Analysis

  • max time kernel
    31s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    10-06-2023 02:43

General

  • Target

    ceede3f9fd6591b7ddebd806034806085ad914dbea25723a5e08b11de5589879.exe

  • Size

    854KB

  • MD5

    fe68c6db610d15931ad740d93cb58f7c

  • SHA1

    f43d3445b8fb31461870265acc7e943da5d7a481

  • SHA256

    ceede3f9fd6591b7ddebd806034806085ad914dbea25723a5e08b11de5589879

  • SHA512

    47e36f21c6b293421a6e195919f24a58c6ad4965ec5e01264f283d2e054b5bd312b1e23a697377f11d9b251463e36044bf7bac3947e4ca60817853c98455b962

  • SSDEEP

    24576:vy1elPne8Arqw4hfW2FB9yPPEUKBT5A7OXZYSDOvhyP:61CeJr8fWuW8BT5Aapnt

Malware Config

Extracted

Family

amadey

Version

3.83

C2

77.91.68.30/music/rock/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 14 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ceede3f9fd6591b7ddebd806034806085ad914dbea25723a5e08b11de5589879.exe
    "C:\Users\Admin\AppData\Local\Temp\ceede3f9fd6591b7ddebd806034806085ad914dbea25723a5e08b11de5589879.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7526372.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7526372.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1716
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1083289.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1083289.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:552
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6417704.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6417704.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:596
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6974990.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6974990.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:320
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
              6⤵
              • Loads dropped DLL
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of WriteProcessMemory
              PID:1872
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:1032
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0883307.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0883307.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1788
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
              6⤵
                PID:1336

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7526372.exe
      Filesize

      633KB

      MD5

      2130ded0f9f9e56854e6eec7c0201ba5

      SHA1

      cacea4f769e521419891638c2083c469d018b35c

      SHA256

      9c48ddf7726bd5714409a81893b1356010871f40cb323eb5717acbdf95eb9bc3

      SHA512

      776abe7ecb5c385dc014d39ea77df1a854d9858ead6fe6fe66939b48ec4bda459f1ae43469202a7e0462ec6f349986d090fd1c625cf5c421674edea99cd5877e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7526372.exe
      Filesize

      633KB

      MD5

      2130ded0f9f9e56854e6eec7c0201ba5

      SHA1

      cacea4f769e521419891638c2083c469d018b35c

      SHA256

      9c48ddf7726bd5714409a81893b1356010871f40cb323eb5717acbdf95eb9bc3

      SHA512

      776abe7ecb5c385dc014d39ea77df1a854d9858ead6fe6fe66939b48ec4bda459f1ae43469202a7e0462ec6f349986d090fd1c625cf5c421674edea99cd5877e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1083289.exe
      Filesize

      461KB

      MD5

      1f2e3dbe4b1dbf625bbbb8f1cbba0996

      SHA1

      4752bd3fc17132d313a60fbfae270d9eb3c2f24c

      SHA256

      b273cef3698faf145c608d09a1df22e6b35ee6f1148cacb2ed9be8f856f23c49

      SHA512

      6a6cc00da3f3110be28d7ba6168a2f3b5f321e96461d1486271bcd11972910d77aac74b5ad262bb308b32d86d0167abbe71aef389ac3b4daa3adc7d54d483d52

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1083289.exe
      Filesize

      461KB

      MD5

      1f2e3dbe4b1dbf625bbbb8f1cbba0996

      SHA1

      4752bd3fc17132d313a60fbfae270d9eb3c2f24c

      SHA256

      b273cef3698faf145c608d09a1df22e6b35ee6f1148cacb2ed9be8f856f23c49

      SHA512

      6a6cc00da3f3110be28d7ba6168a2f3b5f321e96461d1486271bcd11972910d77aac74b5ad262bb308b32d86d0167abbe71aef389ac3b4daa3adc7d54d483d52

