Analysis

  • max time kernel
    148s
  • max time network
    139s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16-04-2023 10:13

General

  • Target

    eaf27b5987c79004147117f09f2a1d269a0c3ca7a004671f36dc1e5d6441129a.exe

  • Size

    951KB

  • MD5

    955f46168fa6cd8972d037eccf246d75

  • SHA1

    4ff09bfb59844a20d815e7bf9a71b874e9641ada

  • SHA256

    eaf27b5987c79004147117f09f2a1d269a0c3ca7a004671f36dc1e5d6441129a

  • SHA512

    71637e79ef7c1d889e58645532231c20dcb667b31e22a431bc6bbf17b847298d9895b79530eba6b9171f18cdf26f55030298da231fa7959b74c9a60902e518c5

  • SSDEEP

    24576:uy4XKToruPeRSEcBkc7msQfCn6e6Sonf6kUwWFZc:9eK0CGRN+YW5yiw8Z

Malware Config

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eaf27b5987c79004147117f09f2a1d269a0c3ca7a004671f36dc1e5d6441129a.exe
    "C:\Users\Admin\AppData\Local\Temp\eaf27b5987c79004147117f09f2a1d269a0c3ca7a004671f36dc1e5d6441129a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4148
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHY2285.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHY2285.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3596
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zimE8288.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zimE8288.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2344
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it947206.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it947206.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5112
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr412517.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr412517.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4244
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp829328.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp829328.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2144
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr456511.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr456511.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:2528
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 624
        3⤵
        • Program crash
        PID:2324
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 700
        3⤵
        • Program crash
        PID:2272
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 840
        3⤵
        • Program crash
        PID:5108
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 828
        3⤵
        • Program crash
        PID:4916
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 876
        3⤵
        • Program crash
        PID:2088
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 880
        3⤵
        • Program crash
        PID:4240
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 1120
        3⤵
        • Program crash
        PID:1732
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 1188
        3⤵
        • Program crash
        PID:2616
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 1188
        3⤵
        • Program crash
        PID:1800

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr456511.exe

    Filesize

    391KB

    MD5

    718bff474bd4c63046851ff6ea69f7ba

    SHA1

    f8b605586889754dba6907123bb7f84beb674dd7

    SHA256

    c15e1f9a27b57c59107789141a9af70401fc75275cc53f4f5409e4c5750f9b53

    SHA512

    a73c44980064baa45cdc66bae4069b21d3264c57cfddcecfb55853a3e499b3513b1f540270cdfb45e180fd1c6c553263a9af302389cb8622dc90fe9f5f8d2be2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr456511.exe

    Filesize

    391KB

    MD5

    718bff474bd4c63046851ff6ea69f7ba

    SHA1

    f8b605586889754dba6907123bb7f84beb674dd7

    SHA256

    c15e1f9a27b57c59107789141a9af70401fc75275cc53f4f5409e4c5750f9b53

    SHA512

    a73c44980064baa45cdc66bae4069b21d3264c57cfddcecfb55853a3e499b3513b1f540270cdfb45e180fd1c6c553263a9af302389cb8622dc90fe9f5f8d2be2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHY2285.exe

    Filesize

    623KB

    MD5

    6f5a48e4d387d3e6a82d8c16fe527381

    SHA1

    4b67baec5ff3bf65c170f3edfcea9495af6347f1

    SHA256

    5f30dd1f955d2d57c42ee62a7c123ab1c6c5743f47779a92a136229d3fb461d7

    SHA512

    6ca0ff622d3d5efa1ee8c3304e8906a54d98c3fe5e82153a1c02eaa371973a14449465bf25118bcc6917d5d032b3dbf8952dcde7e4b5607b5cdb54a2e2411a53

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHY2285.exe

    Filesize

    623KB

    MD5

    6f5a48e4d387d3e6a82d8c16fe527381

    SHA1

    4b67baec5ff3bf65c170f3edfcea9495af6347f1

    SHA256

    5f30dd1f955d2d57c42ee62a7c123ab1c6c5743f47779a92a136229d3fb461d7

    SHA512

    6ca0ff622d3d5efa1ee8c3304e8906a54d98c3fe5e82153a1c02eaa371973a14449465bf25118bcc6917d5d032b3dbf8952dcde7e4b5607b5cdb54a2e2411a53

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp829328.exe

    Filesize

    136KB

    MD5

    e7ae347f87257ec8c1177220be5cbfc1

    SHA1

    d721e86ae2c268a7e42662987bfcd9ffe11ca0f2

    SHA256

    733ccbf30055b9a527cc190ef42c803e4cb757572e24bae502298b09361bfd76

    SHA512

    8b61ab2ba8646293e8f279ceed7044136f5a51c93b6af715ead76a6d82b8b39d05440771adae7d407d9458de1df45d7c430b8b8251c1ca69461ea9b555480f78

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp829328.exe

    Filesize

    136KB

    MD5

    e7ae347f87257ec8c1177220be5cbfc1

    SHA1

    d721e86ae2c268a7e42662987bfcd9ffe11ca0f2

    SHA256

    733ccbf30055b9a527cc190ef42c803e4cb757572e24bae502298b09361bfd76

    SHA512

    8b61ab2ba8646293e8f279ceed7044136f5a51c93b6af715ead76a6d82b8b39d05440771adae7d407d9458de1df45d7c430b8b8251c1ca69461ea9b555480f78

