Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
19/07/2023, 11:03
Behavioral task
behavioral1
Sample
AA_v3.5.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
AA_v3.5.exe
Resource
win10v2004-20230703-en
General
-
Target
AA_v3.5.exe
-
Size
751KB
-
MD5
5686a7032e37087f0fd082a04f727aad
-
SHA1
341fee5256dcc259a3a566ca8f0260eb1e60d730
-
SHA256
43bba98a64dd96cf0571f3d6dceafdc549cc3767a1beab6fe4a6e1fd3ddd3153
-
SHA512
0ebd95b20ef54d047fdaec37cfb10e2c39ea9d63fa28d6a6848ec11b34a4c4ec5f7a8a430d81670461203b9e675ac4a32cac3da4a1c471f16e8d003c6dea3345
-
SSDEEP
12288:oPO1fNZApVuCN7e/yalnM4RtjLDXcbOAS3snvVgbgJ:om1fN6pkCNa/yaq4RtjXcu3sSEJ
Malware Config
Signatures
-
FlawedAmmyy RAT
Remote-access trojan based on leaked code for the Ammyy remote admin software.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Control Panel\International\Geo\Nation AA_v3.5.exe -
Modifies data under HKEY_USERS 7 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Ammyy AA_v3.5.exe Key created \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin AA_v3.5.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin\hr = 537d56736608796e5f5e4c105953b7077a9078e5b16b AA_v3.5.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin\hr3 = c6473c3078bd9a491628c0a753a1b500059353484aed738973399edee3767912d7e4d4c5cfb6f4c0dbb53ea85bfa0ed3df1265102c107f8a6c32bd9ebfc2af9088eed600 AA_v3.5.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings AA_v3.5.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy\Admin AA_v3.5.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE AA_v3.5.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2548 AA_v3.5.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2548 AA_v3.5.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 544 wrote to memory of 2548 544 AA_v3.5.exe 29 PID 544 wrote to memory of 2548 544 AA_v3.5.exe 29 PID 544 wrote to memory of 2548 544 AA_v3.5.exe 29 PID 544 wrote to memory of 2548 544 AA_v3.5.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\AA_v3.5.exe"C:\Users\Admin\AppData\Local\Temp\AA_v3.5.exe"1⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\AA_v3.5.exe"C:\Users\Admin\AppData\Local\Temp\AA_v3.5.exe" -service -lunch1⤵
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Local\Temp\AA_v3.5.exe"C:\Users\Admin\AppData\Local\Temp\AA_v3.5.exe"2⤵
- Checks computer location settings
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2548
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22B
MD59e81420f96aad5bf1dfaed251854bb78
SHA1956e91b78a23628720943301aa862e1f591df0d9
SHA256fdc685b8f067d5993376a9b4da99ad6761093a7cf03c311f9910119a69fd16fc
SHA5122878f8d79e49308984d4311872f5582b4c69f6cad2e6d6d2ab79a482f2d7fae2ed0d6ba7133db0268aa41eb45309f71c3d1169835bdccdbd5da614a940551130
-
Filesize
68B
MD57365a28247fbfc845afb02bc4e1926ca
SHA1fbd1c9da466f0a6168ee5acd8b186e2830c4e1e2
SHA256f8b80de95b87244b6be2dcc5451d37448743dccc25ea266996816d071e6fdd82
SHA51207a4462c64628e7fc62a0c7205de90f0eca1741225972b4899821252c958e28cf36527b7099da63d80b1c7e1fe445a8cd3d37ac0047c05b78f5ae07db33784cd
-
Filesize
271B
MD5714f2508d4227f74b6adacfef73815d8
SHA1a35c8a796e4453c0c09d011284b806d25bdad04c
SHA256a5579945f23747541c0e80b79e79375d4ca44feafcd425ee9bd9302e35312480
SHA5121171a6eac6d237053815a40c2bcc2df9f4209902d6157777377228f3b618cad50c88a9519444ed5c447cf744e4655272fb42dabb567df85b4b19b1a2f1d086d8