Analysis

  • max time kernel
    143s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21-04-2023 16:11

General

  • Target

    a4786dbb7357c17ad44377b6b5ecbf2f59dde80fe1fe08399e8328a88c31cc2e.exe

  • Size

    949KB

  • MD5

    661b549ff4e763d3df098dc63505d688

  • SHA1

    06b91361eaf5cb585c99a05a2267b5dd1cc63b17

  • SHA256

    a4786dbb7357c17ad44377b6b5ecbf2f59dde80fe1fe08399e8328a88c31cc2e

  • SHA512

    5e2578d1d60ba116fdf733199eea61a5c4bbda195f8423a5fa2b23d88c1bd42974ed6b0298b2f027620e9e3937dc93f8e5e9589a5dc5944207b9844eba1bbf15

  • SSDEEP

    24576:0y6frC3dxgOrIwKKlBR4A7TG/omIJ8Ez0tE:D6fW3dxgN6x4mDJhu

Malware Config

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4786dbb7357c17ad44377b6b5ecbf2f59dde80fe1fe08399e8328a88c31cc2e.exe
    "C:\Users\Admin\AppData\Local\Temp\a4786dbb7357c17ad44377b6b5ecbf2f59dde80fe1fe08399e8328a88c31cc2e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un633971.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un633971.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2152
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un032881.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un032881.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2316
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr483105.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr483105.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2416
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu889610.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu889610.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4664
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk061937.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk061937.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2332
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si559274.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si559274.exe
      2⤵
      • Executes dropped EXE
      PID:2088
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 616
        3⤵
        • Program crash
        PID:3936
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 696
        3⤵
        • Program crash
        PID:2772
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 836
        3⤵
        • Program crash
        PID:4668
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 840
        3⤵
        • Program crash
        PID:1512
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 872
        3⤵
        • Program crash
        PID:3564
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 832
        3⤵
        • Program crash
        PID:2980
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 1076
        3⤵
        • Program crash
        PID:1112

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si559274.exe

    Filesize

    258KB

    MD5

    48d00d0ef3429d45ac2771a386b7c9b3

    SHA1

    a875197b28611463276b4ad012274215adfd5fe7

    SHA256

    0398f35f4f48722ce7f45e707ce7f40dd37ee2191f11378fd52e5bfc97aa548b

    SHA512

    046545ffd083aac6755ef89f64c145a8919b9b7b57a491c23423965778e21a3a71be5f3be8145e686ee07535fc2be906f1e13a78297497ae5bd36a19bac36488

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si559274.exe

    Filesize

    258KB

    MD5

    48d00d0ef3429d45ac2771a386b7c9b3

    SHA1

    a875197b28611463276b4ad012274215adfd5fe7

    SHA256

    0398f35f4f48722ce7f45e707ce7f40dd37ee2191f11378fd52e5bfc97aa548b

    SHA512

    046545ffd083aac6755ef89f64c145a8919b9b7b57a491c23423965778e21a3a71be5f3be8145e686ee07535fc2be906f1e13a78297497ae5bd36a19bac36488

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un633971.exe

    Filesize

    693KB

    MD5

    13ab4c3cd02c1476ffc848733a3d573b

    SHA1

    629f13fe6f6783643b5853f357632a4d1e633004

    SHA256

    ec432d17122860199bb9893bfbf21bfb1e77c83d7a277468344c9b179b23ff72

    SHA512

    97557bbc945f5baee18b2dfe4161bd86bdd3179705ad027052c75be7687f555786e78e06dbabbff43882d2bc6c7b0dd83773c20a7aa93b75b83aa99ef4f804cf

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un633971.exe

    Filesize

    693KB

    MD5

    13ab4c3cd02c1476ffc848733a3d573b

    SHA1

    629f13fe6f6783643b5853f357632a4d1e633004

    SHA256

    ec432d17122860199bb9893bfbf21bfb1e77c83d7a277468344c9b179b23ff72

    SHA512

    97557bbc945f5baee18b2dfe4161bd86bdd3179705ad027052c75be7687f555786e78e06dbabbff43882d2bc6c7b0dd83773c20a7aa93b75b83aa99ef4f804cf

