Resubmissions

09-06-2023 07:09

230609-hytmtsca9y 10

09-06-2023 07:05

230609-hwwpeaca8s 10

Analysis

  • max time kernel
    295s
  • max time network
    297s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-06-2023 07:09

General

  • Target

    56de980060e4a4e6619fcda6b716b08278487459a301a1938838b90467531490.exe

  • Size

    218KB

  • MD5

    3367e30e4f2e023419d7b3c4251f854f

  • SHA1

    f364b4426d5ec06f152b0dde69306313f1de34ee

  • SHA256

    56de980060e4a4e6619fcda6b716b08278487459a301a1938838b90467531490

  • SHA512

    6ea512daf807b64acedb2b8e61b1b818ce181f9a56069688b49b1067493613362cd00d14a6e5e849caa2582e85ec46ffa59e15944fdeead54da98a552e76c85b

  • SSDEEP

    3072:meTRJ0kHbnpN23kQKp5XzutZXKGrpeN84LuZAIybiy3xEfbi:FTR2AnpN2wDurXBeBuZAIMEj

Score
10/10

Malware Config

Extracted

Family

amadey

Version

3.83

C2

77.91.68.62/wings/game/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56de980060e4a4e6619fcda6b716b08278487459a301a1938838b90467531490.exe
    "C:\Users\Admin\AppData\Local\Temp\56de980060e4a4e6619fcda6b716b08278487459a301a1938838b90467531490.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
      "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1864
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metado.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:816
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metado.exe" /P "Admin:N"&&CACLS "metado.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3436
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          4⤵
            PID:4928
          • C:\Windows\SysWOW64\cacls.exe
            CACLS "metado.exe" /P "Admin:N"
            4⤵
              PID:4280
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metado.exe" /P "Admin:R" /E
              4⤵
                PID:1980
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                4⤵
                  PID:4060
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\a9e2a16078" /P "Admin:N"
                  4⤵
                    PID:3056
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\a9e2a16078" /P "Admin:R" /E
                    4⤵
                      PID:320
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:2724
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:4260
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:704
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:2648
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:816

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Execution

              Scheduled Task

              1
              T1053

              Persistence

              Scheduled Task

              1
              T1053

              Privilege Escalation

              Scheduled Task

              1
              T1053

              Discovery

              Query Registry

              1
              T1012

              System Information Discovery

              2
              T1082

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                Filesize

                218KB

                MD5

                3367e30e4f2e023419d7b3c4251f854f

                SHA1

                f364b4426d5ec06f152b0dde69306313f1de34ee

                SHA256

                56de980060e4a4e6619fcda6b716b08278487459a301a1938838b90467531490

                SHA512

                6ea512daf807b64acedb2b8e61b1b818ce181f9a56069688b49b1067493613362cd00d14a6e5e849caa2582e85ec46ffa59e15944fdeead54da98a552e76c85b

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                Filesize

                218KB

                MD5

                3367e30e4f2e023419d7b3c4251f854f

                SHA1

                f364b4426d5ec06f152b0dde69306313f1de34ee

                SHA256

                56de980060e4a4e6619fcda6b716b08278487459a301a1938838b90467531490

                SHA512

                6ea512daf807b64acedb2b8e61b1b818ce181f9a56069688b49b1067493613362cd00d14a6e5e849caa2582e85ec46ffa59e15944fdeead54da98a552e76c85b

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                Filesize

                218KB

                MD5

                3367e30e4f2e023419d7b3c4251f854f

                SHA1

                f364b4426d5ec06f152b0dde69306313f1de34ee

                SHA256

                56de980060e4a4e6619fcda6b716b08278487459a301a1938838b90467531490

                SHA512

                6ea512daf807b64acedb2b8e61b1b818ce181f9a56069688b49b1067493613362cd00d14a6e5e849caa2582e85ec46ffa59e15944fdeead54da98a552e76c85b

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                Filesize

                218KB

                MD5

                3367e30e4f2e023419d7b3c4251f854f

                SHA1

                f364b4426d5ec06f152b0dde69306313f1de34ee

                SHA256

                56de980060e4a4e6619fcda6b716b08278487459a301a1938838b90467531490

                SHA512

                6ea512daf807b64acedb2b8e61b1b818ce181f9a56069688b49b1067493613362cd00d14a6e5e849caa2582e85ec46ffa59e15944fdeead54da98a552e76c85b

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                Filesize

                218KB

                MD5

                3367e30e4f2e023419d7b3c4251f854f

                SHA1

                f364b4426d5ec06f152b0dde69306313f1de34ee

                SHA256

                56de980060e4a4e6619fcda6b716b08278487459a301a1938838b90467531490

                SHA512

                6ea512daf807b64acedb2b8e61b1b818ce181f9a56069688b49b1067493613362cd00d14a6e5e849caa2582e85ec46ffa59e15944fdeead54da98a552e76c85b

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                Filesize

                218KB

                MD5

                3367e30e4f2e023419d7b3c4251f854f

                SHA1

                f364b4426d5ec06f152b0dde69306313f1de34ee

                SHA256

                56de980060e4a4e6619fcda6b716b08278487459a301a1938838b90467531490

                SHA512

                6ea512daf807b64acedb2b8e61b1b818ce181f9a56069688b49b1067493613362cd00d14a6e5e849caa2582e85ec46ffa59e15944fdeead54da98a552e76c85b

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                Filesize

                218KB

                MD5

                3367e30e4f2e023419d7b3c4251f854f

                SHA1

                f364b4426d5ec06f152b0dde69306313f1de34ee

                SHA256

                56de980060e4a4e6619fcda6b716b08278487459a301a1938838b90467531490

                SHA512

                6ea512daf807b64acedb2b8e61b1b818ce181f9a56069688b49b1067493613362cd00d14a6e5e849caa2582e85ec46ffa59e15944fdeead54da98a552e76c85b

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                Filesize

                218KB

                MD5

                3367e30e4f2e023419d7b3c4251f854f

                SHA1

                f364b4426d5ec06f152b0dde69306313f1de34ee

                SHA256

                56de980060e4a4e6619fcda6b716b08278487459a301a1938838b90467531490

                SHA512

                6ea512daf807b64acedb2b8e61b1b818ce181f9a56069688b49b1067493613362cd00d14a6e5e849caa2582e85ec46ffa59e15944fdeead54da98a552e76c85b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll
                Filesize

                10B

                MD5

                7605968e79d0ca095ab1231486d2b814

                SHA1

                a007b420d19ceefa840f0373e050e3b51a4ab480

                SHA256

                493fda53120050f85836032324409be6c6484f90a0755ae0c6a673ba7626818b

                SHA512

                769249da7ed6c6bf5671bbc2371a6453b433226ceb8c4c2aa3604000d66647bcec83dee1ab64c0262fa40f923d77e23bad2c47274d339effc51d904ce77072a6