Analysis

  • max time kernel
    180s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 11:30

General

  • Target

    572a73429f8b673f5b3188cae34f550c8177615004b9bd8f5779ac96af770cb4.exe

  • Size

    279KB

  • MD5

    e22b8a98049d7b829f95f2e50682d5b1

  • SHA1

    11e2abb1d17d91c870fbf7c79473214dc9140e23

  • SHA256

    572a73429f8b673f5b3188cae34f550c8177615004b9bd8f5779ac96af770cb4

  • SHA512

    b3de7056ac5296039c1032c9427dd0d10db5cafd2adfff7918e4f98e9ffc61548414755ba4325a6eb9fc43cded0994da52a5842232e65f3697c9416e085757f8

  • SSDEEP

    6144:lAuinvG8S/i0Pr7O4aUopaYaUkHhSfbr5:lVivGr/i0PreEBH0fbr

Malware Config

Extracted

Family

amadey

Version

3.50

C2

62.204.41.252/nB8cWack3/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\572a73429f8b673f5b3188cae34f550c8177615004b9bd8f5779ac96af770cb4.exe
    "C:\Users\Admin\AppData\Local\Temp\572a73429f8b673f5b3188cae34f550c8177615004b9bd8f5779ac96af770cb4.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:3424
  • C:\Users\Admin\AppData\Local\Temp\1690.exe
    C:\Users\Admin\AppData\Local\Temp\1690.exe
    1⤵
    • Executes dropped EXE
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1008
    • C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
      "C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4932
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:3800
  • C:\Users\Admin\AppData\Local\Temp\84EB.exe
    C:\Users\Admin\AppData\Local\Temp\84EB.exe
    1⤵
    • Executes dropped EXE
    PID:2208
  • C:\Windows\SysWOW64\explorer.exe
    C:\Windows\SysWOW64\explorer.exe
    1⤵
      PID:4004
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe
      1⤵
        PID:3720
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        1⤵
          PID:4204
        • C:\Windows\explorer.exe
          C:\Windows\explorer.exe
          1⤵
            PID:2276
          • C:\Windows\SysWOW64\explorer.exe
            C:\Windows\SysWOW64\explorer.exe
            1⤵
              PID:4216
            • C:\Windows\SysWOW64\explorer.exe
              C:\Windows\SysWOW64\explorer.exe
              1⤵
                PID:608
              • C:\Windows\SysWOW64\explorer.exe
                C:\Windows\SysWOW64\explorer.exe
                1⤵
                  PID:3444
                • C:\Windows\explorer.exe
                  C:\Windows\explorer.exe
                  1⤵
                    PID:3692
                  • C:\Windows\SysWOW64\explorer.exe
                    C:\Windows\SysWOW64\explorer.exe
                    1⤵
                      PID:4544
                    • C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
                      C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
                      1⤵
                      • Executes dropped EXE
                      PID:3516

                    Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\1690.exe

                      Filesize

                      243KB

                      MD5

                      7a962d27153d64ea69753e52e02c9ca4

                      SHA1

                      58cadf3905ee2506927e80a60ee0fb32dab73952

                      SHA256

                      685cff3f47d608b9fbea3cee17309ea0821168ea1e106ca193bed5457a0dbf6a

                      SHA512

                      8bc5033f4fdc3fb5f5e6514fec68b0abe2c82e5ff0d32e9a247c3d04a8e7c95617de4bed54be15dd42d3b9285ac04aaa53269da64d2c6b80c6ed7680e419bb03

                    • C:\Users\Admin\AppData\Local\Temp\1690.exe

                      Filesize

                      243KB

                      MD5

                      7a962d27153d64ea69753e52e02c9ca4

                      SHA1

                      58cadf3905ee2506927e80a60ee0fb32dab73952

                      SHA256

                      685cff3f47d608b9fbea3cee17309ea0821168ea1e106ca193bed5457a0dbf6a

                      SHA512

                      8bc5033f4fdc3fb5f5e6514fec68b0abe2c82e5ff0d32e9a247c3d04a8e7c95617de4bed54be15dd42d3b9285ac04aaa53269da64d2c6b80c6ed7680e419bb03

                    • C:\Users\Admin\AppData\Local\Temp\84EB.exe

                      Filesize

                      4.6MB

                      MD5

                      c6ded8762cdd4b6dfd1786a86dd14527

                      SHA1

                      fad44e357fca7c944fef59f75ecb33f2a0737d53

                      SHA256

                      7b58f4a4d1f500506201a5e4c0f5842351caf8070863999d8166684786ffc0cb

                      SHA512

                      00e2a36bf88283f9c560e9c55e40ac2779922b02cb6dcfb84f3df56ff82f9a779fb1c04f3ad009a5049773d27e8baefa137bd653266461409ec3733483fe38dd

