Analysis

  • max time kernel
    145s
  • max time network
    91s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21/04/2023, 16:05

General

  • Target

    2f5d54b041e6a8c3bffdb19bed589c840c5d6cfc9cb38f660af6248a15823bd0.exe

  • Size

    808KB

  • MD5

    ac5ee19d310ed4119e756e876914718d

  • SHA1

    51011b8417b2fc24e7822ac2d711cb787f44021c

  • SHA256

    2f5d54b041e6a8c3bffdb19bed589c840c5d6cfc9cb38f660af6248a15823bd0

  • SHA512

    0a226772f3188569cd5647b0af4c608dee8a88bea5dcbee659bf26995e5b16230ccc30077e26a8d3f76b93c27dfb4eacb21716ecee49e7fd1b3d1a774f926652

  • SSDEEP

    24576:KybXC7MuguZZkUK+ej8tRZ144Y2SRyF+K:RbXi/e+ZY9y

Malware Config

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f5d54b041e6a8c3bffdb19bed589c840c5d6cfc9cb38f660af6248a15823bd0.exe
    "C:\Users\Admin\AppData\Local\Temp\2f5d54b041e6a8c3bffdb19bed589c840c5d6cfc9cb38f660af6248a15823bd0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:396
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihT4131.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihT4131.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4092
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziTe1544.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziTe1544.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4148
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it909656.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it909656.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4236
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr152026.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr152026.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4264
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp787154.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp787154.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2744
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr483888.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr483888.exe
      2⤵
      • Executes dropped EXE
      PID:2124
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 620
        3⤵
        • Program crash
        PID:3508
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 700
        3⤵
        • Program crash
        PID:4100
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 840
        3⤵
        • Program crash
        PID:4824
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 848
        3⤵
        • Program crash
        PID:4844
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 880
        3⤵
        • Program crash
        PID:4276
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 888
        3⤵
        • Program crash
        PID:1800
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 1080
        3⤵
        • Program crash
        PID:3988

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr483888.exe

    Filesize

    258KB

    MD5

    1c6a642d9c07eadf9d5858a8d9023f35

    SHA1

    f3416b9bf9a408a57f28f7a1a4cf22a249ab1d8d

    SHA256

    25a3936838b0e0cbe901e148d93f60c513a0ec08f6e8404bbe090041df70e624

    SHA512

    a05f4e11d4c5ccc61307b10244c5e2fb4e8d739a199b87a7f31db692e2024e6ffca92294ed8400b1e0e25dd96c71e76f9916391734b9f6e51fe6a8807433e390

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr483888.exe

    Filesize

    258KB

    MD5

    1c6a642d9c07eadf9d5858a8d9023f35

    SHA1

    f3416b9bf9a408a57f28f7a1a4cf22a249ab1d8d

    SHA256

    25a3936838b0e0cbe901e148d93f60c513a0ec08f6e8404bbe090041df70e624

    SHA512

    a05f4e11d4c5ccc61307b10244c5e2fb4e8d739a199b87a7f31db692e2024e6ffca92294ed8400b1e0e25dd96c71e76f9916391734b9f6e51fe6a8807433e390

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihT4131.exe

    Filesize

    552KB

    MD5

    b68b9697ee4e83db726ce061325e5cae

    SHA1

    51bda246684f67867134529ccd1043d7bd472a54

    SHA256

    2c3c63fafa7933c8ab87c5b09f51e3fe38b49c848a65b7d1013f141016f1ffdb

    SHA512

    706ddef7cda30bd92747af8cac94da17cb80f63a02fc5b43cfc62e74e3c28b8154fdbf8fba3531cc68dbeb2675f5d54eac57771ba3908ff27914c5bc03544e71

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihT4131.exe

    Filesize

    552KB

    MD5

    b68b9697ee4e83db726ce061325e5cae

    SHA1

    51bda246684f67867134529ccd1043d7bd472a54

    SHA256

    2c3c63fafa7933c8ab87c5b09f51e3fe38b49c848a65b7d1013f141016f1ffdb

    SHA512

    706ddef7cda30bd92747af8cac94da17cb80f63a02fc5b43cfc62e74e3c28b8154fdbf8fba3531cc68dbeb2675f5d54eac57771ba3908ff27914c5bc03544e71

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp787154.exe

    Filesize

    136KB

    MD5

    e48a471cb7bc4ff6a6b32ae6d192dbbb

    SHA1

    d38181853eccf41490641e35b9f2b13e1f6d1711

    SHA256

    ce0d0c494beb02432c1c208d73c07be71fefb4afd34e74a98f188417ca86d21c

    SHA512

    dffde20f58c233b543a9a5e5a4bbdf29767bfb80661541b36c52cd6d53debb6cb3a62d3f7aa76010d06c9b0d74e9b972231eae53cd539f648ec89a85bdc457f6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp787154.exe

    Filesize

    136KB

    MD5

    e48a471cb7bc4ff6a6b32ae6d192dbbb

    SHA1

    d38181853eccf41490641e35b9f2b13e1f6d1711

    SHA256

    ce0d0c494beb02432c1c208d73c07be71fefb4afd34e74a98f188417ca86d21c

    SHA512

    dffde20f58c233b543a9a5e5a4bbdf29767bfb80661541b36c52cd6d53debb6cb3a62d3f7aa76010d06c9b0d74e9b972231eae53cd539f648ec89a85bdc457f6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziTe1544.exe

