Analysis

  • max time kernel
    345s
  • max time network
    349s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2022 05:19

General

  • Target

    e518001cf608d1d5ab2d2efcee2bdb73bea11041b6019df4dceb090e19ea64aa.exe

  • Size

    382KB

  • MD5

    3b28630c113ec62535060dd4e3bc1962

  • SHA1

    e506bc344eae38ff1b2e7f73660a0235d5f51669

  • SHA256

    e518001cf608d1d5ab2d2efcee2bdb73bea11041b6019df4dceb090e19ea64aa

  • SHA512

    912b2f26ecd0fc8e9239a364f4601cb195c2f34ebdd67dcab865278bff46e541d8837313bb63d730d36d775643561847207041afe94be3e8f24c0396ebf7cab5

  • SSDEEP

    6144:IVxIAxLQ8e/gcR3BZlI066vfciCIU/uR8Cejp:IbBx+/gqBZep6MJIUWRza

Score
10/10

Malware Config

Extracted

Family

amadey

Version

3.50

C2

77.73.134.66/o7Vsjd3a2f/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e518001cf608d1d5ab2d2efcee2bdb73bea11041b6019df4dceb090e19ea64aa.exe
    "C:\Users\Admin\AppData\Local\Temp\e518001cf608d1d5ab2d2efcee2bdb73bea11041b6019df4dceb090e19ea64aa.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe
      "C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1136
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:1908
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {C7E0FAC9-B31B-4250-91D3-9C7F970ED74B} S-1-5-21-3406023954-474543476-3319432036-1000:VUIIVLGQ\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:872
    • C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe
      C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe
      2⤵
      • Executes dropped EXE
      PID:1704
    • C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe
      C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe
      2⤵
      • Executes dropped EXE
      PID:1340
    • C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe
      C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe
      2⤵
      • Executes dropped EXE
      PID:1768
    • C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe
      C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe
      2⤵
      • Executes dropped EXE
      PID:1144

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe

    Filesize

    382KB

    MD5

    3b28630c113ec62535060dd4e3bc1962

    SHA1

    e506bc344eae38ff1b2e7f73660a0235d5f51669

    SHA256

    e518001cf608d1d5ab2d2efcee2bdb73bea11041b6019df4dceb090e19ea64aa

    SHA512

    912b2f26ecd0fc8e9239a364f4601cb195c2f34ebdd67dcab865278bff46e541d8837313bb63d730d36d775643561847207041afe94be3e8f24c0396ebf7cab5

  • C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe

    Filesize

    382KB

    MD5

    3b28630c113ec62535060dd4e3bc1962

    SHA1

    e506bc344eae38ff1b2e7f73660a0235d5f51669

    SHA256

    e518001cf608d1d5ab2d2efcee2bdb73bea11041b6019df4dceb090e19ea64aa

    SHA512

    912b2f26ecd0fc8e9239a364f4601cb195c2f34ebdd67dcab865278bff46e541d8837313bb63d730d36d775643561847207041afe94be3e8f24c0396ebf7cab5

  • C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe

    Filesize

    382KB

    MD5

    3b28630c113ec62535060dd4e3bc1962

    SHA1

    e506bc344eae38ff1b2e7f73660a0235d5f51669

    SHA256

    e518001cf608d1d5ab2d2efcee2bdb73bea11041b6019df4dceb090e19ea64aa

    SHA512

    912b2f26ecd0fc8e9239a364f4601cb195c2f34ebdd67dcab865278bff46e541d8837313bb63d730d36d775643561847207041afe94be3e8f24c0396ebf7cab5

  • C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe

    Filesize

    382KB

    MD5

    3b28630c113ec62535060dd4e3bc1962

    SHA1

    e506bc344eae38ff1b2e7f73660a0235d5f51669

    SHA256

    e518001cf608d1d5ab2d2efcee2bdb73bea11041b6019df4dceb090e19ea64aa

    SHA512

    912b2f26ecd0fc8e9239a364f4601cb195c2f34ebdd67dcab865278bff46e541d8837313bb63d730d36d775643561847207041afe94be3e8f24c0396ebf7cab5