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6417704.exe
      Filesize

      305KB

      MD5

      f24cf69bc5a73007bf4972b67220f58e

      SHA1

      6bb74a84992011ea9b0ebfbd7cb6036784ff7908

      SHA256

      11a372dca0b0569f39680239bb119c5ee302749d2f4136dbb90899d1e01dcb70

      SHA512

      a77f4fa9ba83653f954ee3b628714cabd06a26f19e9556ab7bfc2cf084c6fc3da69e4a0dfb8acdaa62244e2086efddd8600bf5baf554c1331ade55159954bac3

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6417704.exe
      Filesize

      305KB

      MD5

      f24cf69bc5a73007bf4972b67220f58e

      SHA1

      6bb74a84992011ea9b0ebfbd7cb6036784ff7908

      SHA256

      11a372dca0b0569f39680239bb119c5ee302749d2f4136dbb90899d1e01dcb70

      SHA512

      a77f4fa9ba83653f954ee3b628714cabd06a26f19e9556ab7bfc2cf084c6fc3da69e4a0dfb8acdaa62244e2086efddd8600bf5baf554c1331ade55159954bac3

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6974990.exe
      Filesize

      335KB

      MD5

      fb499f7140474e084e1ad3acd0440c4d

      SHA1

      7212734802b454e2f9816436f84d0aa37509010c

      SHA256

      a4f7aac33047fbf909d7364596a59c720fdf0a940144433de008ce352c602525

      SHA512

      25fee238de0aa8b4f31300c00bf909c6c724f7520e4de7efa03d3256ff7eb19611d4987385db55c63509aef257985a6c9779055f278a43ec521609773ce51ec1

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6974990.exe
      Filesize

      335KB

      MD5

      fb499f7140474e084e1ad3acd0440c4d

      SHA1

      7212734802b454e2f9816436f84d0aa37509010c

      SHA256

      a4f7aac33047fbf909d7364596a59c720fdf0a940144433de008ce352c602525

      SHA512

      25fee238de0aa8b4f31300c00bf909c6c724f7520e4de7efa03d3256ff7eb19611d4987385db55c63509aef257985a6c9779055f278a43ec521609773ce51ec1

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6974990.exe
      Filesize

      335KB

      MD5

      fb499f7140474e084e1ad3acd0440c4d

      SHA1

      7212734802b454e2f9816436f84d0aa37509010c

      SHA256

      a4f7aac33047fbf909d7364596a59c720fdf0a940144433de008ce352c602525

      SHA512

      25fee238de0aa8b4f31300c00bf909c6c724f7520e4de7efa03d3256ff7eb19611d4987385db55c63509aef257985a6c9779055f278a43ec521609773ce51ec1

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0883307.exe
      Filesize

      141KB

      MD5

      5671fae6637c4285d6d3e0371788a43f

      SHA1

      f7d1935a8543bb01f8b7065b41e2a10e7b99f549

      SHA256

      3e42afbdfc8c566812971b8d3b825d86ff7e3912ad583c48cbb0e6d333de666a

      SHA512

      7fdabc8f3b2fd46a09ae2ce7b519a71ecee738822f60a59c1efb41aa02004a812a128c10fe0a9127e8541d1849f9c7d00c22aeb63c70ea1e4755397872bb3883

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0883307.exe
      Filesize

      141KB

      MD5

      5671fae6637c4285d6d3e0371788a43f

      SHA1

      f7d1935a8543bb01f8b7065b41e2a10e7b99f549

      SHA256

      3e42afbdfc8c566812971b8d3b825d86ff7e3912ad583c48cbb0e6d333de666a

      SHA512

      7fdabc8f3b2fd46a09ae2ce7b519a71ecee738822f60a59c1efb41aa02004a812a128c10fe0a9127e8541d1849f9c7d00c22aeb63c70ea1e4755397872bb3883

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0883307.exe
      Filesize

      141KB

      MD5

      5671fae6637c4285d6d3e0371788a43f

      SHA1

      f7d1935a8543bb01f8b7065b41e2a10e7b99f549

      SHA256

      3e42afbdfc8c566812971b8d3b825d86ff7e3912ad583c48cbb0e6d333de666a

      SHA512

      7fdabc8f3b2fd46a09ae2ce7b519a71ecee738822f60a59c1efb41aa02004a812a128c10fe0a9127e8541d1849f9c7d00c22aeb63c70ea1e4755397872bb3883

    • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
      Filesize

      96KB

      MD5

      7825cad99621dd288da81d8d8ae13cf5

      SHA1

      f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c

      SHA256

      529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5

      SHA512

      2e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4

    • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
      Filesize

      96KB

      MD5

      7825cad99621dd288da81d8d8ae13cf5

      SHA1

      f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c

      SHA256

      529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5

      SHA512

      2e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4

    • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
      Filesize

      96KB

      MD5

      7825cad99621dd288da81d8d8ae13cf5

      SHA1

      f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c

      SHA256

      529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5

      SHA512

      2e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v7526372.exe
      Filesize

      633KB

      MD5

      2130ded0f9f9e56854e6eec7c0201ba5

      SHA1

      cacea4f769e521419891638c2083c469d018b35c

      SHA256

      9c48ddf7726bd5714409a81893b1356010871f40cb323eb5717acbdf95eb9bc3

      SHA512

      776abe7ecb5c385dc014d39ea77df1a854d9858ead6fe6fe66939b48ec4bda459f1ae43469202a7e0462ec6f349986d090fd1c625cf5c421674edea99cd5877e

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v7526372.exe
      Filesize

      633KB

      MD5

      2130ded0f9f9e56854e6eec7c0201ba5

      SHA1

      cacea4f769e521419891638c2083c469d018b35c

      SHA256

      9c48ddf7726bd5714409a81893b1356010871f40cb323eb5717acbdf95eb9bc3

      SHA512

      776abe7ecb5c385dc014d39ea77df1a854d9858ead6fe6fe66939b48ec4bda459f1ae43469202a7e0462ec6f349986d090fd1c625cf5c421674edea99cd5877e

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v1083289.exe
      Filesize

      461KB

      MD5

      1f2e3dbe4b1dbf625bbbb8f1cbba0996

      SHA1

      4752bd3fc17132d313a60fbfae270d9eb3c2f24c

      SHA256

      b273cef3698faf145c608d09a1df22e6b35ee6f1148cacb2ed9be8f856f23c49

      SHA512

      6a6cc00da3f3110be28d7ba6168a2f3b5f321e96461d1486271bcd11972910d77aac74b5ad262bb308b32d86d0167abbe71aef389ac3b4daa3adc7d54d483d52

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v1083289.exe
      Filesize

      461KB

      MD5

      1f2e3dbe4b1dbf625bbbb8f1cbba0996

      SHA1

      4752bd3fc17132d313a60fbfae270d9eb3c2f24c

      SHA256

      b273cef3698faf145c608d09a1df22e6b35ee6f1148cacb2ed9be8f856f23c49

      SHA512

      6a6cc00da3f3110be28d7ba6168a2f3b5f321e96461d1486271bcd11972910d77aac74b5ad262bb308b32d86d0167abbe71aef389ac3b4daa3adc7d54d483d52

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v6417704.exe
      Filesize

      305KB

      MD5

      f24cf69bc5a73007bf4972b67220f58e

      SHA1

      6bb74a84992011ea9b0ebfbd7cb6036784ff7908

      SHA256

      11a372dca0b0569f39680239bb119c5ee302749d2f4136dbb90899d1e01dcb70

      SHA512

      a77f4fa9ba83653f954ee3b628714cabd06a26f19e9556ab7bfc2cf084c6fc3da69e4a0dfb8acdaa62244e2086efddd8600bf5baf554c1331ade55159954bac3

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v6417704.exe
      Filesize

      305KB

      MD5

      f24cf69bc5a73007bf4972b67220f58e

      SHA1

      6bb74a84992011ea9b0ebfbd7cb6036784ff7908

      SHA256

      11a372dca0b0569f39680239bb119c5ee302749d2f4136dbb90899d1e01dcb70

      SHA512

      a77f4fa9ba83653f954ee3b628714cabd06a26f19e9556ab7bfc2cf084c6fc3da69e4a0dfb8acdaa62244e2086efddd8600bf5baf554c1331ade55159954bac3

