Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2022 08:15

General

  • Target

    1883b1cf887b4748bcf5f6fd82a6dce3.exe

  • Size

    342KB

  • MD5

    1883b1cf887b4748bcf5f6fd82a6dce3

  • SHA1

    0027119a3c92b25e6dac059d952c2298de29cc66

  • SHA256

    b50a455b38340055fe28091525b17a3b9de0ed0a3c0a8bb6d8337850ea3bb81f

  • SHA512

    88f56c14b4517b1745e769c9995d3dd5f8ae804cb3ab4e861017a85837b967b88ece92c7cb5a16d50a1cb1d6189f38e75d971b3f28a6f506f061f6ce1d7c2edc

  • SSDEEP

    6144:bkXpGtKOhRiO2etLe6ftHYoUJ2Kw4kN4SHyK1tjvoFSDtZQxW:bmpkKOXiO57ftHjJ4xzwWW

Malware Config

Extracted

Family

amadey

Version

3.60

C2

85.209.135.11/gjend7w/index.php

Extracted

Family

systembc

C2

89.22.236.225:4193

176.124.205.5:4193

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1883b1cf887b4748bcf5f6fd82a6dce3.exe
    "C:\Users\Admin\AppData\Local\Temp\1883b1cf887b4748bcf5f6fd82a6dce3.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4104
    • C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe
      "C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3632
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:5096
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "gntuud.exe" /P "Admin:N"&&CACLS "gntuud.exe" /P "Admin:R" /E&&echo Y|CACLS "..\acc0b83959" /P "Admin:N"&&CACLS "..\acc0b83959" /P "Admin:R" /E&&Exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:816
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          4⤵
            PID:3644
          • C:\Windows\SysWOW64\cacls.exe
            CACLS "gntuud.exe" /P "Admin:N"
            4⤵
              PID:928
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "gntuud.exe" /P "Admin:R" /E
              4⤵
                PID:2888
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                4⤵
                  PID:4948
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\acc0b83959" /P "Admin:N"
                  4⤵
                    PID:4584
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\acc0b83959" /P "Admin:R" /E
                    4⤵
                      PID:4336
                  • C:\Windows\SysWOW64\rundll32.exe
                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\1000003062\syncfiles.dll, rundll
                    3⤵
                    • Loads dropped DLL
                    • Suspicious use of WriteProcessMemory
                    PID:2340
                    • C:\Windows\system32\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\1000003062\syncfiles.dll, rundll
                      4⤵
                      • Blocklisted process makes network request
                      • Loads dropped DLL
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3580
                  • C:\Users\Admin\AppData\Roaming\1000019050\umciavi32.exe
                    "C:\Users\Admin\AppData\Roaming\1000019050\umciavi32.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:2448
                    • C:\Users\Admin\AppData\Local\Temp\SETUP_16941\Engine.exe
                      C:\Users\Admin\AppData\Local\Temp\SETUP_16941\Engine.exe /TH_ID=_1420 /OriginExe="C:\Users\Admin\AppData\Roaming\1000019050\umciavi32.exe"
                      4⤵
                      • Executes dropped EXE
                      • Suspicious use of WriteProcessMemory
                      PID:2644
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c cmd < 69
                        5⤵
                        • Suspicious use of WriteProcessMemory
                        PID:3824
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd
                          6⤵
                          • Suspicious use of WriteProcessMemory
                          PID:3444
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell get-process avastui
                            7⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4384
                  • C:\Users\Admin\AppData\Local\Temp\1000020001\avicapn32.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000020001\avicapn32.exe"
                    3⤵
                    • Executes dropped EXE
                    • Checks computer location settings
                    • Suspicious use of WriteProcessMemory
                    PID:2568
                    • C:\Windows\SysWOW64\schtasks.exe
                      "C:\Windows\System32\schtasks.exe" /create /tn "svcupdater" /tr "C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
                      4⤵
                      • Creates scheduled task(s)
                      PID:4956
              • C:\Windows\system32\OpenWith.exe
                C:\Windows\system32\OpenWith.exe -Embedding
                1⤵
                • Suspicious use of SetWindowsHookEx
                PID:4716
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
                1⤵
                • Drops desktop.ini file(s)
                PID:2136

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Execution

              Scheduled Task

              1
              T1053

              Persistence

              Registry Run Keys / Startup Folder

              1
              T1060

              Scheduled Task

              1
              T1053

              Privilege Escalation

              Scheduled Task

              1
              T1053

              Defense Evasion

              Modify Registry

              1
              T1112

              Discovery

              Query Registry

              1
              T1012

              System Information Discovery

              2
              T1082

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\1000003062\syncfiles.dll
                Filesize

