Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-02-2023 05:27

General

  • Target

    a59e12fe21bb6df9384f18a30ec5f5d1.exe

  • Size

    1.2MB

  • MD5

    a59e12fe21bb6df9384f18a30ec5f5d1

  • SHA1

    539c7f98d917f06c24581a203bd9d26e2e2382f2

  • SHA256

    303e0a54b1ec43bcb7f0608ab138ff072325c8b1d1a17beb4c5a1d86029ffc89

  • SHA512

    2df5212880da4a12c4301e5c56f8dd22263b34673f0a50cb863c4a84372d642e5318f0deb7bd0d00d3a4f37e625eff7b73ccebf3fdd47af7ec81987c79ab0c4b

  • SSDEEP

    12288:XXofoFKDWqTG4dJJy8/eDyhPxtDz4XE8/x2KYhstBYX8+kf+nfkDp9otCmk0rjxP:X4gADtTdqbx3YhstSXZkf+f6V3WFQRJk

Malware Config

Extracted

Family

amadey

Version

3.66

C2

185.174.137.152/jb9sZZZbv7/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a59e12fe21bb6df9384f18a30ec5f5d1.exe
    "C:\Users\Admin\AppData\Local\Temp\a59e12fe21bb6df9384f18a30ec5f5d1.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3208
    • C:\Users\Admin\AppData\Local\Temp\8edf5559d1\nbveek.exe
      "C:\Users\Admin\AppData\Local\Temp\8edf5559d1\nbveek.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4832
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nbveek.exe /TR "C:\Users\Admin\AppData\Local\Temp\8edf5559d1\nbveek.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:4856
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "nbveek.exe" /P "Admin:N"&&CACLS "nbveek.exe" /P "Admin:R" /E&&echo Y|CACLS "..\8edf5559d1" /P "Admin:N"&&CACLS "..\8edf5559d1" /P "Admin:R" /E&&Exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4896
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          4⤵
            PID:5064
          • C:\Windows\SysWOW64\cacls.exe
            CACLS "nbveek.exe" /P "Admin:N"
            4⤵
              PID:4724
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "nbveek.exe" /P "Admin:R" /E
              4⤵
                PID:4744
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                4⤵
                  PID:2132
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\8edf5559d1" /P "Admin:N"
                  4⤵
                    PID:612
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\8edf5559d1" /P "Admin:R" /E
                    4⤵
                      PID:3928
                  • C:\Users\Admin\AppData\Roaming\1000008000\QaUpdate.exe
                    "C:\Users\Admin\AppData\Roaming\1000008000\QaUpdate.exe"
                    3⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2232
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAANAA1AA==
                      4⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2428
                    • C:\Users\Admin\AppData\Roaming\1000008000\QaUpdate.exe
                      C:\Users\Admin\AppData\Roaming\1000008000\QaUpdate.exe
                      4⤵
                      • Executes dropped EXE
                      PID:2732
                  • C:\Users\Admin\AppData\Local\Temp\8edf5559d1\nbveek.exe
                    "C:\Users\Admin\AppData\Local\Temp\8edf5559d1\nbveek.exe"
                    3⤵
                      PID:4572
                    • C:\Users\Admin\AppData\Local\Temp\8edf5559d1\nbveek.exe
                      "C:\Users\Admin\AppData\Local\Temp\8edf5559d1\nbveek.exe"
                      3⤵
                        PID:3212
                      • C:\Users\Admin\AppData\Local\Temp\8edf5559d1\nbveek.exe
                        "C:\Users\Admin\AppData\Local\Temp\8edf5559d1\nbveek.exe"
                        3⤵
                          PID:3100
                        • C:\Windows\SysWOW64\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\465dbc52837d81\cred64.dll, Main
                          3⤵
                          • Loads dropped DLL
                          • Suspicious use of WriteProcessMemory
                          PID:4900
                          • C:\Windows\system32\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\465dbc52837d81\cred64.dll, Main
                            4⤵
                            • Loads dropped DLL
                            PID:3592
                            • C:\Windows\system32\WerFault.exe
                              C:\Windows\system32\WerFault.exe -u -p 3592 -s 680
                              5⤵
                              • Program crash
                              PID:4712
                    • C:\Users\Admin\AppData\Local\Temp\8edf5559d1\nbveek.exe
                      C:\Users\Admin\AppData\Local\Temp\8edf5559d1\nbveek.exe
                      1⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1964
                    • C:\Windows\system32\WerFault.exe
                      C:\Windows\system32\WerFault.exe -pss -s 432 -p 3592 -ip 3592
                      1⤵
                        PID:4908
                      • C:\Users\Admin\AppData\Local\Temp\8edf5559d1\nbveek.exe
                        C:\Users\Admin\AppData\Local\Temp\8edf5559d1\nbveek.exe
                        1⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of WriteProcessMemory
                        PID:2928
                        • C:\Windows\SysWOW64\schtasks.exe
                          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nbveek.exe /TR "C:\Users\Admin\AppData\Local\Temp\8edf5559d1\nbveek.exe" /F
                          2⤵
                          • Creates scheduled task(s)
                          PID:1356
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "nbveek.exe" /P "Admin:N"&&CACLS "nbveek.exe" /P "Admin:R" /E&&echo Y|CACLS "..\8edf5559d1" /P "Admin:N"&&CACLS "..\8edf5559d1" /P "Admin:R" /E&&Exit
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:1224
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                            3⤵
                              PID:4028
                            • C:\Windows\SysWOW64\cacls.exe
                              CACLS "nbveek.exe" /P "Admin:N"
                              3⤵
                                PID:4284
                              • C:\Windows\SysWOW64\cacls.exe
                                CACLS "nbveek.exe" /P "Admin:R" /E
                                3⤵
                                  PID:592
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                  3⤵
                                    PID:1440
                                  • C:\Windows\SysWOW64\cacls.exe
                                    CACLS "..\8edf5559d1" /P "Admin:N"
                                    3⤵
                                      PID:908
                                    • C:\Windows\SysWOW64\cacls.exe
                                      CACLS "..\8edf5559d1" /P "Admin:R" /E
                                      3⤵
                                        PID:4444

