Behavioral task
behavioral1
Sample
6e01f9d1997186d06274a508bc0a511aa6fb50e430b77efca593c00d3fc62cba.exe
Resource
win7-20230220-en
General
-
Target
aa9fa7808dca4fd4cadab28cabbc3266.bin
-
Size
105KB
-
MD5
ce66113b5e403e5215b03860b2b69eed
-
SHA1
1166000dad749bf3fcf0a240cd57fa08292a1f85
-
SHA256
615a0a7ec163d19049db7337697a7d3ee3ec22e2459e9470c1b9603ee0770db9
-
SHA512
fef57fde0f62c45ff7121472e4006eb18e79b974ee985b82b660a06206aac72cfa89a8e5d224490c8f64f5107efcde28a89e1c5437a481f55cc45c98c49380d8
-
SSDEEP
3072:mdKp9QrZouSTyaOlCoXdWa2e+9a1EfzU/4Lap:mspaZoEaWRDnYa1EbUgLa
Malware Config
Extracted
amadey
3.20
happyday9risce.com/gg4mn3s/index.php
xksldjf9sksdjfks.com/gg4mn3s/index.php
dhisa8f9ah02hopasiaf.com/gg4mn3s/index.php
Signatures
-
Amadey family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/6e01f9d1997186d06274a508bc0a511aa6fb50e430b77efca593c00d3fc62cba.exe
Files
-
aa9fa7808dca4fd4cadab28cabbc3266.bin.zip
Password: infected
-
6e01f9d1997186d06274a508bc0a511aa6fb50e430b77efca593c00d3fc62cba.exe.exe windows x86
Password: infected
dd9df9b9e52b22adb197dae219c6a26b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
Sleep
GetLastError
GetFileAttributesA
CreateFileA
CloseHandle
GetSystemInfo
CreateThread
HeapAlloc
GetThreadContext
GetProcAddress
ResumeThread
LocalFree
GetFileSize
ReadProcessMemory
GetProcessHeap
CreateProcessA
CreateDirectoryA
SetThreadContext
WriteConsoleW
SetEndOfFile
HeapReAlloc
HeapSize
GetTimeZoneInformation
GetComputerNameExW
SuspendThread
GetVersionExW
WaitForSingleObject
GetTempPathW
CreateMutexW
GetModuleFileNameW
VirtualAlloc
WriteFile
VirtualFree
HeapFree
WriteProcessMemory
GetModuleFileNameA
VirtualAllocEx
ReadFile
FlushFileBuffers
GetStringTypeW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
ReadConsoleW
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleCP
SetStdHandle
GetFullPathNameW
GetCurrentDirectoryW
DeleteFileW
DecodePointer
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetCurrentProcess
TerminateProcess
RaiseException
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
RtlUnwind
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
CreateFileW
GetDriveTypeW
GetFileInformationByHandle
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetStdHandle
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
CompareStringW
LCMapStringW
user32
GetSystemMetrics
ReleaseDC
GetDC
gdi32
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
DeleteObject
BitBlt
advapi32
RegGetValueA
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
ConvertSidToStringSidW
GetUserNameW
LookupAccountNameW
RegCloseKey
shell32
ShellExecuteA
ord680
ShellExecuteExW
wininet
HttpOpenRequestA
InternetOpenUrlW
InternetReadFile
InternetConnectA
HttpSendRequestA
InternetCloseHandle
InternetOpenA
HttpAddRequestHeadersA
HttpSendRequestExW
HttpEndRequestW
InternetOpenW
InternetOpenUrlA
InternetWriteFile
gdiplus
GdipSaveImageToFile
GdipGetImageEncodersSize
GdipDisposeImage
GdipCreateBitmapFromHBITMAP
GdipGetImageEncoders
GdiplusShutdown
GdiplusStartup
Sections
.text Size: 166KB - Virtual size: 166KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