                    • C:\Users\Admin\AppData\Local\Temp\84EB.exe

                      Filesize

                      4.6MB

                      MD5

                      c6ded8762cdd4b6dfd1786a86dd14527

                      SHA1

                      fad44e357fca7c944fef59f75ecb33f2a0737d53

                      SHA256

                      7b58f4a4d1f500506201a5e4c0f5842351caf8070863999d8166684786ffc0cb

                      SHA512

                      00e2a36bf88283f9c560e9c55e40ac2779922b02cb6dcfb84f3df56ff82f9a779fb1c04f3ad009a5049773d27e8baefa137bd653266461409ec3733483fe38dd

                    • C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe

                      Filesize

                      243KB

                      MD5

                      7a962d27153d64ea69753e52e02c9ca4

                      SHA1

                      58cadf3905ee2506927e80a60ee0fb32dab73952

                      SHA256

                      685cff3f47d608b9fbea3cee17309ea0821168ea1e106ca193bed5457a0dbf6a

                      SHA512

                      8bc5033f4fdc3fb5f5e6514fec68b0abe2c82e5ff0d32e9a247c3d04a8e7c95617de4bed54be15dd42d3b9285ac04aaa53269da64d2c6b80c6ed7680e419bb03

                    • C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe

                      Filesize

                      243KB

                      MD5

                      7a962d27153d64ea69753e52e02c9ca4

                      SHA1

                      58cadf3905ee2506927e80a60ee0fb32dab73952

                      SHA256

                      685cff3f47d608b9fbea3cee17309ea0821168ea1e106ca193bed5457a0dbf6a

                      SHA512

                      8bc5033f4fdc3fb5f5e6514fec68b0abe2c82e5ff0d32e9a247c3d04a8e7c95617de4bed54be15dd42d3b9285ac04aaa53269da64d2c6b80c6ed7680e419bb03

                    • C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe

                      Filesize

                      243KB

                      MD5

                      7a962d27153d64ea69753e52e02c9ca4

                      SHA1

                      58cadf3905ee2506927e80a60ee0fb32dab73952

                      SHA256

                      685cff3f47d608b9fbea3cee17309ea0821168ea1e106ca193bed5457a0dbf6a

                      SHA512

                      8bc5033f4fdc3fb5f5e6514fec68b0abe2c82e5ff0d32e9a247c3d04a8e7c95617de4bed54be15dd42d3b9285ac04aaa53269da64d2c6b80c6ed7680e419bb03

                    • memory/608-214-0x0000000000980000-0x0000000000985000-memory.dmp

                      Filesize

                      20KB

                    • memory/608-231-0x0000000000970000-0x0000000000979000-memory.dmp

                      Filesize

                      36KB

                    • memory/608-215-0x0000000000970000-0x0000000000979000-memory.dmp

                      Filesize

                      36KB

                    • memory/1008-199-0x0000000000400000-0x0000000000473000-memory.dmp

                      Filesize

                      460KB

                    • memory/1008-196-0x00000000007C9000-0x00000000007E8000-memory.dmp

                      Filesize

                      124KB

                    • memory/1008-191-0x0000000000400000-0x0000000000473000-memory.dmp

                      Filesize

                      460KB

                    • memory/1008-198-0x0000000000700000-0x000000000073E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1008-165-0x00000000007C9000-0x00000000007E8000-memory.dmp

                      Filesize

                      124KB

                    • memory/1008-162-0x0000000000700000-0x000000000073E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1008-161-0x00000000007C9000-0x00000000007E8000-memory.dmp

