Analysis
-
max time kernel
170s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 11:46
Static task
static1
Behavioral task
behavioral1
Sample
bbb5187f0f20cad7fea514455706b922fca707775e7884cd5e8fc798052a1191.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bbb5187f0f20cad7fea514455706b922fca707775e7884cd5e8fc798052a1191.exe
Resource
win10v2004-20220812-en
General
-
Target
bbb5187f0f20cad7fea514455706b922fca707775e7884cd5e8fc798052a1191.exe
-
Size
740KB
-
MD5
9dfde97c1c4405efdd8a5251a616f62d
-
SHA1
5b9fec92714726fa5d2fa88169aaec702ac53516
-
SHA256
bbb5187f0f20cad7fea514455706b922fca707775e7884cd5e8fc798052a1191
-
SHA512
e23a0605deabbfa40943e85f1c6759e9ebe1da3b7c16d75fdd32369f6bc1841b76042e4ad9ad18b48ad03d0edf811a4d94e66f89d0f8619f198c4253ba40047b
-
SSDEEP
12288:YyxUcfH81ctJ32+xC6NOPNWjIZT1XOzmhr8jrQ5/lGsU9kKARBCs4vuQHFo7MY8f:ocectp2+xC6NOPNWjIjOzmhirQ5/lG/7
Malware Config
Signatures
-
Ammyy Admin
Remote admin tool with various capabilities.
-
AmmyyAdmin payload 3 IoCs
resource yara_rule behavioral2/files/0x0006000000022e47-138.dat family_ammyyadmin behavioral2/files/0x0006000000022e47-142.dat family_ammyyadmin behavioral2/files/0x0006000000022e47-145.dat family_ammyyadmin -
FlawedAmmyy RAT
Remote-access trojan based on leaked code for the Ammyy remote admin software.
-
Blocklisted process makes network request 2 IoCs
flow pid Process 18 520 WScript.exe 29 520 WScript.exe -
Executes dropped EXE 2 IoCs
pid Process 4840 System.exe 1520 System.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 388 netsh.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 4128 attrib.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation bbb5187f0f20cad7fea514455706b922fca707775e7884cd5e8fc798052a1191.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation System.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sys = "C:\\Users\\Admin\\AppData\\Roaming\\Win32\\System.exe -nogui" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 3 IoCs
pid Process 3476 timeout.exe 4044 timeout.exe 5068 timeout.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings bbb5187f0f20cad7fea514455706b922fca707775e7884cd5e8fc798052a1191.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings cmd.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4716 wrote to memory of 2764 4716 bbb5187f0f20cad7fea514455706b922fca707775e7884cd5e8fc798052a1191.exe 79 PID 4716 wrote to memory of 2764 4716 bbb5187f0f20cad7fea514455706b922fca707775e7884cd5e8fc798052a1191.exe 79 PID 4716 wrote to memory of 2764 4716 bbb5187f0f20cad7fea514455706b922fca707775e7884cd5e8fc798052a1191.exe 79 PID 2764 wrote to memory of 3560 2764 WScript.exe 80 PID 2764 wrote to memory of 3560 2764 WScript.exe 80 PID 2764 wrote to memory of 3560 2764 WScript.exe 80 PID 3560 wrote to memory of 4128 3560 cmd.exe 82 PID 3560 wrote to memory of 4128 3560 cmd.exe 82 PID 3560 wrote to memory of 4128 3560 cmd.exe 82 PID 3560 wrote to memory of 388 3560 cmd.exe 83 PID 3560 wrote to memory of 388 3560 cmd.exe 83 PID 3560 wrote to memory of 388 3560 cmd.exe 83 PID 3560 wrote to memory of 3304 3560 cmd.exe 84 PID 3560 wrote to memory of 3304 3560 cmd.exe 84 PID 3560 wrote to memory of 3304 3560 cmd.exe 84 PID 3560 wrote to memory of 4840 3560 cmd.exe 85 PID 3560 wrote to memory of 4840 3560 cmd.exe 85 PID 3560 wrote to memory of 4840 3560 cmd.exe 85 PID 3560 wrote to memory of 3476 3560 cmd.exe 86 PID 3560 wrote to memory of 3476 3560 cmd.exe 86 PID 3560 wrote to memory of 3476 3560 cmd.exe 86 PID 3560 wrote to memory of 1520 3560 cmd.exe 87 PID 3560 wrote to memory of 1520 3560 cmd.exe 87 PID 3560 wrote to memory of 1520 3560 cmd.exe 87 PID 3560 wrote to memory of 4044 3560 cmd.exe 88 PID 3560 wrote to memory of 4044 3560 cmd.exe 88 PID 3560 wrote to memory of 4044 3560 cmd.exe 88 PID 3560 wrote to memory of 4920 3560 cmd.exe 90 PID 3560 wrote to memory of 4920 3560 cmd.exe 90 PID 3560 wrote to memory of 4920 3560 cmd.exe 90 PID 3560 wrote to memory of 520 3560 cmd.exe 91 PID 3560 wrote to memory of 520 3560 cmd.exe 91 PID 3560 wrote to memory of 520 3560 cmd.exe 91 PID 3560 wrote to memory of 5068 3560 cmd.exe 92 PID 3560 wrote to memory of 5068 3560 cmd.exe 92 PID 3560 wrote to memory of 5068 3560 cmd.exe 92 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4128 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbb5187f0f20cad7fea514455706b922fca707775e7884cd5e8fc798052a1191.exe"C:\Users\Admin\AppData\Local\Temp\bbb5187f0f20cad7fea514455706b922fca707775e7884cd5e8fc798052a1191.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\i.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\test.bat" "3⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\ProgramData\AMMYY"4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4128