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zimE8288.exe

    Filesize

    469KB

    MD5

    aa57dcd2969b3949c837cdaef3588e68

    SHA1

    68429b0f59f8530cb2ecfe200046760df5bc01c3

    SHA256

    28f86b842d9fd8983b90761a47cf97733405858c6d13eed0a1d3754540faf4b0

    SHA512

    4e2bdc4d109db82ed12a40a327274cd8b69cfef2059e15296687a072313bf654ec5714fa978dff801bc162ce581a0d2d6382a84b3c991161cd2c67a5dd778f24

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zimE8288.exe

    Filesize

    469KB

    MD5

    aa57dcd2969b3949c837cdaef3588e68

    SHA1

    68429b0f59f8530cb2ecfe200046760df5bc01c3

    SHA256

    28f86b842d9fd8983b90761a47cf97733405858c6d13eed0a1d3754540faf4b0

    SHA512

    4e2bdc4d109db82ed12a40a327274cd8b69cfef2059e15296687a072313bf654ec5714fa978dff801bc162ce581a0d2d6382a84b3c991161cd2c67a5dd778f24

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it947206.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it947206.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr412517.exe

    Filesize

    482KB

    MD5

    58e29e87cbcee4783b71afa126a97c11

    SHA1

    7f6b363de43f14fbcc8117d681e9b8275c56e438

    SHA256

    049289ff27f2044e3e6245205b7427637ac82123fb427066e727f3e1fd3b88ba

    SHA512

    59216e29b032f5976ca0b2992b822c6158daaf1ae7ca12c214252e944e5858329d2f9e6be869d3f727dc74e41ba77d30174b2d137abc087d2248e420fc5933ac

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr412517.exe

    Filesize

    482KB

    MD5

    58e29e87cbcee4783b71afa126a97c11

    SHA1

    7f6b363de43f14fbcc8117d681e9b8275c56e438

    SHA256

    049289ff27f2044e3e6245205b7427637ac82123fb427066e727f3e1fd3b88ba

    SHA512

    59216e29b032f5976ca0b2992b822c6158daaf1ae7ca12c214252e944e5858329d2f9e6be869d3f727dc74e41ba77d30174b2d137abc087d2248e420fc5933ac

  • memory/2144-962-0x0000000006DC0000-0x0000000006E0B000-memory.dmp

    Filesize

    300KB

  • memory/2144-961-0x0000000000020000-0x0000000000048000-memory.dmp

    Filesize

    160KB

  • memory/2144-963-0x0000000006DB0000-0x0000000006DC0000-memory.dmp

    Filesize

    64KB

  • memory/2528-969-0x0000000000810000-0x000000000084B000-memory.dmp

    Filesize

    236KB

  • memory/4244-179-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/4244-197-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/4244-149-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

    Filesize

    64KB

  • memory/4244-150-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/4244-151-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/4244-153-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/4244-155-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/4244-157-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/4244-159-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/4244-161-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/4244-163-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/4244-165-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/4244-167-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/4244-169-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/4244-171-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/4244-173-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/4244-175-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/4244-177-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/4244-146-0x0000000000980000-0x00000000009C6000-memory.dmp

    Filesize

    280KB

  • memory/4244-181-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/4244-183-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/4244-185-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/4244-187-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/4244-189-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/4244-191-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/4244-193-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/4244-195-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/4244-147-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

    Filesize

    64KB

  • memory/4244-199-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/4244-201-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/4244-203-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/4244-205-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/4244-207-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/4244-209-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/4244-211-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/4244-213-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/4244-942-0x0000000007830000-0x0000000007E36000-memory.dmp

    Filesize

    6.0MB

  • memory/4244-943-0x0000000007E60000-0x0000000007E72000-memory.dmp

    Filesize

    72KB

  • memory/4244-944-0x0000000007E90000-0x0000000007F9A000-memory.dmp

    Filesize

    1.0MB

  • memory/4244-945-0x0000000007FB0000-0x0000000007FEE000-memory.dmp

    Filesize

    248KB

  • memory/4244-946-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

    Filesize

    64KB

  • memory/4244-947-0x0000000008030000-0x000000000807B000-memory.dmp

    Filesize

    300KB

  • memory/4244-948-0x00000000082C0000-0x0000000008326000-memory.dmp

    Filesize

    408KB

  • memory/4244-949-0x0000000008980000-0x0000000008A12000-memory.dmp

    Filesize

    584KB

  • memory/4244-950-0x0000000008A40000-0x0000000008AB6000-memory.dmp

    Filesize

    472KB

  • memory/4244-148-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

    Filesize

    64KB

  • memory/4244-145-0x0000000004DD0000-0x0000000004E0A000-memory.dmp

    Filesize

    232KB

  • memory/4244-144-0x0000000004EB0000-0x00000000053AE000-memory.dmp

    Filesize

    5.0MB

  • memory/4244-143-0x00000000028F0000-0x000000000292C000-memory.dmp

    Filesize

    240KB

  • memory/4244-951-0x0000000008B00000-0x0000000008CC2000-memory.dmp

    Filesize

    1.8MB

  • memory/4244-952-0x0000000008CE0000-0x000000000920C000-memory.dmp

    Filesize

    5.2MB

  • memory/4244-953-0x0000000009320000-0x000000000933E000-memory.dmp

    Filesize

    120KB

  • memory/4244-954-0x0000000002870000-0x00000000028C0000-memory.dmp

    Filesize

    320KB

  • memory/5112-137-0x0000000000B20000-0x0000000000B2A000-memory.dmp

    Filesize

    40KB