Analysis

  • max time kernel
    124s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2022, 11:46

General

  • Target

    bbb5187f0f20cad7fea514455706b922fca707775e7884cd5e8fc798052a1191.exe

  • Size

    740KB

  • MD5

    9dfde97c1c4405efdd8a5251a616f62d

  • SHA1

    5b9fec92714726fa5d2fa88169aaec702ac53516

  • SHA256

    bbb5187f0f20cad7fea514455706b922fca707775e7884cd5e8fc798052a1191

  • SHA512

    e23a0605deabbfa40943e85f1c6759e9ebe1da3b7c16d75fdd32369f6bc1841b76042e4ad9ad18b48ad03d0edf811a4d94e66f89d0f8619f198c4253ba40047b

  • SSDEEP

    12288:YyxUcfH81ctJ32+xC6NOPNWjIZT1XOzmhr8jrQ5/lGsU9kKARBCs4vuQHFo7MY8f:ocectp2+xC6NOPNWjIjOzmhirQ5/lG/7

Malware Config

Signatures

  • Ammyy Admin

    Remote admin tool with various capabilities.

  • AmmyyAdmin payload 6 IoCs
  • FlawedAmmyy RAT

    Remote-access trojan based on leaked code for the Ammyy remote admin software.

  • Blocklisted process makes network request 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Sets file to hidden 1 TTPs 1 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Delays execution with timeout.exe 3 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bbb5187f0f20cad7fea514455706b922fca707775e7884cd5e8fc798052a1191.exe
    "C:\Users\Admin\AppData\Local\Temp\bbb5187f0f20cad7fea514455706b922fca707775e7884cd5e8fc798052a1191.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1816
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\i.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2008
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\test.bat" "
        3⤵
        • Deletes itself
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1988
        • C:\Windows\SysWOW64\attrib.exe
          attrib +s +h "C:\ProgramData\AMMYY"
          4⤵
          • Sets file to hidden
          • Views/modifies file attributes
          PID:1468
        • C:\Windows\SysWOW64\netsh.exe
          netsh advfirewall firewall add rule name="Allow Example" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\Win32\System.exe"
          4⤵
          • Modifies Windows Firewall
          PID:1756
        • C:\Windows\SysWOW64\reg.exe
          reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "sys" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Win32\System.exe -nogui" /f
          4⤵
          • Adds Run key to start application
          PID:820
        • C:\Users\Admin\AppData\Roaming\Win32\System.exe
          System.exe -nogui
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Modifies system certificate store
          PID:1744
        • C:\Windows\SysWOW64\timeout.exe
          TIMEOUT /T 8 /NOBREAK
          4⤵
          • Delays execution with timeout.exe
          PID:1784
        • C:\Users\Admin\AppData\Roaming\Win32\System.exe
          System.exe -outid
          4⤵
          • Executes dropped EXE
          PID:964
        • C:\Windows\SysWOW64\timeout.exe
          TIMEOUT /T 2 /NOBREAK
          4⤵
          • Delays execution with timeout.exe
          PID:768
        • C:\Windows\SysWOW64\mode.com
          mode con codepage select=1251
          4⤵
            PID:1040
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\.vbs"
            4⤵
            • Blocklisted process makes network request
            PID:1512
          • C:\Windows\SysWOW64\timeout.exe
            TIMEOUT /T 6 /NOBREAK
            4⤵
            • Delays execution with timeout.exe
            PID:900

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\AMMYY\settings3.bin

      Filesize

      317B

      MD5

      d1aeca79efc1e96d211ef528abb2f646

      SHA1

      d65b74d19ee4dd426d4a5a966cd081e4146f9508

      SHA256

      ea490b800999e5a5d25e31bd0efd63328d1eadcc626e447d59eff13bfe089f0b

      SHA512

      ecb2781594983c61f7342c17e018041f21e2caa3a9ecc858d0a57ee9f7acbacae9780b6935edc9068949f1ae3c05230a6e185cada8b1d5a3b78abebf29241d0c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      61KB