                6.4MB

                MD5

                2f781ea76036a17bbd0c0f63be7cff12

                SHA1

                b9b4c756949a038e87f4efd3569ba12c41a8e810

                SHA256

                3acc979360b4496d3557182148b005a36f5334ea1b7efc42095c85aa0bf64372

                SHA512

                c2b89d8be8438b9234a4cfeee4bd46535ec15dbf599c7553b957f0d3a8703fbd9dada2d2baa3b1a25b2bc58907f6db2f271d9d1926cac89d69912fb9e4f83208

              • C:\Users\Admin\1000003062\syncfiles.dll
                Filesize

                6.4MB

                MD5

                2f781ea76036a17bbd0c0f63be7cff12

                SHA1

                b9b4c756949a038e87f4efd3569ba12c41a8e810

                SHA256

                3acc979360b4496d3557182148b005a36f5334ea1b7efc42095c85aa0bf64372

                SHA512

                c2b89d8be8438b9234a4cfeee4bd46535ec15dbf599c7553b957f0d3a8703fbd9dada2d2baa3b1a25b2bc58907f6db2f271d9d1926cac89d69912fb9e4f83208

              • C:\Users\Admin\1000003062\syncfiles.dll
                Filesize

                6.4MB

                MD5

                2f781ea76036a17bbd0c0f63be7cff12

                SHA1

                b9b4c756949a038e87f4efd3569ba12c41a8e810

                SHA256

                3acc979360b4496d3557182148b005a36f5334ea1b7efc42095c85aa0bf64372

                SHA512

                c2b89d8be8438b9234a4cfeee4bd46535ec15dbf599c7553b957f0d3a8703fbd9dada2d2baa3b1a25b2bc58907f6db2f271d9d1926cac89d69912fb9e4f83208

              • C:\Users\Admin\AppData\Local\Temp\1000020001\avicapn32.exe
                Filesize

                194KB

                MD5

                9ac7b60b880d404a156457d7b1dacd05

                SHA1

                54ad3bc6bd447a016aba24d3d7adaf0ecac38f75

                SHA256

                c0a070dd3a3fe772359440bce75f73825ea8f16b195e15d91a2fa8c120c32463

                SHA512

                5b738e583cfcb06f44afc3da81b38f493bc17b4657cdf911b0a8759e85ba3d1b165e7b327523b6bb79d7e9dc086d5474f64776f8e7e9393fce7769a377934a36

              • C:\Users\Admin\AppData\Local\Temp\1000020001\avicapn32.exe
                Filesize

                194KB

                MD5

                9ac7b60b880d404a156457d7b1dacd05

                SHA1

                54ad3bc6bd447a016aba24d3d7adaf0ecac38f75

                SHA256

                c0a070dd3a3fe772359440bce75f73825ea8f16b195e15d91a2fa8c120c32463

                SHA512

                5b738e583cfcb06f44afc3da81b38f493bc17b4657cdf911b0a8759e85ba3d1b165e7b327523b6bb79d7e9dc086d5474f64776f8e7e9393fce7769a377934a36

              • C:\Users\Admin\AppData\Local\Temp\SETUP_16941\00000#06
                Filesize

                872KB

                MD5

                3cdc0d31aee9f7223afdbdfc2f36f6a5

                SHA1

                de414174005ac4794e901f8d99ff3ea595ba68eb

                SHA256

                4021cce6fdc1d43d1a389fcfb212ce07cef8e01e8803ced6fe3c421802639369

                SHA512

                ee86c1123b107c784b6e94bd9e4037136f73686c0f6fedf3f60926b7371941359f32b131dd29401e2ebf6e9f26a7ccc1b347591a862a686ff4ce6237762da9c4

              • C:\Users\Admin\AppData\Local\Temp\SETUP_16941\00001#69
                Filesize

                10KB

                MD5

                767125c146432d6bc91cfebb697da9e1

                SHA1

                48b0e29458447a6b5e111dc04ac5b7b565a0656b

                SHA256

                1085125450bde79c1c70230d90a6965e22d218d103c456a2b95d50d2b05b3eba

                SHA512

                77ec52dfe0454c34a9d7d0fb14641398b6bf11ab3a9919470d018c25d6b7d5e542fa9406465dbf4fd403349a91b36691b6f63896ec02a3c8e9be3a84c57954e4