                                  Network

                                  MITRE ATT&CK Enterprise v6

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\QaUpdate.exe.log

                                    Filesize

                                    1KB

                                    MD5

                                    ae0f6045f1a55a192e1fe92cb82f0b27

                                    SHA1

                                    af3c5be06ef6149b7322216646d55aa8b47698b9

                                    SHA256

                                    4aa913a40444ead2d5c75c2294d753599d04ad80c3e6833a86b130df03f5d841

                                    SHA512

                                    3d8efeef49a74be1ed3f9e0bd39341e746b7cccca0e7b5b7c5d04f2a73298ff7fc40df274409e702dd58c1f3e5d7dfb3fb127a12a4529c1b7e69f9ad2fdc353a

                                  • C:\Users\Admin\AppData\Local\Temp\8edf5559d1\nbveek.exe

                                    Filesize

                                    1.2MB

                                    MD5

                                    a59e12fe21bb6df9384f18a30ec5f5d1

                                    SHA1

                                    539c7f98d917f06c24581a203bd9d26e2e2382f2

                                    SHA256

                                    303e0a54b1ec43bcb7f0608ab138ff072325c8b1d1a17beb4c5a1d86029ffc89

                                    SHA512

                                    2df5212880da4a12c4301e5c56f8dd22263b34673f0a50cb863c4a84372d642e5318f0deb7bd0d00d3a4f37e625eff7b73ccebf3fdd47af7ec81987c79ab0c4b