                      Filesize

                      124KB

                    • memory/2276-202-0x0000000000770000-0x0000000000776000-memory.dmp

                      Filesize

                      24KB

                    • memory/2276-204-0x0000000000760000-0x000000000076C000-memory.dmp

                      Filesize

                      48KB

                    • memory/2276-228-0x0000000000770000-0x0000000000776000-memory.dmp

                      Filesize

                      24KB

                    • memory/2644-184-0x0000000001300000-0x0000000001310000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-179-0x00000000030C0000-0x00000000030D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-156-0x00000000030F0000-0x0000000003100000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-155-0x00000000030F0000-0x0000000003100000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-154-0x00000000030F0000-0x0000000003100000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-153-0x00000000030D0000-0x00000000030E0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-151-0x00000000030C0000-0x00000000030D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-152-0x00000000030C0000-0x00000000030D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-150-0x00000000030C0000-0x00000000030D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-149-0x00000000030C0000-0x00000000030D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-166-0x00000000030C0000-0x00000000030D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-167-0x00000000030C0000-0x00000000030D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-168-0x00000000030C0000-0x00000000030D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-169-0x00000000030C0000-0x00000000030D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-170-0x00000000030C0000-0x00000000030D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-171-0x00000000030C0000-0x00000000030D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-172-0x00000000030C0000-0x00000000030D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-173-0x00000000030C0000-0x00000000030D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-174-0x00000000030C0000-0x00000000030D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-175-0x00000000030C0000-0x00000000030D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-176-0x00000000030C0000-0x00000000030D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-177-0x00000000030C0000-0x00000000030D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-178-0x00000000030C0000-0x00000000030D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-139-0x00000000030C0000-0x00000000030D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-180-0x00000000030C0000-0x00000000030D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-181-0x00000000030C0000-0x00000000030D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-182-0x00000000030C0000-0x00000000030D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-183-0x0000000001300000-0x0000000001310000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-141-0x00000000030C0000-0x00000000030D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-138-0x00000000030C0000-0x00000000030D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-148-0x00000000030C0000-0x00000000030D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-140-0x00000000030C0000-0x00000000030D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-137-0x00000000030C0000-0x00000000030D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-222-0x0000000001300000-0x0000000001310000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-147-0x00000000030C0000-0x00000000030D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-146-0x00000000030C0000-0x00000000030D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-145-0x00000000030C0000-0x00000000030D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-144-0x00000000030C0000-0x00000000030D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-143-0x00000000030C0000-0x00000000030D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-142-0x00000000030C0000-0x00000000030D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-221-0x0000000001300000-0x0000000001310000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-157-0x00000000030F0000-0x0000000003100000-memory.dmp

                      Filesize

                      64KB

                    • memory/2644-136-0x00000000030C0000-0x00000000030D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/3424-135-0x0000000000400000-0x000000000044C000-memory.dmp

                      Filesize

                      304KB

                    • memory/3424-134-0x0000000000400000-0x000000000044C000-memory.dmp

                      Filesize

                      304KB

                    • memory/3424-133-0x00000000004C0000-0x00000000004C9000-memory.dmp

                      Filesize

                      36KB

                    • memory/3424-132-0x000000000055F000-0x0000000000575000-memory.dmp

                      Filesize

                      88KB

                    • memory/3444-217-0x0000000000400000-0x000000000040B000-memory.dmp

                      Filesize

                      44KB

                    • memory/3444-216-0x0000000000410000-0x0000000000416000-memory.dmp

                      Filesize

                      24KB

                    • memory/3444-232-0x0000000000410000-0x0000000000416000-memory.dmp

                      Filesize

                      24KB

                    • memory/3516-236-0x00000000006DC000-0x00000000006FB000-memory.dmp

                      Filesize

                      124KB

                    • memory/3692-233-0x00000000001D0000-0x00000000001D7000-memory.dmp

                      Filesize

                      28KB

                    • memory/3692-219-0x00000000001C0000-0x00000000001CD000-memory.dmp

                      Filesize

                      52KB

                    • memory/3692-218-0x00000000001D0000-0x00000000001D7000-memory.dmp

                      Filesize

                      28KB

                    • memory/3720-226-0x00000000008F0000-0x00000000008F9000-memory.dmp

                      Filesize

                      36KB

                    • memory/3720-188-0x00000000008F0000-0x00000000008F9000-memory.dmp

                      Filesize

                      36KB

                    • memory/3720-189-0x00000000008E0000-0x00000000008EF000-memory.dmp

                      Filesize

                      60KB

                    • memory/4004-192-0x00000000008F0000-0x00000000008F7000-memory.dmp

                      Filesize

                      28KB

                    • memory/4004-197-0x0000000000420000-0x000000000042B000-memory.dmp

                      Filesize

                      44KB

                    • memory/4004-225-0x00000000008F0000-0x00000000008F7000-memory.dmp

                      Filesize

                      28KB

                    • memory/4204-227-0x0000000000980000-0x0000000000985000-memory.dmp

                      Filesize

                      20KB

                    • memory/4204-203-0x0000000000970000-0x0000000000979000-memory.dmp

                      Filesize

                      36KB

                    • memory/4204-201-0x0000000000980000-0x0000000000985000-memory.dmp

                      Filesize

                      20KB

                    • memory/4216-230-0x00000000008A0000-0x00000000008C2000-memory.dmp

                      Filesize

                      136KB

                    • memory/4216-210-0x0000000000870000-0x0000000000897000-memory.dmp

                      Filesize

                      156KB

                    • memory/4216-209-0x00000000008A0000-0x00000000008C2000-memory.dmp

                      Filesize

                      136KB

                    • memory/4544-224-0x0000000000970000-0x000000000097B000-memory.dmp

                      Filesize

                      44KB

                    • memory/4544-223-0x0000000000980000-0x0000000000988000-memory.dmp

                      Filesize

                      32KB

                    • memory/4544-234-0x0000000000980000-0x0000000000988000-memory.dmp

                      Filesize

                      32KB

                    • memory/4932-229-0x0000000000648000-0x0000000000668000-memory.dmp

                      Filesize

                      128KB

                    • memory/4932-208-0x0000000000400000-0x0000000000473000-memory.dmp

                      Filesize

                      460KB

                    • memory/4932-207-0x0000000000648000-0x0000000000668000-memory.dmp

                      Filesize

                      128KB