Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2023 09:50
Behavioral task
behavioral1
Sample
aa.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
aa.exe
Resource
win10v2004-20230703-en
General
-
Target
aa.exe
-
Size
755KB
-
MD5
11bc606269a161555431bacf37f7c1e4
-
SHA1
63c52b0ac68ab7464e2cd777442a5807db9b5383
-
SHA256
1831806fc27d496f0f9dcfd8402724189deaeb5f8bcf0118f3d6484d0bdee9ed
-
SHA512
0be867fce920d493d2a37f996627bceea87621ba4071ae4383dd4a24748eedf7dc5ca6db089217b82ec38870248c6840f785683bf359d1014c7109e7d46dd90f
-
SSDEEP
12288:XVFUEuNmwvGrw9i0aTGRGicBckyyFRtWY1i3FTsvOVV0gz:3UEUUw9RaTNicBrPFRtJ1iVTsC5z
Malware Config
Signatures
-
FlawedAmmyy RAT
Remote-access trojan based on leaked code for the Ammyy remote admin software.
-
Drops file in System32 directory 4 IoCs
Processes:
aa.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 aa.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE aa.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies aa.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 aa.exe -
Modifies data under HKEY_USERS 9 IoCs
Processes:
aa.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE aa.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" aa.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy\Admin aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Ammyy aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin aa.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin\hr = 537d56736608796d5b5b4e155253b6892be3f0e4b16b aa.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin\hr3 = b76101e2100efce8857a0f4b9e97cb4e16139895a75d7f134a82f569c155d8016d8f9873f44de1f5a6ae94aa462170447a9d058f4caa35aa7c7069f9e53e37466aafca58 aa.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix aa.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" aa.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
aa.exepid Process 3016 aa.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
aa.exepid Process 3016 aa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
aa.exedescription pid Process procid_target PID 324 wrote to memory of 3016 324 aa.exe 84 PID 324 wrote to memory of 3016 324 aa.exe 84 PID 324 wrote to memory of 3016 324 aa.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa.exe"C:\Users\Admin\AppData\Local\Temp\aa.exe"1⤵PID:3356
-
C:\Users\Admin\AppData\Local\Temp\aa.exe"C:\Users\Admin\AppData\Local\Temp\aa.exe" -service -lunch1⤵
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Users\Admin\AppData\Local\Temp\aa.exe"C:\Users\Admin\AppData\Local\Temp\aa.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3016
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22B
MD5d0041050c998501f50b8868ee8b3d845
SHA15bc84e795ae6fcee44f562607d77c4351b70d1ac
SHA256ae89d2192245b11ff7c20f98baf1e14b570f4fc1fd636985f5ffb2ce8a912d71
SHA5127d6328cc54a61d6c690e9f5ae7dc7848d08feb3b43da365a20e3ddbdb7bb1b833d333557a99fdf7b23ea643ede41c749e2694f32ec6ca66af999feee3bdc61b7
-
Filesize
68B
MD538af9ced743b9a71d3459ba1a22676df
SHA1fdabc988950ef8575a5bebcceae3cee9565dd7a1
SHA256c956626fdbd9d4c1ecda4853572059938c530a34cf3fc1781078f7fd6e9419aa
SHA51298473fa52cb495353ebcd755bdbbe6fc4fe7dbc8479ec61d8bfac3dd140149c7fb0b5c4a4314d2ac54deb244c390750822e4514ea3e6ac35aa2b0ad697d147a6
-
Filesize
271B
MD5714f2508d4227f74b6adacfef73815d8
SHA1a35c8a796e4453c0c09d011284b806d25bdad04c
SHA256a5579945f23747541c0e80b79e79375d4ca44feafcd425ee9bd9302e35312480
SHA5121171a6eac6d237053815a40c2bcc2df9f4209902d6157777377228f3b618cad50c88a9519444ed5c447cf744e4655272fb42dabb567df85b4b19b1a2f1d086d8