                                  • C:\Users\Admin\AppData\Local\Temp\8edf5559d1\nbveek.exe

                                    Filesize

                                    1.2MB

                                    MD5

                                    a59e12fe21bb6df9384f18a30ec5f5d1

                                    SHA1

                                    539c7f98d917f06c24581a203bd9d26e2e2382f2

                                    SHA256

                                    303e0a54b1ec43bcb7f0608ab138ff072325c8b1d1a17beb4c5a1d86029ffc89

                                    SHA512

                                    2df5212880da4a12c4301e5c56f8dd22263b34673f0a50cb863c4a84372d642e5318f0deb7bd0d00d3a4f37e625eff7b73ccebf3fdd47af7ec81987c79ab0c4b

                                  • C:\Users\Admin\AppData\Local\Temp\8edf5559d1\nbveek.exe

                                    Filesize

                                    1.2MB

                                    MD5

                                    a59e12fe21bb6df9384f18a30ec5f5d1

                                    SHA1

                                    539c7f98d917f06c24581a203bd9d26e2e2382f2

                                    SHA256

                                    303e0a54b1ec43bcb7f0608ab138ff072325c8b1d1a17beb4c5a1d86029ffc89

                                    SHA512

                                    2df5212880da4a12c4301e5c56f8dd22263b34673f0a50cb863c4a84372d642e5318f0deb7bd0d00d3a4f37e625eff7b73ccebf3fdd47af7ec81987c79ab0c4b

                                  • C:\Users\Admin\AppData\Local\Temp\8edf5559d1\nbveek.exe

                                    Filesize

                                    1.2MB

                                    MD5

                                    a59e12fe21bb6df9384f18a30ec5f5d1

                                    SHA1

                                    539c7f98d917f06c24581a203bd9d26e2e2382f2

                                    SHA256

                                    303e0a54b1ec43bcb7f0608ab138ff072325c8b1d1a17beb4c5a1d86029ffc89

                                    SHA512

                                    2df5212880da4a12c4301e5c56f8dd22263b34673f0a50cb863c4a84372d642e5318f0deb7bd0d00d3a4f37e625eff7b73ccebf3fdd47af7ec81987c79ab0c4b

                                  • C:\Users\Admin\AppData\Roaming\1000008000\QaUpdate.exe

                                    Filesize

                                    1.3MB

                                    MD5

                                    21fc808d0840be3366ef79e5a15c51a4

                                    SHA1

                                    c9c3d63a7fa8f99766fb0560dd14a70e90e57c4a

                                    SHA256

                                    218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498

                                    SHA512

                                    8a31f7f6a13ac29bab131af93908f76434457039d6be69158bbc7991bb73d5871fed2cb16ef68076ba614128fdeb73c30043f038cb4e2f41d1d311c2554361fa

                                  • C:\Users\Admin\AppData\Roaming\1000008000\QaUpdate.exe

                                    Filesize

                                    1.3MB

                                    MD5

                                    21fc808d0840be3366ef79e5a15c51a4

                                    SHA1

                                    c9c3d63a7fa8f99766fb0560dd14a70e90e57c4a

                                    SHA256

                                    218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498

                                    SHA512

                                    8a31f7f6a13ac29bab131af93908f76434457039d6be69158bbc7991bb73d5871fed2cb16ef68076ba614128fdeb73c30043f038cb4e2f41d1d311c2554361fa

                                  • C:\Users\Admin\AppData\Roaming\1000008000\QaUpdate.exe

                                    Filesize

                                    1.3MB

                                    MD5

                                    21fc808d0840be3366ef79e5a15c51a4

                                    SHA1

                                    c9c3d63a7fa8f99766fb0560dd14a70e90e57c4a

                                    SHA256

                                    218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498

                                    SHA512

                                    8a31f7f6a13ac29bab131af93908f76434457039d6be69158bbc7991bb73d5871fed2cb16ef68076ba614128fdeb73c30043f038cb4e2f41d1d311c2554361fa

