Analysis

  • max time kernel
    260s
  • max time network
    254s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    11/06/2023, 04:49

General

  • Target

    d970ab0e6139c0dc1fcd0fe0b6b97d67f3ae311676377c64836223a826858de6.exe

  • Size

    940KB

  • MD5

    a18bebbed0e0917c7bcd1161a1ef9166

  • SHA1

    6e3e9b944a1ce3d5557d75a1c06848f6886de637

  • SHA256

    d970ab0e6139c0dc1fcd0fe0b6b97d67f3ae311676377c64836223a826858de6

  • SHA512

    af6694a48d00852660b943e0cfdd18d041256db6a3ba13ea30bfcccaad144c13bc77cd51158f49aa4653fc6639f8b0caaac69b5719c9be0c43c796173711116a

  • SSDEEP

    24576:+bByb8Bx4tSVuUXG4fM+hGmqhvitP3o5R:+bM5O7U+hZqhvitP3o5R

Score
10/10

Malware Config

Extracted

Family

amadey

Version

3.83

C2

78.46.242.112/so57Nst/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d970ab0e6139c0dc1fcd0fe0b6b97d67f3ae311676377c64836223a826858de6.exe
    "C:\Users\Admin\AppData\Local\Temp\d970ab0e6139c0dc1fcd0fe0b6b97d67f3ae311676377c64836223a826858de6.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1352
    • C:\Users\Admin\AppData\Local\Temp\6bb5824ec4\oneetx.exe
      "C:\Users\Admin\AppData\Local\Temp\6bb5824ec4\oneetx.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1764
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\6bb5824ec4\oneetx.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:1148
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\6bb5824ec4" /P "Admin:N"&&CACLS "..\6bb5824ec4" /P "Admin:R" /E&&Exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:860
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          4⤵
            PID:1544
          • C:\Windows\SysWOW64\cacls.exe
            CACLS "oneetx.exe" /P "Admin:N"
            4⤵
              PID:1572
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:R" /E
              4⤵
                PID:1464
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                4⤵
                  PID:1096
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\6bb5824ec4" /P "Admin:N"
                  4⤵
                    PID:1020
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\6bb5824ec4" /P "Admin:R" /E
                    4⤵
                      PID:1372
              • C:\Windows\system32\taskeng.exe
                taskeng.exe {AAC2BD26-CA12-4338-B3C3-231F52BFBAE6} S-1-5-21-3948302646-268491222-1934009652-1000:KXZDHPUW\Admin:Interactive:[1]
                1⤵
                • Suspicious use of WriteProcessMemory
                PID:1536
                • C:\Users\Admin\AppData\Local\Temp\6bb5824ec4\oneetx.exe
                  C:\Users\Admin\AppData\Local\Temp\6bb5824ec4\oneetx.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1840
                • C:\Users\Admin\AppData\Local\Temp\6bb5824ec4\oneetx.exe
                  C:\Users\Admin\AppData\Local\Temp\6bb5824ec4\oneetx.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  PID:964
                • C:\Users\Admin\AppData\Local\Temp\6bb5824ec4\oneetx.exe
                  C:\Users\Admin\AppData\Local\Temp\6bb5824ec4\oneetx.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1448
                • C:\Users\Admin\AppData\Local\Temp\6bb5824ec4\oneetx.exe
                  C:\Users\Admin\AppData\Local\Temp\6bb5824ec4\oneetx.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  PID:520

              Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\6bb5824ec4\oneetx.exe

                      Filesize

                      940KB

                      MD5

                      a18bebbed0e0917c7bcd1161a1ef9166

                      SHA1

                      6e3e9b944a1ce3d5557d75a1c06848f6886de637

                      SHA256

                      d970ab0e6139c0dc1fcd0fe0b6b97d67f3ae311676377c64836223a826858de6

                      SHA512

                      af6694a48d00852660b943e0cfdd18d041256db6a3ba13ea30bfcccaad144c13bc77cd51158f49aa4653fc6639f8b0caaac69b5719c9be0c43c796173711116a

                    • C:\Users\Admin\AppData\Local\Temp\6bb5824ec4\oneetx.exe

                      Filesize

                      940KB

                      MD5

                      a18bebbed0e0917c7bcd1161a1ef9166

                      SHA1

                      6e3e9b944a1ce3d5557d75a1c06848f6886de637

                      SHA256

                      d970ab0e6139c0dc1fcd0fe0b6b97d67f3ae311676377c64836223a826858de6

                      SHA512

                      af6694a48d00852660b943e0cfdd18d041256db6a3ba13ea30bfcccaad144c13bc77cd51158f49aa4653fc6639f8b0caaac69b5719c9be0c43c796173711116a

                    • C:\Users\Admin\AppData\Local\Temp\6bb5824ec4\oneetx.exe

                      Filesize

                      940KB

                      MD5

                      a18bebbed0e0917c7bcd1161a1ef9166

                      SHA1

                      6e3e9b944a1ce3d5557d75a1c06848f6886de637

                      SHA256

                      d970ab0e6139c0dc1fcd0fe0b6b97d67f3ae311676377c64836223a826858de6

                      SHA512

                      af6694a48d00852660b943e0cfdd18d041256db6a3ba13ea30bfcccaad144c13bc77cd51158f49aa4653fc6639f8b0caaac69b5719c9be0c43c796173711116a

