Analysis

  • max time kernel
    82s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-06-2023 12:16

General

  • Target

    AA_v3.exe

  • Size

    774KB

  • MD5

    2c0d78dce96e06ce6fb7a210e12cee09

  • SHA1

    c97da29b058e66a351f30ca03fb9a6b33bc8c528

  • SHA256

    8baeed8d30b9bfbff3adda3496df1552ab4bed3a7092cb7b56543f9b844b0353

  • SHA512

    72da1bc486d83213e42d917f4f1a13593dbbc431a61f1e0e09a2f25de93568f019b69373d6ee40a52b38c1c67c99b9dccccdf387ee5bf226fa1d102c532eca37

  • SSDEEP

    12288:Ogby1pKmZmjrWinaxABtyZPyoOOORtfWV5gk3VP0nkVgAg4:py1pVmjrWivBtyZPy2ORt+V5ggVP0tV4

Score
10/10

Malware Config

Signatures

  • FlawedAmmyy RAT

    Remote-access trojan based on leaked code for the Ammyy remote admin software.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AA_v3.exe
    "C:\Users\Admin\AppData\Local\Temp\AA_v3.exe"
    1⤵
      PID:2372
    • C:\Users\Admin\AppData\Local\Temp\AA_v3.exe
      "C:\Users\Admin\AppData\Local\Temp\AA_v3.exe" -service -lunch
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1456
      • C:\Users\Admin\AppData\Local\Temp\AA_v3.exe
        "C:\Users\Admin\AppData\Local\Temp\AA_v3.exe"
        2⤵
          PID:2932

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\AMMYY\settings3.bin

        Filesize

        280B

        MD5

        542835956a0ff5490c297efa14b3c1d3

        SHA1

        433d62823acc56546a2389b814067cc0771ac8dc

        SHA256

        06d265cab42ce567749866bfbc9378f018101196cbea28cddc1ecd2e0b42fa87

        SHA512

        34384f243c7c04a761fa24288f65ff5ea6b9115a53ddecaf9707b11b700cdd3113a06eb9c11b7c7f69771352ca81d0a014825b2b515ae88557f6dfef94bb8414