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a6974990.exe
      Filesize

      335KB

      MD5

      fb499f7140474e084e1ad3acd0440c4d

      SHA1

      7212734802b454e2f9816436f84d0aa37509010c

      SHA256

      a4f7aac33047fbf909d7364596a59c720fdf0a940144433de008ce352c602525

      SHA512

      25fee238de0aa8b4f31300c00bf909c6c724f7520e4de7efa03d3256ff7eb19611d4987385db55c63509aef257985a6c9779055f278a43ec521609773ce51ec1

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a6974990.exe
      Filesize

      335KB

      MD5

      fb499f7140474e084e1ad3acd0440c4d

      SHA1

      7212734802b454e2f9816436f84d0aa37509010c

      SHA256

      a4f7aac33047fbf909d7364596a59c720fdf0a940144433de008ce352c602525

      SHA512

      25fee238de0aa8b4f31300c00bf909c6c724f7520e4de7efa03d3256ff7eb19611d4987385db55c63509aef257985a6c9779055f278a43ec521609773ce51ec1

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a6974990.exe
      Filesize

      335KB

      MD5

      fb499f7140474e084e1ad3acd0440c4d

      SHA1

      7212734802b454e2f9816436f84d0aa37509010c

      SHA256

      a4f7aac33047fbf909d7364596a59c720fdf0a940144433de008ce352c602525

      SHA512

      25fee238de0aa8b4f31300c00bf909c6c724f7520e4de7efa03d3256ff7eb19611d4987385db55c63509aef257985a6c9779055f278a43ec521609773ce51ec1

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b0883307.exe
      Filesize

      141KB

      MD5

      5671fae6637c4285d6d3e0371788a43f

      SHA1

      f7d1935a8543bb01f8b7065b41e2a10e7b99f549

      SHA256

      3e42afbdfc8c566812971b8d3b825d86ff7e3912ad583c48cbb0e6d333de666a

      SHA512

      7fdabc8f3b2fd46a09ae2ce7b519a71ecee738822f60a59c1efb41aa02004a812a128c10fe0a9127e8541d1849f9c7d00c22aeb63c70ea1e4755397872bb3883

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b0883307.exe
      Filesize

      141KB

      MD5

      5671fae6637c4285d6d3e0371788a43f

      SHA1

      f7d1935a8543bb01f8b7065b41e2a10e7b99f549

      SHA256

      3e42afbdfc8c566812971b8d3b825d86ff7e3912ad583c48cbb0e6d333de666a

      SHA512

      7fdabc8f3b2fd46a09ae2ce7b519a71ecee738822f60a59c1efb41aa02004a812a128c10fe0a9127e8541d1849f9c7d00c22aeb63c70ea1e4755397872bb3883

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b0883307.exe
      Filesize

      141KB

      MD5

      5671fae6637c4285d6d3e0371788a43f

      SHA1

      f7d1935a8543bb01f8b7065b41e2a10e7b99f549

      SHA256

      3e42afbdfc8c566812971b8d3b825d86ff7e3912ad583c48cbb0e6d333de666a

      SHA512

      7fdabc8f3b2fd46a09ae2ce7b519a71ecee738822f60a59c1efb41aa02004a812a128c10fe0a9127e8541d1849f9c7d00c22aeb63c70ea1e4755397872bb3883

    • \Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
      Filesize

      96KB

      MD5

      7825cad99621dd288da81d8d8ae13cf5

      SHA1

      f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c

      SHA256

      529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5

      SHA512

      2e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4

    • \Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
      Filesize

      96KB

      MD5

      7825cad99621dd288da81d8d8ae13cf5

      SHA1

      f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c

      SHA256

      529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5

      SHA512

      2e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4

    • memory/1336-121-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB

    • memory/1336-125-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB

    • memory/1872-107-0x0000000000090000-0x00000000000C8000-memory.dmp
      Filesize

      224KB

    • memory/1872-106-0x0000000000090000-0x00000000000C8000-memory.dmp
      Filesize

      224KB

    • memory/1872-104-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
      Filesize

      4KB

    • memory/1872-98-0x0000000000090000-0x00000000000C8000-memory.dmp
      Filesize

      224KB

    • memory/1872-97-0x0000000000090000-0x00000000000C8000-memory.dmp
      Filesize

      224KB