                                  • C:\Users\Admin\AppData\Roaming\465dbc52837d81\cred64.dll

                                    Filesize

                                    1.0MB

                                    MD5

                                    6e88af8e504dc7980e29d93eecbfd624

                                    SHA1

                                    28a3928ffcc2c034dbc85c7e950fce4232cc4503

                                    SHA256

                                    7b5ca8bdb682f55e5004d959e989a9fbb02f263a19ec6af7e50b0f4c7ccaacf8

                                    SHA512

                                    edafb73b7e3d4b977cfa6ae98da36973072d744cb5374462c8defc982fbc6351c5e92adfea554538f3df5f3588024fb097e996554057dd37c99ff6cc8f52d216

                                  • C:\Users\Admin\AppData\Roaming\465dbc52837d81\cred64.dll

                                    Filesize

                                    1.0MB

                                    MD5

                                    6e88af8e504dc7980e29d93eecbfd624

                                    SHA1

                                    28a3928ffcc2c034dbc85c7e950fce4232cc4503

                                    SHA256

                                    7b5ca8bdb682f55e5004d959e989a9fbb02f263a19ec6af7e50b0f4c7ccaacf8

                                    SHA512

                                    edafb73b7e3d4b977cfa6ae98da36973072d744cb5374462c8defc982fbc6351c5e92adfea554538f3df5f3588024fb097e996554057dd37c99ff6cc8f52d216

                                  • C:\Users\Admin\AppData\Roaming\465dbc52837d81\cred64.dll

                                    Filesize

                                    1.0MB

                                    MD5

                                    6e88af8e504dc7980e29d93eecbfd624

                                    SHA1

                                    28a3928ffcc2c034dbc85c7e950fce4232cc4503

                                    SHA256

                                    7b5ca8bdb682f55e5004d959e989a9fbb02f263a19ec6af7e50b0f4c7ccaacf8

                                    SHA512

                                    edafb73b7e3d4b977cfa6ae98da36973072d744cb5374462c8defc982fbc6351c5e92adfea554538f3df5f3588024fb097e996554057dd37c99ff6cc8f52d216

                                  • memory/592-201-0x0000000000000000-mapping.dmp

                                  • memory/612-156-0x0000000000000000-mapping.dmp

                                  • memory/908-203-0x0000000000000000-mapping.dmp

                                  • memory/1224-198-0x0000000000000000-mapping.dmp

                                  • memory/1356-197-0x0000000000000000-mapping.dmp

                                  • memory/1440-202-0x0000000000000000-mapping.dmp

                                  • memory/1964-176-0x000000000DB60000-0x000000000DDCB000-memory.dmp

                                    Filesize

                                    2.4MB

                                  • memory/1964-175-0x00000000028B0000-0x00000000029BC000-memory.dmp

                                    Filesize

                                    1.0MB

                                  • memory/1964-181-0x00000000028B0000-0x00000000029BC000-memory.dmp

                                    Filesize

                                    1.0MB

                                  • memory/1964-174-0x000000000DB60000-0x000000000DDCB000-memory.dmp

                                    Filesize

                                    2.4MB

                                  • memory/2132-155-0x0000000000000000-mapping.dmp

                                  • memory/2232-158-0x0000000000000000-mapping.dmp

                                  • memory/2232-170-0x00007FFC66120000-0x00007FFC66BE1000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/2232-161-0x0000021055050000-0x0000021055196000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2232-162-0x00007FFC66120000-0x00007FFC66BE1000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/2232-164-0x0000021072CA0000-0x0000021072CC2000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/2232-212-0x00007FFC66120000-0x00007FFC66BE1000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/2428-171-0x00007FFC66120000-0x00007FFC66BE1000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/2428-166-0x00007FFC66120000-0x00007FFC66BE1000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/2428-182-0x00007FFC66120000-0x00007FFC66BE1000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/2428-165-0x0000000000000000-mapping.dmp