              • C:\Users\Admin\AppData\Local\Temp\SETUP_16941\00002#7
                Filesize

                1.5MB

                MD5

                c4608baba4469ad420ea3a18c0daba5a

                SHA1

                68abd369422fb326e387d461244226f5242761ee

                SHA256

                3ebd30c7fb5a86de8975a5e96f4e875e21ad50358de6988e4deffd250c4bacf8

                SHA512

                a785b72f5db57bc165586b1551d1c7702b2c387d6d76ae82f126ac9567cd2a1a1f0ebf80eeeddb1dc6b155680b9d99eeff3fed59fbec6b4a3bc1cc91362d64e5

              • C:\Users\Admin\AppData\Local\Temp\SETUP_16941\Engine.exe
                Filesize

                392KB

                MD5

                a7a99a201774531d761f6aac2651a9df

                SHA1

                b122ae368c4bf103e959a6ebb54ddb310117ab96

                SHA256

                e6e73497e85e9ece4c92ac7d49e07b9d55e932ba2d9e5789b94b95a9841ee524

                SHA512

                056504da2afeed547a4123ac8c38b35291b7dc0126fb638ae304eee802ac572715f9d608e9f1655788a030f488354741ee27c805434111c8e915cf841c0892f1

              • C:\Users\Admin\AppData\Local\Temp\SETUP_16941\Engine.exe
                Filesize

                392KB

                MD5

                a7a99a201774531d761f6aac2651a9df

                SHA1

                b122ae368c4bf103e959a6ebb54ddb310117ab96

                SHA256

                e6e73497e85e9ece4c92ac7d49e07b9d55e932ba2d9e5789b94b95a9841ee524

                SHA512

                056504da2afeed547a4123ac8c38b35291b7dc0126fb638ae304eee802ac572715f9d608e9f1655788a030f488354741ee27c805434111c8e915cf841c0892f1

              • C:\Users\Admin\AppData\Local\Temp\SETUP_16941\Modern_Icon.bmp
                Filesize

                7KB

                MD5

                1dd88f67f029710d5c5858a6293a93f1

                SHA1

                3e5ef66613415fe9467b2a24ccc27d8f997e7df6

                SHA256

                b5dad33ceb6eb1ac2a05fbda76e29a73038403939218a88367925c3a20c05532

                SHA512

                7071fd64038e0058c8c586c63c62677c0ca403768100f90323cf9c0bc7b7fcb538391e6f3606bd7970b8769445606ada47adcdcfc1e991e25caf272a13e10c94

              • C:\Users\Admin\AppData\Local\Temp\SETUP_16941\Setup.txt
                Filesize

                2KB

                MD5

                3502606b47f353647741bfae662f1fd4

                SHA1

                1fc4247b029a2ab3c092154b16b960200c6954e8

                SHA256

                467b95e5714e8c0490965500aadf0576afccd0504a3419bbac059f51cc5f4c80

                SHA512

                610809440132e4b412e9ecbfaf88303c788626bb0858d2aeb4842ec6a6fb529abdd7deaa8900775a964055a25af41143184cd8096d0f4d9ebc3b0752ece1f11b

              • C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe
                Filesize

                342KB

                MD5

                1883b1cf887b4748bcf5f6fd82a6dce3

                SHA1

                0027119a3c92b25e6dac059d952c2298de29cc66

                SHA256

                b50a455b38340055fe28091525b17a3b9de0ed0a3c0a8bb6d8337850ea3bb81f

                SHA512

                88f56c14b4517b1745e769c9995d3dd5f8ae804cb3ab4e861017a85837b967b88ece92c7cb5a16d50a1cb1d6189f38e75d971b3f28a6f506f061f6ce1d7c2edc

              • C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe
                Filesize

                342KB

                MD5

                1883b1cf887b4748bcf5f6fd82a6dce3

                SHA1

                0027119a3c92b25e6dac059d952c2298de29cc66

                SHA256

                b50a455b38340055fe28091525b17a3b9de0ed0a3c0a8bb6d8337850ea3bb81f

                SHA512

                88f56c14b4517b1745e769c9995d3dd5f8ae804cb3ab4e861017a85837b967b88ece92c7cb5a16d50a1cb1d6189f38e75d971b3f28a6f506f061f6ce1d7c2edc

              • C:\Users\Admin\AppData\Roaming\1000019050\umciavi32.exe
                Filesize