  • C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe

    Filesize

    382KB

    MD5

    3b28630c113ec62535060dd4e3bc1962

    SHA1

    e506bc344eae38ff1b2e7f73660a0235d5f51669

    SHA256

    e518001cf608d1d5ab2d2efcee2bdb73bea11041b6019df4dceb090e19ea64aa

    SHA512

    912b2f26ecd0fc8e9239a364f4601cb195c2f34ebdd67dcab865278bff46e541d8837313bb63d730d36d775643561847207041afe94be3e8f24c0396ebf7cab5

  • C:\Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe

    Filesize

    382KB

    MD5

    3b28630c113ec62535060dd4e3bc1962

    SHA1

    e506bc344eae38ff1b2e7f73660a0235d5f51669

    SHA256

    e518001cf608d1d5ab2d2efcee2bdb73bea11041b6019df4dceb090e19ea64aa

    SHA512

    912b2f26ecd0fc8e9239a364f4601cb195c2f34ebdd67dcab865278bff46e541d8837313bb63d730d36d775643561847207041afe94be3e8f24c0396ebf7cab5

  • \Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe

    Filesize

    382KB

    MD5

    3b28630c113ec62535060dd4e3bc1962

    SHA1

    e506bc344eae38ff1b2e7f73660a0235d5f51669

    SHA256

    e518001cf608d1d5ab2d2efcee2bdb73bea11041b6019df4dceb090e19ea64aa

    SHA512

    912b2f26ecd0fc8e9239a364f4601cb195c2f34ebdd67dcab865278bff46e541d8837313bb63d730d36d775643561847207041afe94be3e8f24c0396ebf7cab5

  • \Users\Admin\AppData\Local\Temp\94f59ca423\gntuud.exe

    Filesize

    382KB

    MD5

    3b28630c113ec62535060dd4e3bc1962

    SHA1

    e506bc344eae38ff1b2e7f73660a0235d5f51669

    SHA256

    e518001cf608d1d5ab2d2efcee2bdb73bea11041b6019df4dceb090e19ea64aa

    SHA512

    912b2f26ecd0fc8e9239a364f4601cb195c2f34ebdd67dcab865278bff46e541d8837313bb63d730d36d775643561847207041afe94be3e8f24c0396ebf7cab5

  • memory/1136-63-0x00000000005DA000-0x00000000005F7000-memory.dmp

    Filesize

    116KB

  • memory/1136-64-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/1136-67-0x00000000005DA000-0x00000000005F7000-memory.dmp

    Filesize

    116KB

  • memory/1136-68-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/1136-57-0x0000000000000000-mapping.dmp

  • memory/1144-81-0x0000000000000000-mapping.dmp

  • memory/1144-84-0x000000000064A000-0x0000000000667000-memory.dmp

    Filesize

    116KB

  • memory/1144-85-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/1340-78-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/1340-77-0x000000000054A000-0x0000000000567000-memory.dmp

    Filesize

    116KB

  • memory/1340-74-0x0000000000000000-mapping.dmp

  • memory/1704-69-0x0000000000000000-mapping.dmp

  • memory/1704-73-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/1704-72-0x000000000057A000-0x0000000000597000-memory.dmp

    Filesize

    116KB

  • memory/1768-79-0x0000000000000000-mapping.dmp

  • memory/1908-65-0x0000000000000000-mapping.dmp

  • memory/2024-54-0x0000000075881000-0x0000000075883000-memory.dmp

    Filesize

    8KB

  • memory/2024-60-0x0000000000220000-0x0000000000259000-memory.dmp

    Filesize

    228KB

  • memory/2024-61-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/2024-59-0x00000000005CA000-0x00000000005E7000-memory.dmp

    Filesize

    116KB