Analysis

  • max time kernel
    182s
  • max time network
    188s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 20:31

General

  • Target

    0x00030000000007332446.exe

  • Size

    230KB

  • MD5

    decc8fbbe94e8960d204616c23a460c8

  • SHA1

    5aaf2619a1f66ea937cc543d7ffe0db2f145ef2a

  • SHA256

    adf3cb3699574f5562fb0ccd93a72437d5236bfb2d3d94508488a2596faff374

  • SHA512

    b7b36a22f21881ed0da377d4dffca3cda80fb305f84981cdcf380739ca7cccb06a03e49581f82c2c9b145e2524989f51b1554d57e4351f4f84c383cc276b3b7e

  • SSDEEP

    6144:mKVNIG75NpcElElt/DgK1yuFShFBr2D+:/5KE6LguFS7BB

Score
10/10

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0x00030000000007332446.exe
    "C:\Users\Admin\AppData\Local\Temp\0x00030000000007332446.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
      "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1180
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:760
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
        3⤵
        • Loads dropped DLL
        PID:1320
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {7627CC9B-C9D5-412C-B661-E18B3D5518DD} S-1-5-21-3499517378-2376672570-1134980332-1000:MLXLFKOI\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1244
    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
      C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
      2⤵
      • Executes dropped EXE
      PID:1372
    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
      C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
      2⤵
      • Executes dropped EXE
      PID:540

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          230KB

          MD5

          decc8fbbe94e8960d204616c23a460c8

          SHA1

          5aaf2619a1f66ea937cc543d7ffe0db2f145ef2a

          SHA256

          adf3cb3699574f5562fb0ccd93a72437d5236bfb2d3d94508488a2596faff374

          SHA512

          b7b36a22f21881ed0da377d4dffca3cda80fb305f84981cdcf380739ca7cccb06a03e49581f82c2c9b145e2524989f51b1554d57e4351f4f84c383cc276b3b7e

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          230KB

          MD5

          decc8fbbe94e8960d204616c23a460c8

          SHA1

          5aaf2619a1f66ea937cc543d7ffe0db2f145ef2a

          SHA256

          adf3cb3699574f5562fb0ccd93a72437d5236bfb2d3d94508488a2596faff374

          SHA512

          b7b36a22f21881ed0da377d4dffca3cda80fb305f84981cdcf380739ca7cccb06a03e49581f82c2c9b145e2524989f51b1554d57e4351f4f84c383cc276b3b7e

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          230KB

          MD5

          decc8fbbe94e8960d204616c23a460c8

          SHA1

          5aaf2619a1f66ea937cc543d7ffe0db2f145ef2a

          SHA256

          adf3cb3699574f5562fb0ccd93a72437d5236bfb2d3d94508488a2596faff374

          SHA512

          b7b36a22f21881ed0da377d4dffca3cda80fb305f84981cdcf380739ca7cccb06a03e49581f82c2c9b145e2524989f51b1554d57e4351f4f84c383cc276b3b7e

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          230KB

          MD5

          decc8fbbe94e8960d204616c23a460c8

          SHA1

          5aaf2619a1f66ea937cc543d7ffe0db2f145ef2a

          SHA256

          adf3cb3699574f5562fb0ccd93a72437d5236bfb2d3d94508488a2596faff374

          SHA512

          b7b36a22f21881ed0da377d4dffca3cda80fb305f84981cdcf380739ca7cccb06a03e49581f82c2c9b145e2524989f51b1554d57e4351f4f84c383cc276b3b7e

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          230KB

          MD5

          decc8fbbe94e8960d204616c23a460c8

          SHA1

          5aaf2619a1f66ea937cc543d7ffe0db2f145ef2a

          SHA256

          adf3cb3699574f5562fb0ccd93a72437d5236bfb2d3d94508488a2596faff374

          SHA512

          b7b36a22f21881ed0da377d4dffca3cda80fb305f84981cdcf380739ca7cccb06a03e49581f82c2c9b145e2524989f51b1554d57e4351f4f84c383cc276b3b7e

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

          Filesize

          162B

          MD5

          1b7c22a214949975556626d7217e9a39

          SHA1

          d01c97e2944166ed23e47e4a62ff471ab8fa031f

          SHA256

          340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

          SHA512

          ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

        • \Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          230KB

          MD5

          decc8fbbe94e8960d204616c23a460c8

          SHA1

          5aaf2619a1f66ea937cc543d7ffe0db2f145ef2a

          SHA256

          adf3cb3699574f5562fb0ccd93a72437d5236bfb2d3d94508488a2596faff374

          SHA512

          b7b36a22f21881ed0da377d4dffca3cda80fb305f84981cdcf380739ca7cccb06a03e49581f82c2c9b145e2524989f51b1554d57e4351f4f84c383cc276b3b7e

        • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • memory/1504-57-0x0000000000310000-0x0000000000311000-memory.dmp

          Filesize

          4KB