Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    08-07-2023 14:14

General

  • Target

    file.exe

  • Size

    439KB

  • MD5

    db5dea81bb668fa4386d2ea8ecbe9e1c

  • SHA1

    642f1d9423d883854a06f50b03619c16fe33281a

  • SHA256

    abd8284914e8bc1309c13903e7b41b1af552c80598982c9e8fbe35e88eda9315

  • SHA512

    b7a0a78a34d2a1f00385b58fd172e4d0c9224c9d1020fe656a7bc4414dadc4ab24e40ad6736f905208747c8d048da0f4efea1af965c12a218d46305f90721fad

  • SSDEEP

    12288:kehYGKhh2CbBZ0MjA7Yhsd7R6jOP1tcrEQf:ZiGKPZbYBYhsd7dtF

Malware Config

Extracted

Family

amadey

Version

3.83

C2

5.42.65.80/8bmeVwqx/index.php

Extracted

Family

smokeloader

Botnet

pub5

Extracted

Family

smokeloader

Version

2022

C2

http://aapu.at/tmp/

http://poudineh.com/tmp/

http://firsttrusteedrx.ru/tmp/

http://kingpirate.ru/tmp/

rc4.i32
rc4.i32

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Users\Admin\AppData\Local\Temp\11796175.exe
      "C:\Users\Admin\AppData\Local\Temp\11796175.exe"
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:2096
    • C:\Users\Admin\AppData\Local\Temp\oldplayer.exe
      "C:\Users\Admin\AppData\Local\Temp\oldplayer.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2236
      • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2196
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:2228
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\207aa4515d" /P "Admin:N"&&CACLS "..\207aa4515d" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:532
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:1724
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              5⤵
                PID:1740
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                5⤵
                  PID:2264
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:1008
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\207aa4515d" /P "Admin:N"
                    5⤵
                      PID:1984
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\207aa4515d" /P "Admin:R" /E
                      5⤵
                        PID:832
              • C:\Windows\system32\taskeng.exe
                taskeng.exe {3369DEEF-591E-4608-8201-67CA4207A7AE} S-1-5-21-264077997-199365141-898621884-1000:KOSNGVQI\Admin:Interactive:[1]
                1⤵
                • Suspicious use of WriteProcessMemory
                PID:2748
                • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
                  C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
                  2⤵
                  • Executes dropped EXE
                  PID:2596
                • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
                  C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
                  2⤵
                  • Executes dropped EXE
                  PID:2492

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\11796175.exe

                Filesize

                231KB

                MD5

                60343acf2d83027ad0fb572dedc1f337

                SHA1

                53f46bd099eaf92bbefbf2132cc349dd1f948b59

                SHA256

                7eb9a5e5d20ca69bafa8c49f8795255782f7169410a1ab4c2c2dff8168ad8df6

                SHA512

                30ae852bb655c71dd6b4d493b2ddc7f292f57f2f3914161dd994117e5b83c2d0a0a29f11b45e9b3647c8de71ceff770e744a7d8dcd10b6c47ebe374dc7ab5c13

              • C:\Users\Admin\AppData\Local\Temp\11796175.exe

                Filesize

                231KB

                MD5

                60343acf2d83027ad0fb572dedc1f337

                SHA1

                53f46bd099eaf92bbefbf2132cc349dd1f948b59

                SHA256

                7eb9a5e5d20ca69bafa8c49f8795255782f7169410a1ab4c2c2dff8168ad8df6

                SHA512

                30ae852bb655c71dd6b4d493b2ddc7f292f57f2f3914161dd994117e5b83c2d0a0a29f11b45e9b3647c8de71ceff770e744a7d8dcd10b6c47ebe374dc7ab5c13

              • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe

                Filesize

                198KB

                MD5

                a64a886a695ed5fb9273e73241fec2f7

                SHA1

                363244ca05027c5beb938562df5b525a2428b405

                SHA256

                563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                SHA512

                122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

              • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe

                Filesize

                198KB

                MD5

                a64a886a695ed5fb9273e73241fec2f7

                SHA1

                363244ca05027c5beb938562df5b525a2428b405

                SHA256

                563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                SHA512

                122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

              • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe

                Filesize

                198KB

                MD5

                a64a886a695ed5fb9273e73241fec2f7

                SHA1

                363244ca05027c5beb938562df5b525a2428b405

                SHA256

                563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                SHA512

                122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

              • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe

                Filesize

                198KB

                MD5

                a64a886a695ed5fb9273e73241fec2f7

                SHA1

                363244ca05027c5beb938562df5b525a2428b405

                SHA256

                563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                SHA512

                122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

              • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe

                Filesize

                198KB

                MD5

                a64a886a695ed5fb9273e73241fec2f7

                SHA1

                363244ca05027c5beb938562df5b525a2428b405

                SHA256

                563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                SHA512

                122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

              • C:\Users\Admin\AppData\Local\Temp\oldplayer.exe

                Filesize

                198KB

                MD5

                a64a886a695ed5fb9273e73241fec2f7

                SHA1

                363244ca05027c5beb938562df5b525a2428b405

                SHA256

                563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                SHA512

                122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

              • C:\Users\Admin\AppData\Local\Temp\oldplayer.exe

                Filesize

                198KB

                MD5

                a64a886a695ed5fb9273e73241fec2f7

                SHA1

                363244ca05027c5beb938562df5b525a2428b405

                SHA256

                563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                SHA512

                122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

              • \Users\Admin\AppData\Local\Temp\11796175.exe

                Filesize

                231KB

                MD5

                60343acf2d83027ad0fb572dedc1f337

                SHA1

                53f46bd099eaf92bbefbf2132cc349dd1f948b59

                SHA256

                7eb9a5e5d20ca69bafa8c49f8795255782f7169410a1ab4c2c2dff8168ad8df6

                SHA512

                30ae852bb655c71dd6b4d493b2ddc7f292f57f2f3914161dd994117e5b83c2d0a0a29f11b45e9b3647c8de71ceff770e744a7d8dcd10b6c47ebe374dc7ab5c13

              • \Users\Admin\AppData\Local\Temp\11796175.exe

                Filesize

                231KB

                MD5

                60343acf2d83027ad0fb572dedc1f337

                SHA1

                53f46bd099eaf92bbefbf2132cc349dd1f948b59

                SHA256

                7eb9a5e5d20ca69bafa8c49f8795255782f7169410a1ab4c2c2dff8168ad8df6

                SHA512

                30ae852bb655c71dd6b4d493b2ddc7f292f57f2f3914161dd994117e5b83c2d0a0a29f11b45e9b3647c8de71ceff770e744a7d8dcd10b6c47ebe374dc7ab5c13

              • \Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe

                Filesize

                198KB

                MD5

                a64a886a695ed5fb9273e73241fec2f7

                SHA1

                363244ca05027c5beb938562df5b525a2428b405

                SHA256

                563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                SHA512

                122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

              • \Users\Admin\AppData\Local\Temp\oldplayer.exe

                Filesize

                198KB

                MD5

                a64a886a695ed5fb9273e73241fec2f7

                SHA1

                363244ca05027c5beb938562df5b525a2428b405

                SHA256

                563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                SHA512

                122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

              • memory/1264-83-0x0000000002A00000-0x0000000002A16000-memory.dmp

                Filesize

                88KB

              • memory/2096-84-0x0000000000400000-0x000000000047C000-memory.dmp

                Filesize

                496KB

              • memory/2096-71-0x00000000001B0000-0x00000000001B9000-memory.dmp

                Filesize

                36KB

              • memory/2236-72-0x0000000000370000-0x0000000000371000-memory.dmp

                Filesize

                4KB

              • memory/2392-54-0x0000000001000000-0x0000000001074000-memory.dmp

                Filesize

                464KB