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk061937.exe

    Filesize

    136KB

    MD5

    e48a471cb7bc4ff6a6b32ae6d192dbbb

    SHA1

    d38181853eccf41490641e35b9f2b13e1f6d1711

    SHA256

    ce0d0c494beb02432c1c208d73c07be71fefb4afd34e74a98f188417ca86d21c

    SHA512

    dffde20f58c233b543a9a5e5a4bbdf29767bfb80661541b36c52cd6d53debb6cb3a62d3f7aa76010d06c9b0d74e9b972231eae53cd539f648ec89a85bdc457f6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk061937.exe

    Filesize

    136KB

    MD5

    e48a471cb7bc4ff6a6b32ae6d192dbbb

    SHA1

    d38181853eccf41490641e35b9f2b13e1f6d1711

    SHA256

    ce0d0c494beb02432c1c208d73c07be71fefb4afd34e74a98f188417ca86d21c

    SHA512

    dffde20f58c233b543a9a5e5a4bbdf29767bfb80661541b36c52cd6d53debb6cb3a62d3f7aa76010d06c9b0d74e9b972231eae53cd539f648ec89a85bdc457f6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un032881.exe

    Filesize

    539KB

    MD5

    8d651c6732d88d26d34afba78d0d9518

    SHA1

    4d2a41a95f3c01f76b546e1c9a6de2e73e583a38

    SHA256

    8979c9002a61e6eb78c838513ed469f143f1d031b17bc3b3c06d4b3c471cb292

    SHA512

    8b36b611a1a6a1591b7e22d1a775c3a9d5d9f0bf57d295c6043aa5a97b40d741b42fc01e8b07cbd6ebad8f37a03e1966593620cbd367fdff62d4a2c4ccd4c233

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un032881.exe

    Filesize

    539KB

    MD5

    8d651c6732d88d26d34afba78d0d9518

    SHA1

    4d2a41a95f3c01f76b546e1c9a6de2e73e583a38

    SHA256

    8979c9002a61e6eb78c838513ed469f143f1d031b17bc3b3c06d4b3c471cb292

    SHA512

    8b36b611a1a6a1591b7e22d1a775c3a9d5d9f0bf57d295c6043aa5a97b40d741b42fc01e8b07cbd6ebad8f37a03e1966593620cbd367fdff62d4a2c4ccd4c233

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr483105.exe

    Filesize

    278KB

    MD5

    0b563ae43819d59d7e185e4642689a3b

    SHA1

    908278d1fa8b9e8ba0d460a3a69c627284794152

    SHA256

    438cb8b5b1229019e606c452a54957174788fa67c16a6ebf1ca4a8724df9d548

    SHA512

    39af45d788ff32863ee63f19c7ff72c45ce2e873d2e4086e5132d1bf3835c3859300a20b912c2494eae9216612d354d8f138a2bc3484234792f11c73a97dc453

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr483105.exe

    Filesize

    278KB

    MD5

    0b563ae43819d59d7e185e4642689a3b

    SHA1

    908278d1fa8b9e8ba0d460a3a69c627284794152

    SHA256

    438cb8b5b1229019e606c452a54957174788fa67c16a6ebf1ca4a8724df9d548

    SHA512

    39af45d788ff32863ee63f19c7ff72c45ce2e873d2e4086e5132d1bf3835c3859300a20b912c2494eae9216612d354d8f138a2bc3484234792f11c73a97dc453

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu889610.exe

    Filesize

    350KB

    MD5

    30845e9799056eed9e77d08e8798e191

    SHA1

    3f9cde5a0ccff2bf2adfa1e39c22dfad3f418b7a

    SHA256

    0cd78fdafe09a52ac4561601d44a4fcd205b264bdca96e1309d7c00467f8c61b

    SHA512

    98e029404bc229ef9894b88f7a05c6b2a4effaf275179e20b286e9e75def14f30fa903309e88813d823eae035c640549df731f5065a7d57fca1c756ecc2e9346