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Allow Example" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\Win32\System.exe"4⤵
- Modifies Windows Firewall
PID:388
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "sys" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Win32\System.exe -nogui" /f4⤵
- Adds Run key to start application
PID:3304
-
-
C:\Users\Admin\AppData\Roaming\Win32\System.exeSystem.exe -nogui4⤵
- Executes dropped EXE
- Checks computer location settings
PID:4840
-
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 8 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:3476
-
-
C:\Users\Admin\AppData\Roaming\Win32\System.exeSystem.exe -outid4⤵
- Executes dropped EXE
PID:1520
-
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 2 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:4044
-
-
C:\Windows\SysWOW64\mode.commode con codepage select=12514⤵PID:4920
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\.vbs"4⤵
- Blocklisted process makes network request
PID:520
-
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 6 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:5068
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
317B
MD5e3b626d1f97503beec5ac9c4541337c0
SHA1815025955a524c38861f7bc72630d760d28e2723
SHA2561cc8233f97fedb1ddb08498145d9eee876fd08943d29dc6bda4deabd37f6d0c4
SHA5128752f5030edece591fbb365ee4089f9a8fd9e36c1505527c7f624a8ca20d034ae2a7447f35444734b621cf15d179c6c2a29b0498950d214f154d6ad9b300e810
-
Filesize
1KB
MD51855f6e51516d65bfe33549a40e23229
SHA1d41e8c65a1d1378753baf748a4523f318b2c6fcd
SHA25683f75f556bd99ce65b95aa2ba526d538e65f39bdfb380de1c6486a087084d572
SHA512b6ac8b77153b570eb072d6b23187d4e0f122cf2c72a5f4dec4d855437f33b027b6ce53c43bf50a1110ab350170b833a8e519e2b37ca1a1e2c6543abd7e9f4851
-
Filesize
708KB
MD59b34adfcf984d89b4a7a0128ea3ea600
SHA1a24e7fc71e9fa491488aab1d1bb04a600821708c
SHA25675985dbf928cf823d5c269020a9dd46c489ef209e642792256aab7220457f57e
SHA5124dcd8b5d000c168e661bb02bad34497fbdcfac9b8e157bf603d69df4c1f5260fe07b7666d3fce1910194971908f00de8bf5ad3f59731cf0e2e7f8e0be32ddb6e
-
Filesize
77B
MD5c0fc978a5efb03779ca8d408d13a39e4
SHA18f49dfc1ae88c140c88cf60399fbee20a90f3d5c
SHA2569dc0dd2285050016a871651b0ec82fc2776ec11993d6b66bb93e0ea986c95290
SHA512de9a16d558897efecd21f4c9151961b5698124a2d010401f9a7a44ae246e1ce4dde408ba0f5bd073650941ac97e6accae526547e9639028aafaa3e190ef23e8d
-
Filesize
317B
MD5476e6370ddc584ebf4fc2aad3de038aa
SHA10ef57d3317c68a230989e6b9ba23794e77061294
SHA256d3da0de4beaaaf89c3341e0e3b1d27990a9496564aceed572cb4d320db40589f
SHA512234627880f735e455bb874e907e748400fb214a6713c10c7a3ad25d922fa789b8793016e07d1678f5cb1163795f8101bb61992fc37dee2e60cecbf1ba8da6d79
-
Filesize
41KB
MD5d4f6d8c0a70a97cd726e297f5ff2b148
SHA1ade8f8dc8d7549bcd61eb73b4ad7ed92b34dcf24
SHA256a5f2f78a7ada708129c8a1af914ca11ae0be8b5c98efff7495b17b10f9b1822f
SHA512ded53f16ea7ed8531955b23b2045de95c79a648d68b21bcee1a2ccd147621aa87d5380b096b5724aef09bb27c6ed77936c693f610f667d2fdb70e533c802cef5
-
Filesize
708KB
MD59b34adfcf984d89b4a7a0128ea3ea600
SHA1a24e7fc71e9fa491488aab1d1bb04a600821708c
SHA25675985dbf928cf823d5c269020a9dd46c489ef209e642792256aab7220457f57e
SHA5124dcd8b5d000c168e661bb02bad34497fbdcfac9b8e157bf603d69df4c1f5260fe07b7666d3fce1910194971908f00de8bf5ad3f59731cf0e2e7f8e0be32ddb6e
-
Filesize
708KB
MD59b34adfcf984d89b4a7a0128ea3ea600
SHA1a24e7fc71e9fa491488aab1d1bb04a600821708c
SHA25675985dbf928cf823d5c269020a9dd46c489ef209e642792256aab7220457f57e
SHA5124dcd8b5d000c168e661bb02bad34497fbdcfac9b8e157bf603d69df4c1f5260fe07b7666d3fce1910194971908f00de8bf5ad3f59731cf0e2e7f8e0be32ddb6e
-
Filesize
85B
MD55247618d018f0f12b2f8f80049241b2d
SHA1561ee0c3e4a1309f21c988d1cd53a41115ea4696
SHA256435b4e2786044b43cbcf721ec6fa47ace3c8d0863273d53e58f59497ad8db700
SHA512f5d9c40f11fa3aae76cb0704e8154813d632180475733b95fda8a8cef9606aadd1c78319465bed1cb837f5f5a713ea4ac70a59c6fed496279d32e332146ad2a4