                1.6MB

                MD5

                69a3014aa137c526dfd131460f458241

                SHA1

                f0c6afa51de99f657d4d005615d6cb290dca4540

                SHA256

                35c6d144c1b40b1914e7a16856af6e05eccccae04545bb04716b0f1f186ee7ff

                SHA512

                132429678f8c1d60eb09a1d7239161bf4232303ad63b8fcee8fa98173721ecb6c8909749153681f738725f2850e969ad12b5c904cd96cfb8fe146d46f246cdac

              • C:\Users\Admin\AppData\Roaming\1000019050\umciavi32.exe
                Filesize

                1.6MB

                MD5

                69a3014aa137c526dfd131460f458241

                SHA1

                f0c6afa51de99f657d4d005615d6cb290dca4540

                SHA256

                35c6d144c1b40b1914e7a16856af6e05eccccae04545bb04716b0f1f186ee7ff

                SHA512

                132429678f8c1d60eb09a1d7239161bf4232303ad63b8fcee8fa98173721ecb6c8909749153681f738725f2850e969ad12b5c904cd96cfb8fe146d46f246cdac

              • memory/816-140-0x0000000000000000-mapping.dmp
              • memory/928-142-0x0000000000000000-mapping.dmp
              • memory/2340-148-0x0000000000000000-mapping.dmp
              • memory/2448-153-0x0000000000000000-mapping.dmp
              • memory/2568-172-0x00000000014E0000-0x00000000014F9000-memory.dmp
                Filesize

                100KB

              • memory/2568-181-0x00000000014E0000-0x00000000014F9000-memory.dmp
                Filesize

                100KB

              • memory/2568-171-0x00000000014E0000-0x00000000014F9000-memory.dmp
                Filesize

                100KB

              • memory/2568-167-0x0000000000000000-mapping.dmp
              • memory/2644-157-0x0000000000000000-mapping.dmp
              • memory/2644-162-0x0000000000400000-0x0000000000558000-memory.dmp
                Filesize

                1.3MB

              • memory/2888-143-0x0000000000000000-mapping.dmp
              • memory/3444-170-0x0000000000000000-mapping.dmp
              • memory/3580-151-0x0000000000000000-mapping.dmp
              • memory/3580-156-0x00007FFB85700000-0x00007FFB860FD000-memory.dmp
                Filesize

                10.0MB

              • memory/3632-147-0x0000000000770000-0x00000000007B4000-memory.dmp
                Filesize

                272KB

              • memory/3632-174-0x0000000000770000-0x00000000007B4000-memory.dmp
                Filesize

                272KB

              • memory/3632-134-0x0000000000000000-mapping.dmp
              • memory/3644-141-0x0000000000000000-mapping.dmp
              • memory/3824-166-0x0000000000000000-mapping.dmp
              • memory/4104-132-0x0000000000A40000-0x0000000000A84000-memory.dmp
                Filesize

                272KB

              • memory/4104-137-0x0000000000A40000-0x0000000000A84000-memory.dmp
                Filesize

                272KB

              • memory/4104-133-0x0000000000A40000-0x0000000000A84000-memory.dmp
                Filesize

                272KB

              • memory/4336-146-0x0000000000000000-mapping.dmp
              • memory/4384-173-0x0000000000000000-mapping.dmp
              • memory/4384-179-0x0000000005AD0000-0x0000000005B36000-memory.dmp
                Filesize

                408KB

              • memory/4384-186-0x00000000078C0000-0x0000000007E64000-memory.dmp
                Filesize

                5.6MB

              • memory/4384-175-0x0000000002810000-0x0000000002846000-memory.dmp
                Filesize

                216KB

              • memory/4384-176-0x00000000052C0000-0x00000000058E8000-memory.dmp
                Filesize

                6.2MB

              • memory/4384-177-0x0000000005160000-0x0000000005182000-memory.dmp
                Filesize

                136KB

              • memory/4384-178-0x0000000005960000-0x00000000059C6000-memory.dmp
                Filesize

                408KB

              • memory/4384-185-0x00000000072E0000-0x0000000007302000-memory.dmp
                Filesize

                136KB

              • memory/4384-184-0x0000000006610000-0x000000000662A000-memory.dmp
                Filesize

                104KB

              • memory/4384-183-0x0000000006680000-0x0000000006716000-memory.dmp
                Filesize

                600KB

              • memory/4384-182-0x0000000006090000-0x00000000060AE000-memory.dmp
                Filesize

                120KB

              • memory/4584-145-0x0000000000000000-mapping.dmp
              • memory/4948-144-0x0000000000000000-mapping.dmp
              • memory/4956-180-0x0000000000000000-mapping.dmp
              • memory/5096-139-0x0000000000000000-mapping.dmp