      MD5

      3dcf580a93972319e82cafbc047d34d5

      SHA1

      8528d2a1363e5de77dc3b1142850e51ead0f4b6b

      SHA256

      40810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1

      SHA512

      98384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b6aa6657a6695579610e2db9d482cb69

      SHA1

      cac5b9a000d9c06760b7658271fa0f3eafdcd295

      SHA256

      4ec4274c265087e32231ba28a7eeed19f4244fcaf65e0265389a93cd9486c2e9

      SHA512

      816fc46a003303a88a352e21a0a11ff0e2199e1070dab087e4433ae03e79cae7827c9da4b7efd85c53c62999b5b4058a51a500e18febcdadff4181308018d6bc

    • C:\Users\Admin\AppData\Local\Temp\.vbs

      Filesize

      1KB

      MD5

      1855f6e51516d65bfe33549a40e23229

      SHA1

      d41e8c65a1d1378753baf748a4523f318b2c6fcd

      SHA256

      83f75f556bd99ce65b95aa2ba526d538e65f39bdfb380de1c6486a087084d572

      SHA512

      b6ac8b77153b570eb072d6b23187d4e0f122cf2c72a5f4dec4d855437f33b027b6ce53c43bf50a1110ab350170b833a8e519e2b37ca1a1e2c6543abd7e9f4851

    • C:\Users\Admin\AppData\Local\Temp\System.exe

      Filesize

      708KB

      MD5

      9b34adfcf984d89b4a7a0128ea3ea600

      SHA1

      a24e7fc71e9fa491488aab1d1bb04a600821708c

      SHA256

      75985dbf928cf823d5c269020a9dd46c489ef209e642792256aab7220457f57e

      SHA512

      4dcd8b5d000c168e661bb02bad34497fbdcfac9b8e157bf603d69df4c1f5260fe07b7666d3fce1910194971908f00de8bf5ad3f59731cf0e2e7f8e0be32ddb6e

    • C:\Users\Admin\AppData\Local\Temp\i.vbs

      Filesize

      77B

      MD5

      c0fc978a5efb03779ca8d408d13a39e4

      SHA1

      8f49dfc1ae88c140c88cf60399fbee20a90f3d5c

      SHA256

      9dc0dd2285050016a871651b0ec82fc2776ec11993d6b66bb93e0ea986c95290

      SHA512

      de9a16d558897efecd21f4c9151961b5698124a2d010401f9a7a44ae246e1ce4dde408ba0f5bd073650941ac97e6accae526547e9639028aafaa3e190ef23e8d

    • C:\Users\Admin\AppData\Local\Temp\settings3.bin

      Filesize

      317B

      MD5

      476e6370ddc584ebf4fc2aad3de038aa

      SHA1

      0ef57d3317c68a230989e6b9ba23794e77061294

      SHA256

      d3da0de4beaaaf89c3341e0e3b1d27990a9496564aceed572cb4d320db40589f

      SHA512

      234627880f735e455bb874e907e748400fb214a6713c10c7a3ad25d922fa789b8793016e07d1678f5cb1163795f8101bb61992fc37dee2e60cecbf1ba8da6d79

    • C:\Users\Admin\AppData\Local\Temp\test.bat

      Filesize

      41KB

      MD5

      d4f6d8c0a70a97cd726e297f5ff2b148

      SHA1

      ade8f8dc8d7549bcd61eb73b4ad7ed92b34dcf24

      SHA256

      a5f2f78a7ada708129c8a1af914ca11ae0be8b5c98efff7495b17b10f9b1822f

      SHA512

      ded53f16ea7ed8531955b23b2045de95c79a648d68b21bcee1a2ccd147621aa87d5380b096b5724aef09bb27c6ed77936c693f610f667d2fdb70e533c802cef5

