BadManPublic.dll
windows10_x64
1HorionInjector.exe
windows7_x64
8HorionInjector.exe
windows10_x64
8MetroSet UI.dll
windows7_x64
1MetroSet UI.dll
windows10_x64
1Newtonsoft.Json.dll
windows7_x64
1Newtonsoft.Json.dll
windows10_x64
1System.Run...fe.dll
windows7_x64
1System.Run...fe.dll
windows10_x64
1ure tyjk5_...]_.exe
windows7_x64
1ure tyjk5_...]_.exe
windows10_x64
1Coffee (1).exe
windows7_x64
1Coffee (1).exe
windows10_x64
1Coffee 1.16.220.exe
windows7_x64
1Coffee 1.16.220.exe
windows10_x64
1Coffee NOT...ON.exe
windows7_x64
1Coffee NOT...ON.exe
windows10_x64
1Fate.Client.dll
windows7_x64
3Fate.Client.dll
windows10_x64
3FateInjector.exe
windows7_x64
1FateInjector.exe
windows10_x64
1Fate.Client.dll
windows7_x64
3Fate.Client.dll
windows10_x64
1Analysis
-
max time kernel
122s -
max time network
142s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
17-11-2021 16:43
Static task
static1
Behavioral task
behavioral1
Sample
FateInjector.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
FateInjector.exe
Resource
win10-en-20211104
Behavioral task
behavioral3
Sample
Ambrosial 1.16.221.exe
Resource
win7-en-20211104
Behavioral task
behavioral4
Sample
Ambrosial 1.16.221.exe
Resource
win10-en-20211014
Behavioral task
behavioral5
Sample
Ambrosial.exe
Resource
win7-en-20211104
Behavioral task
behavioral6
Sample
Ambrosial.exe
Resource
win10-en-20211014
Behavioral task
behavioral7
Sample
Release_Version/version.dll
Resource
win7-en-20211104
Behavioral task
behavioral8
Sample
Release_Version/version.dll
Resource
win10-en-20211104
Behavioral task
behavioral9
Sample
BadManPublic.dll
Resource
win7-en-20211014
Behavioral task
behavioral10
Sample
BadManPublic.dll
Resource
win10-en-20211104
Behavioral task
behavioral11
Sample
HorionInjector.exe
Resource
win7-en-20211014
Behavioral task
behavioral12
Sample
HorionInjector.exe
Resource
win10-en-20211104
Behavioral task
behavioral13
Sample
MetroSet UI.dll
Resource
win7-en-20211014
Behavioral task
behavioral14
Sample
MetroSet UI.dll
Resource
win10-en-20211104
Behavioral task
behavioral15
Sample
Newtonsoft.Json.dll
Resource
win7-en-20211104
Behavioral task
behavioral16
Sample
Newtonsoft.Json.dll
Resource
win10-en-20211014
Behavioral task
behavioral17
Sample
System.Runtime.CompilerServices.Unsafe.dll
Resource
win7-en-20211104
Behavioral task
behavioral18
Sample
System.Runtime.CompilerServices.Unsafe.dll
Resource
win10-en-20211014
Behavioral task
behavioral19
Sample
ure tyjk5_[unknowncheats.me]_.exe
Resource
win7-en-20211104
Behavioral task
behavioral20
Sample
ure tyjk5_[unknowncheats.me]_.exe
Resource
win10-en-20211014
Behavioral task
behavioral21
Sample
Coffee (1).exe
Resource
win7-en-20211104
Behavioral task
behavioral22
Sample
Coffee (1).exe
Resource
win10-en-20211104
Behavioral task
behavioral23
Sample
Coffee 1.16.220.exe
Resource
win7-en-20211014
Behavioral task
behavioral24
Sample
Coffee 1.16.220.exe
Resource
win10-en-20211104
Behavioral task
behavioral25
Sample
Coffee NOT SURE VERSION.exe
Resource
win7-en-20211014
Behavioral task
behavioral26
Sample
Coffee NOT SURE VERSION.exe
Resource
win10-en-20211104
Behavioral task
behavioral27
Sample
Fate.Client.dll
Resource
win7-en-20211014
Behavioral task
behavioral28
Sample
Fate.Client.dll
Resource
win10-en-20211104
Behavioral task
behavioral29
Sample
FateInjector.exe
Resource
win7-en-20211104
Behavioral task
behavioral30
Sample
FateInjector.exe
Resource
win10-en-20211014
Behavioral task
behavioral31
Sample
Fate.Client.dll
Resource
win7-en-20211104
Behavioral task
behavioral32
Sample
Fate.Client.dll
Resource
win10-en-20211014
General
-
Target
Ambrosial.exe
-
Size
15.9MB
-
MD5
e3635a875aa0817f0e29544ad9ff84b5
-
SHA1
fd65adfd5be0391790442dc1b4d21b7ee4be271a
-
SHA256
b9c94c4a6dca1b5a42b05e4814838a9281768ba9267803a554c23b68c0665b0f
-
SHA512
132ee0718115097a6b9afc2368bf652d8b04207a6822a9a9e1900bc2921d3b8de384a40eec326e1662bfd7216b29cbe85ceeb8a7d49fe8ed293c4360b8115f0a
Malware Config
Signatures
-
Drops file in Windows directory 2 IoCs
Processes:
Ambrosial.exedescription ioc process File created C:\Windows\Fonts\Azonix.otf Ambrosial.exe File opened for modification C:\Windows\Fonts\Azonix.otf Ambrosial.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1116 1076 WerFault.exe Ambrosial.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
WerFault.exepid process 1116 WerFault.exe 1116 WerFault.exe 1116 WerFault.exe 1116 WerFault.exe 1116 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
WerFault.exepid process 1116 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 1116 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Ambrosial.exedescription pid process target process PID 1076 wrote to memory of 1116 1076 Ambrosial.exe WerFault.exe PID 1076 wrote to memory of 1116 1076 Ambrosial.exe WerFault.exe PID 1076 wrote to memory of 1116 1076 Ambrosial.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ambrosial.exe"C:\Users\Admin\AppData\Local\Temp\Ambrosial.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1076 -s 5922⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1076-55-0x0000000000BE0000-0x0000000000BE1000-memory.dmpFilesize
4KB
-
memory/1076-57-0x0000000000BC0000-0x0000000000BD6000-memory.dmpFilesize
88KB
-
memory/1076-58-0x0000000003160000-0x0000000003161000-memory.dmpFilesize
4KB
-
memory/1076-61-0x0000000003190000-0x0000000003192000-memory.dmpFilesize
8KB
-
memory/1116-59-0x0000000000000000-mapping.dmp
-
memory/1116-60-0x000007FEFC511000-0x000007FEFC513000-memory.dmpFilesize
8KB
-
memory/1116-62-0x0000000001B80000-0x0000000001B81000-memory.dmpFilesize
4KB