                                  • memory/2732-208-0x0000000000400000-mapping.dmp

                                  • memory/2732-207-0x0000000000400000-0x000000000048E000-memory.dmp

                                    Filesize

                                    568KB

                                  • memory/2732-213-0x00007FFC66120000-0x00007FFC66BE1000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/2732-211-0x00007FFC66120000-0x00007FFC66BE1000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/2928-206-0x000000000C020000-0x000000000C28B000-memory.dmp

                                    Filesize

                                    2.4MB

                                  • memory/2928-193-0x0000000000400000-0x0000000000443000-memory.dmp

                                    Filesize

                                    268KB

                                  • memory/2928-192-0x000000000C020000-0x000000000C28B000-memory.dmp

                                    Filesize

                                    2.4MB

                                  • memory/2928-191-0x0000000002BF0000-0x0000000002CFC000-memory.dmp

                                    Filesize

                                    1.0MB

                                  • memory/2928-190-0x000000000C020000-0x000000000C28B000-memory.dmp

                                    Filesize

                                    2.4MB

                                  • memory/2928-205-0x0000000002BF0000-0x0000000002CFC000-memory.dmp

                                    Filesize

                                    1.0MB

                                  • memory/3100-172-0x0000000000000000-mapping.dmp

                                  • memory/3208-132-0x00000000025A0000-0x00000000026AC000-memory.dmp

                                    Filesize

                                    1.0MB

                                  • memory/3208-135-0x000000000BED0000-0x000000000BF13000-memory.dmp

                                    Filesize

                                    268KB

                                  • memory/3208-142-0x00000000025A0000-0x00000000026AC000-memory.dmp

                                    Filesize

                                    1.0MB

                                  • memory/3208-133-0x000000000BF10000-0x000000000C17B000-memory.dmp

                                    Filesize

                                    2.4MB

                                  • memory/3208-134-0x000000000BF10000-0x000000000C17B000-memory.dmp

                                    Filesize

                                    2.4MB

                                  • memory/3212-169-0x0000000000000000-mapping.dmp

                                  • memory/3592-186-0x0000000000000000-mapping.dmp

                                  • memory/3928-157-0x0000000000000000-mapping.dmp

                                  • memory/4028-199-0x0000000000000000-mapping.dmp

                                  • memory/4284-200-0x0000000000000000-mapping.dmp

                                  • memory/4444-204-0x0000000000000000-mapping.dmp

                                  • memory/4572-163-0x0000000000000000-mapping.dmp

                                  • memory/4724-153-0x0000000000000000-mapping.dmp

                                  • memory/4744-154-0x0000000000000000-mapping.dmp

                                  • memory/4832-188-0x000000000FA20000-0x000000000FC8B000-memory.dmp

                                    Filesize

                                    2.4MB

                                  • memory/4832-139-0x0000000000000000-mapping.dmp

                                  • memory/4832-167-0x0000000002C70000-0x0000000002D7C000-memory.dmp

                                    Filesize

                                    1.0MB

                                  • memory/4832-144-0x000000000FA20000-0x000000000FC8B000-memory.dmp

                                    Filesize

                                    2.4MB

                                  • memory/4832-146-0x0000000000400000-0x0000000000443000-memory.dmp

                                    Filesize

                                    268KB

                                  • memory/4832-143-0x0000000002C70000-0x0000000002D7C000-memory.dmp

                                    Filesize

                                    1.0MB

                                  • memory/4832-145-0x000000000FA20000-0x000000000FC8B000-memory.dmp

                                    Filesize

                                    2.4MB

                                  • memory/4832-168-0x000000000FA20000-0x000000000FC8B000-memory.dmp

                                    Filesize

                                    2.4MB

                                  • memory/4856-150-0x0000000000000000-mapping.dmp

                                  • memory/4896-151-0x0000000000000000-mapping.dmp

                                  • memory/4900-183-0x0000000000000000-mapping.dmp

                                  • memory/5064-152-0x0000000000000000-mapping.dmp