    • C:\Users\Admin\AppData\Roaming\Win32\System.exe

      Filesize

      708KB

      MD5

      9b34adfcf984d89b4a7a0128ea3ea600

      SHA1

      a24e7fc71e9fa491488aab1d1bb04a600821708c

      SHA256

      75985dbf928cf823d5c269020a9dd46c489ef209e642792256aab7220457f57e

      SHA512

      4dcd8b5d000c168e661bb02bad34497fbdcfac9b8e157bf603d69df4c1f5260fe07b7666d3fce1910194971908f00de8bf5ad3f59731cf0e2e7f8e0be32ddb6e

    • C:\Users\Admin\AppData\Roaming\Win32\System.exe

      Filesize

      708KB

      MD5

      9b34adfcf984d89b4a7a0128ea3ea600

      SHA1

      a24e7fc71e9fa491488aab1d1bb04a600821708c

      SHA256

      75985dbf928cf823d5c269020a9dd46c489ef209e642792256aab7220457f57e

      SHA512

      4dcd8b5d000c168e661bb02bad34497fbdcfac9b8e157bf603d69df4c1f5260fe07b7666d3fce1910194971908f00de8bf5ad3f59731cf0e2e7f8e0be32ddb6e

    • C:\Users\Admin\AppData\Roaming\Win32\sys32_nt.log

      Filesize

      85B

      MD5

      163c7e0b92d9a0a714a08e32b330aa6d

      SHA1

      dac967a465b6deac25140aed2f8e756ad6aff0a2

      SHA256

      bae9e61e0662802e5a4f635772227a264aefaca8aba2ee83cd3bbd05bdfe3368

      SHA512

      ea6139b0d46240fd26d91f58fea0b3cf498e357c0a15154a83b3ee3d6d7fa2322a64f587be54b16ce1fb0a3519d7dc8d0464ee9322de9077dfa1a400cd78aba7

    • \Users\Admin\AppData\Roaming\Win32\System.exe

      Filesize

      708KB

      MD5

      9b34adfcf984d89b4a7a0128ea3ea600

      SHA1

      a24e7fc71e9fa491488aab1d1bb04a600821708c

      SHA256

      75985dbf928cf823d5c269020a9dd46c489ef209e642792256aab7220457f57e

      SHA512

      4dcd8b5d000c168e661bb02bad34497fbdcfac9b8e157bf603d69df4c1f5260fe07b7666d3fce1910194971908f00de8bf5ad3f59731cf0e2e7f8e0be32ddb6e

    • \Users\Admin\AppData\Roaming\Win32\System.exe

      Filesize

      708KB

      MD5

      9b34adfcf984d89b4a7a0128ea3ea600

      SHA1

      a24e7fc71e9fa491488aab1d1bb04a600821708c

      SHA256

      75985dbf928cf823d5c269020a9dd46c489ef209e642792256aab7220457f57e

      SHA512

      4dcd8b5d000c168e661bb02bad34497fbdcfac9b8e157bf603d69df4c1f5260fe07b7666d3fce1910194971908f00de8bf5ad3f59731cf0e2e7f8e0be32ddb6e

    • \Users\Admin\AppData\Roaming\Win32\System.exe

      Filesize

      708KB

      MD5

      9b34adfcf984d89b4a7a0128ea3ea600

      SHA1

      a24e7fc71e9fa491488aab1d1bb04a600821708c

      SHA256

      75985dbf928cf823d5c269020a9dd46c489ef209e642792256aab7220457f57e

      SHA512

      4dcd8b5d000c168e661bb02bad34497fbdcfac9b8e157bf603d69df4c1f5260fe07b7666d3fce1910194971908f00de8bf5ad3f59731cf0e2e7f8e0be32ddb6e

    • memory/1816-54-0x0000000075AC1000-0x0000000075AC3000-memory.dmp

      Filesize

      8KB