    Filesize

    398KB

    MD5

    a8ad9301f3e0e1ad72c696129b1063d4

    SHA1

    5f06b90d2132bab92a0cec5afe2abcd7304411df

    SHA256

    d3d733904238bd9259a23efa190e315ba2d90eadd34303c7c5db7d89666ddfb5

    SHA512

    51d0787239d5b0e484fdbed0058efa535cda308cbd661bca1699945ed49461ee8f1c1250e91d4442add7642d68f0761f34431d4c0d9275d74bb9fd69ed27c314

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziTe1544.exe

    Filesize

    398KB

    MD5

    a8ad9301f3e0e1ad72c696129b1063d4

    SHA1

    5f06b90d2132bab92a0cec5afe2abcd7304411df

    SHA256

    d3d733904238bd9259a23efa190e315ba2d90eadd34303c7c5db7d89666ddfb5

    SHA512

    51d0787239d5b0e484fdbed0058efa535cda308cbd661bca1699945ed49461ee8f1c1250e91d4442add7642d68f0761f34431d4c0d9275d74bb9fd69ed27c314

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it909656.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it909656.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr152026.exe

    Filesize

    350KB

    MD5

    7f5558bbce577f81e728d7c5fb7d95c0

    SHA1

    b62c19684fd3cc55bc381ada60b047448478a0f1

    SHA256

    c05b51f75d583ce9b9774bcd92002c0ac11dfa6b6d08b3f410658ec9885270bb

    SHA512

    d7a3ddf2d6e19c81c649a4e956cf83f1e42c433e1ae77f5dcbf1f94d21f0aa253af1cd716be30e442eedf303e062082536c0948431226d466349cf704b1f89e9

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr152026.exe

    Filesize

    350KB

    MD5

    7f5558bbce577f81e728d7c5fb7d95c0

    SHA1

    b62c19684fd3cc55bc381ada60b047448478a0f1

    SHA256

    c05b51f75d583ce9b9774bcd92002c0ac11dfa6b6d08b3f410658ec9885270bb

    SHA512

    d7a3ddf2d6e19c81c649a4e956cf83f1e42c433e1ae77f5dcbf1f94d21f0aa253af1cd716be30e442eedf303e062082536c0948431226d466349cf704b1f89e9

  • memory/2124-969-0x0000000002CA0000-0x0000000002CDB000-memory.dmp

    Filesize

    236KB

  • memory/2744-962-0x0000000007460000-0x00000000074AB000-memory.dmp

    Filesize

    300KB

  • memory/2744-961-0x00000000006E0000-0x0000000000708000-memory.dmp

    Filesize

    160KB

  • memory/2744-963-0x00000000077F0000-0x0000000007800000-memory.dmp

    Filesize

    64KB

  • memory/4236-138-0x0000000000FE0000-0x0000000000FEA000-memory.dmp

    Filesize

    40KB

  • memory/4264-178-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/4264-198-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/4264-150-0x00000000071C0000-0x00000000071D0000-memory.dmp

    Filesize

    64KB

  • memory/4264-151-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/4264-152-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/4264-154-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/4264-156-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/4264-158-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/4264-160-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/4264-164-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/4264-162-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/4264-166-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/4264-168-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/4264-170-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/4264-172-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/4264-174-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/4264-176-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/4264-148-0x00000000071C0000-0x00000000071D0000-memory.dmp

    Filesize

    64KB

  • memory/4264-180-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/4264-182-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/4264-184-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/4264-186-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/4264-188-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/4264-190-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/4264-192-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/4264-194-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/4264-196-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/4264-149-0x00000000071C0000-0x00000000071D0000-memory.dmp

    Filesize

    64KB

  • memory/4264-200-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/4264-202-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/4264-204-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/4264-206-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/4264-208-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/4264-210-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/4264-212-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/4264-214-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/4264-943-0x0000000009B90000-0x000000000A196000-memory.dmp

    Filesize

    6.0MB

  • memory/4264-944-0x000000000A200000-0x000000000A212000-memory.dmp

    Filesize

    72KB

  • memory/4264-945-0x000000000A230000-0x000000000A33A000-memory.dmp

    Filesize

    1.0MB

  • memory/4264-946-0x000000000A350000-0x000000000A38E000-memory.dmp

    Filesize

    248KB

  • memory/4264-947-0x000000000A4D0000-0x000000000A51B000-memory.dmp

    Filesize

    300KB

  • memory/4264-948-0x00000000071C0000-0x00000000071D0000-memory.dmp

    Filesize

    64KB

  • memory/4264-949-0x000000000A660000-0x000000000A6C6000-memory.dmp

    Filesize

    408KB

  • memory/4264-950-0x000000000AD10000-0x000000000ADA2000-memory.dmp

    Filesize

    584KB

  • memory/4264-951-0x000000000ADC0000-0x000000000AE36000-memory.dmp

    Filesize

    472KB

  • memory/4264-147-0x0000000002C90000-0x0000000002CD6000-memory.dmp

    Filesize

    280KB

  • memory/4264-146-0x0000000007180000-0x00000000071BA000-memory.dmp

    Filesize

    232KB

  • memory/4264-145-0x00000000071D0000-0x00000000076CE000-memory.dmp

    Filesize

    5.0MB

  • memory/4264-144-0x0000000007100000-0x000000000713C000-memory.dmp

    Filesize

    240KB

  • memory/4264-952-0x000000000AE80000-0x000000000AE9E000-memory.dmp

    Filesize

    120KB

  • memory/4264-953-0x000000000B050000-0x000000000B212000-memory.dmp

    Filesize

    1.8MB

  • memory/4264-954-0x000000000B220000-0x000000000B74C000-memory.dmp

    Filesize

    5.2MB

  • memory/4264-955-0x0000000004830000-0x0000000004880000-memory.dmp

    Filesize

    320KB