                    • C:\Users\Admin\AppData\Local\Temp\6bb5824ec4\oneetx.exe

                      Filesize

                      940KB

                      MD5

                      a18bebbed0e0917c7bcd1161a1ef9166

                      SHA1

                      6e3e9b944a1ce3d5557d75a1c06848f6886de637

                      SHA256

                      d970ab0e6139c0dc1fcd0fe0b6b97d67f3ae311676377c64836223a826858de6

                      SHA512

                      af6694a48d00852660b943e0cfdd18d041256db6a3ba13ea30bfcccaad144c13bc77cd51158f49aa4653fc6639f8b0caaac69b5719c9be0c43c796173711116a

                    • C:\Users\Admin\AppData\Local\Temp\6bb5824ec4\oneetx.exe

                      Filesize

                      940KB

                      MD5

                      a18bebbed0e0917c7bcd1161a1ef9166

                      SHA1

                      6e3e9b944a1ce3d5557d75a1c06848f6886de637

                      SHA256

                      d970ab0e6139c0dc1fcd0fe0b6b97d67f3ae311676377c64836223a826858de6

                      SHA512

                      af6694a48d00852660b943e0cfdd18d041256db6a3ba13ea30bfcccaad144c13bc77cd51158f49aa4653fc6639f8b0caaac69b5719c9be0c43c796173711116a

                    • C:\Users\Admin\AppData\Local\Temp\6bb5824ec4\oneetx.exe

                      Filesize

                      940KB

                      MD5

                      a18bebbed0e0917c7bcd1161a1ef9166

                      SHA1

                      6e3e9b944a1ce3d5557d75a1c06848f6886de637

                      SHA256

                      d970ab0e6139c0dc1fcd0fe0b6b97d67f3ae311676377c64836223a826858de6

                      SHA512

                      af6694a48d00852660b943e0cfdd18d041256db6a3ba13ea30bfcccaad144c13bc77cd51158f49aa4653fc6639f8b0caaac69b5719c9be0c43c796173711116a

                    • C:\Users\Admin\AppData\Local\Temp\6bb5824ec4\oneetx.exe

                      Filesize

                      940KB

                      MD5

                      a18bebbed0e0917c7bcd1161a1ef9166

                      SHA1

                      6e3e9b944a1ce3d5557d75a1c06848f6886de637

                      SHA256

                      d970ab0e6139c0dc1fcd0fe0b6b97d67f3ae311676377c64836223a826858de6

                      SHA512

                      af6694a48d00852660b943e0cfdd18d041256db6a3ba13ea30bfcccaad144c13bc77cd51158f49aa4653fc6639f8b0caaac69b5719c9be0c43c796173711116a

                    • \Users\Admin\AppData\Local\Temp\6bb5824ec4\oneetx.exe

                      Filesize

                      940KB

                      MD5

                      a18bebbed0e0917c7bcd1161a1ef9166

                      SHA1

                      6e3e9b944a1ce3d5557d75a1c06848f6886de637

                      SHA256

                      d970ab0e6139c0dc1fcd0fe0b6b97d67f3ae311676377c64836223a826858de6

                      SHA512

                      af6694a48d00852660b943e0cfdd18d041256db6a3ba13ea30bfcccaad144c13bc77cd51158f49aa4653fc6639f8b0caaac69b5719c9be0c43c796173711116a

                    • memory/520-90-0x0000000000230000-0x0000000000268000-memory.dmp

                      Filesize

                      224KB

                    • memory/964-81-0x0000000000230000-0x0000000000268000-memory.dmp

                      Filesize

                      224KB

                    • memory/1352-64-0x0000000000290000-0x00000000002C8000-memory.dmp

                      Filesize

                      224KB

                    • memory/1352-54-0x0000000000290000-0x00000000002C8000-memory.dmp

                      Filesize

                      224KB

                    • memory/1352-56-0x0000000000290000-0x00000000002C8000-memory.dmp

                      Filesize

                      224KB

                    • memory/1448-85-0x00000000002E0000-0x0000000000318000-memory.dmp

                      Filesize

                      224KB

                    • memory/1448-86-0x00000000002E0000-0x0000000000318000-memory.dmp

                      Filesize

                      224KB

                    • memory/1764-71-0x00000000002F0000-0x0000000000328000-memory.dmp

                      Filesize

                      224KB

                    • memory/1764-70-0x00000000002F0000-0x0000000000328000-memory.dmp

                      Filesize

                      224KB

                    • memory/1840-76-0x00000000006E0000-0x0000000000718000-memory.dmp

                      Filesize

                      224KB

                    • memory/1840-75-0x00000000006E0000-0x0000000000718000-memory.dmp

                      Filesize

                      224KB