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu889610.exe

    Filesize

    350KB

    MD5

    30845e9799056eed9e77d08e8798e191

    SHA1

    3f9cde5a0ccff2bf2adfa1e39c22dfad3f418b7a

    SHA256

    0cd78fdafe09a52ac4561601d44a4fcd205b264bdca96e1309d7c00467f8c61b

    SHA512

    98e029404bc229ef9894b88f7a05c6b2a4effaf275179e20b286e9e75def14f30fa903309e88813d823eae035c640549df731f5065a7d57fca1c756ecc2e9346

  • memory/2088-1012-0x0000000002BA0000-0x0000000002BDB000-memory.dmp

    Filesize

    236KB

  • memory/2332-1004-0x00000000009D0000-0x00000000009F8000-memory.dmp

    Filesize

    160KB

  • memory/2332-1006-0x0000000007710000-0x0000000007720000-memory.dmp

    Filesize

    64KB

  • memory/2332-1005-0x0000000007760000-0x00000000077AB000-memory.dmp

    Filesize

    300KB

  • memory/2416-166-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2416-161-0x00000000048B0000-0x00000000048C2000-memory.dmp

    Filesize

    72KB

  • memory/2416-157-0x00000000048B0000-0x00000000048C2000-memory.dmp

    Filesize

    72KB

  • memory/2416-163-0x00000000048B0000-0x00000000048C2000-memory.dmp

    Filesize

    72KB

  • memory/2416-149-0x00000000048B0000-0x00000000048C2000-memory.dmp

    Filesize

    72KB

  • memory/2416-165-0x00000000048B0000-0x00000000048C2000-memory.dmp

    Filesize

    72KB

  • memory/2416-168-0x00000000072F0000-0x0000000007300000-memory.dmp

    Filesize

    64KB

  • memory/2416-170-0x00000000072F0000-0x0000000007300000-memory.dmp

    Filesize

    64KB

  • memory/2416-169-0x00000000048B0000-0x00000000048C2000-memory.dmp

    Filesize

    72KB

  • memory/2416-173-0x00000000048B0000-0x00000000048C2000-memory.dmp

    Filesize

    72KB

  • memory/2416-177-0x00000000048B0000-0x00000000048C2000-memory.dmp

    Filesize

    72KB

  • memory/2416-175-0x00000000048B0000-0x00000000048C2000-memory.dmp

    Filesize

    72KB

  • memory/2416-172-0x00000000072F0000-0x0000000007300000-memory.dmp

    Filesize

    64KB

  • memory/2416-155-0x00000000048B0000-0x00000000048C2000-memory.dmp

    Filesize

    72KB

  • memory/2416-159-0x00000000048B0000-0x00000000048C2000-memory.dmp

    Filesize

    72KB

  • memory/2416-153-0x00000000048B0000-0x00000000048C2000-memory.dmp

    Filesize

    72KB

  • memory/2416-151-0x00000000048B0000-0x00000000048C2000-memory.dmp

    Filesize

    72KB

  • memory/2416-178-0x0000000000400000-0x0000000002BA0000-memory.dmp

    Filesize

    39.6MB

  • memory/2416-180-0x0000000000400000-0x0000000002BA0000-memory.dmp

    Filesize

    39.6MB

  • memory/2416-181-0x00000000072F0000-0x0000000007300000-memory.dmp

    Filesize

    64KB

  • memory/2416-146-0x00000000048B0000-0x00000000048C2000-memory.dmp

    Filesize

    72KB

  • memory/2416-147-0x00000000048B0000-0x00000000048C2000-memory.dmp

    Filesize

    72KB

  • memory/2416-145-0x00000000048B0000-0x00000000048C8000-memory.dmp

    Filesize

    96KB

  • memory/2416-144-0x0000000007300000-0x00000000077FE000-memory.dmp

    Filesize

    5.0MB

  • memory/2416-143-0x0000000002E10000-0x0000000002E2A000-memory.dmp

    Filesize

    104KB

  • memory/4664-188-0x00000000076F0000-0x0000000007725000-memory.dmp

    Filesize

    212KB

  • memory/4664-191-0x00000000076F0000-0x0000000007725000-memory.dmp

    Filesize

    212KB

  • memory/4664-201-0x00000000076F0000-0x0000000007725000-memory.dmp

    Filesize

    212KB

  • memory/4664-203-0x00000000076F0000-0x0000000007725000-memory.dmp

    Filesize

    212KB

  • memory/4664-199-0x00000000076F0000-0x0000000007725000-memory.dmp

    Filesize

    212KB

  • memory/4664-205-0x00000000076F0000-0x0000000007725000-memory.dmp

    Filesize

    212KB

  • memory/4664-207-0x00000000076F0000-0x0000000007725000-memory.dmp

    Filesize

    212KB

  • memory/4664-189-0x00000000076F0000-0x0000000007725000-memory.dmp

    Filesize

    212KB

  • memory/4664-211-0x00000000076F0000-0x0000000007725000-memory.dmp

    Filesize

    212KB

  • memory/4664-213-0x00000000076F0000-0x0000000007725000-memory.dmp

    Filesize

    212KB

  • memory/4664-215-0x00000000076F0000-0x0000000007725000-memory.dmp

    Filesize

    212KB

  • memory/4664-219-0x00000000076F0000-0x0000000007725000-memory.dmp

    Filesize

    212KB

  • memory/4664-221-0x00000000076F0000-0x0000000007725000-memory.dmp

    Filesize

    212KB

  • memory/4664-217-0x00000000076F0000-0x0000000007725000-memory.dmp

    Filesize

    212KB

  • memory/4664-230-0x0000000002BC0000-0x0000000002C06000-memory.dmp

    Filesize

    280KB

  • memory/4664-209-0x00000000076F0000-0x0000000007725000-memory.dmp

    Filesize

    212KB

  • memory/4664-231-0x00000000048A0000-0x00000000048B0000-memory.dmp

    Filesize

    64KB

  • memory/4664-234-0x00000000048A0000-0x00000000048B0000-memory.dmp

    Filesize

    64KB

  • memory/4664-983-0x0000000009BF0000-0x000000000A1F6000-memory.dmp

    Filesize

    6.0MB

  • memory/4664-984-0x0000000004CC0000-0x0000000004CD2000-memory.dmp

    Filesize

    72KB

  • memory/4664-985-0x000000000A240000-0x000000000A34A000-memory.dmp

    Filesize

    1.0MB

  • memory/4664-986-0x000000000A350000-0x000000000A38E000-memory.dmp

    Filesize

    248KB

  • memory/4664-987-0x00000000048A0000-0x00000000048B0000-memory.dmp

    Filesize

    64KB

  • memory/4664-988-0x000000000A4D0000-0x000000000A51B000-memory.dmp

    Filesize

    300KB

  • memory/4664-989-0x000000000A660000-0x000000000A6C6000-memory.dmp

    Filesize

    408KB

  • memory/4664-990-0x000000000AD10000-0x000000000ADA2000-memory.dmp

    Filesize

    584KB

  • memory/4664-992-0x000000000AEE0000-0x000000000AF56000-memory.dmp

    Filesize

    472KB

  • memory/4664-993-0x000000000AFA0000-0x000000000B162000-memory.dmp

    Filesize

    1.8MB

  • memory/4664-995-0x00000000048A0000-0x00000000048B0000-memory.dmp

    Filesize

    64KB

  • memory/4664-994-0x00000000048A0000-0x00000000048B0000-memory.dmp

    Filesize

    64KB

  • memory/4664-197-0x00000000076F0000-0x0000000007725000-memory.dmp

    Filesize

    212KB

  • memory/4664-193-0x00000000076F0000-0x0000000007725000-memory.dmp

    Filesize

    212KB

  • memory/4664-195-0x00000000076F0000-0x0000000007725000-memory.dmp

    Filesize

    212KB

  • memory/4664-187-0x00000000076F0000-0x000000000772A000-memory.dmp

    Filesize

    232KB

  • memory/4664-186-0x00000000049E0000-0x0000000004A1C000-memory.dmp

    Filesize

    240KB

  • memory/4664-996-0x000000000B180000-0x000000000B6AC000-memory.dmp

    Filesize

    5.2MB

  • memory/4664-997-0x000000000B7D0000-0x000000000B7EE000-memory.dmp

    Filesize

    120KB

  • memory/4664-998-0x0000000004D00000-0x0000000004D50000-memory.dmp

    Filesize

    320KB