Analysis

  • max time kernel
    300s
  • max time network
    298s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-07-2023 03:34

General

  • Target

    f0e0e17a24223a3ae38281c669b9e9702cb63f41859bcb4f489a9048795e27ba.exe

  • Size

    6.5MB

  • MD5

    047b5d2075c2d6610b0b63c34d0455be

  • SHA1

    f5a29ddd6f1df5da62250f93094b754043cc586c

  • SHA256

    f0e0e17a24223a3ae38281c669b9e9702cb63f41859bcb4f489a9048795e27ba

  • SHA512

    6125cf9ab5cc9282a98867882207d0d5115970cc49bdbcdeea485995b66248e05dedf52f7246622d34b061687d8838edcce89338bb1623ba57ec9bd1d4086582

  • SSDEEP

    196608:ohcmcCw4eb7tPjA5rAoYpB+2u54AXDkQcRDt8yhm0FpGn:ohPcfDtPc5sXpB+2umGd4DthtFO

Malware Config

Extracted

Family

amadey

Version

3.85

C2

45.9.74.166/b7djSDcPcZ/index.php

45.9.74.141/b7djSDcPcZ/index.php

Extracted

Family

systembc

C2

5.42.65.67:4298

localhost.exchange:4298

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Arechclient2 RAT 2 IoCs

    Arechclient2.

  • Detects DLL dropped by Raspberry Robin. 6 IoCs

    Raspberry Robin.

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Themida packer 6 IoCs

    Detects Themida, an advanced Windows software protection system.

  • VMProtect packed file 13 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0e0e17a24223a3ae38281c669b9e9702cb63f41859bcb4f489a9048795e27ba.exe
    "C:\Users\Admin\AppData\Local\Temp\f0e0e17a24223a3ae38281c669b9e9702cb63f41859bcb4f489a9048795e27ba.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe
      "C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:372
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN bstyoops.exe /TR "C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:1536
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "bstyoops.exe" /P "Admin:N"&&CACLS "bstyoops.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c2868ed41c" /P "Admin:N"&&CACLS "..\c2868ed41c" /P "Admin:R" /E&&Exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4688
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          4⤵
            PID:1936
          • C:\Windows\SysWOW64\cacls.exe
            CACLS "bstyoops.exe" /P "Admin:N"
            4⤵
              PID:2896
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "bstyoops.exe" /P "Admin:R" /E
              4⤵
                PID:3252
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                4⤵
                  PID:1940
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\c2868ed41c" /P "Admin:N"
                  4⤵
                    PID:3532
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\c2868ed41c" /P "Admin:R" /E
                    4⤵
                      PID:2660
                  • C:\Users\Admin\AppData\Local\Temp\1000057051\BR.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000057051\BR.exe"
                    3⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Checks whether UAC is enabled
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4912
                  • C:\Users\Admin\AppData\Local\Temp\1000057051\BR.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000057051\BR.exe"
                    3⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Checks whether UAC is enabled
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4592
                  • C:\Windows\SysWOW64\rundll32.exe
                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\1000058061\s64date.dll, rundll
                    3⤵
                    • Loads dropped DLL
                    • Suspicious use of WriteProcessMemory
                    PID:956
                    • C:\Windows\system32\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\1000058061\s64date.dll, rundll
                      4⤵
                      • Blocklisted process makes network request
                      • Loads dropped DLL
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1632
                  • C:\Windows\SysWOW64\rundll32.exe
                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\1000058061\s64date.dll, rundll
                    3⤵
                    • Loads dropped DLL
                    • Suspicious use of WriteProcessMemory
                    PID:4852
                    • C:\Windows\system32\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\1000058061\s64date.dll, rundll
                      4⤵
                      • Blocklisted process makes network request
                      • Loads dropped DLL
                      • Suspicious behavior: EnumeratesProcesses
                      PID:932
              • C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe
                C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe
                1⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                PID:5080

              Network

              MITRE ATT&CK Matrix ATT&CK v13

              Execution

              Scheduled Task/Job

              1
              T1053

              Persistence

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Scheduled Task/Job

              1
              T1053

              Privilege Escalation

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Scheduled Task/Job

              1
              T1053

              Defense Evasion

              Virtualization/Sandbox Evasion

              1
              T1497

              Modify Registry

              1
              T1112

              Discovery

              Query Registry

              2
              T1012

              Virtualization/Sandbox Evasion

              1
              T1497

              System Information Discovery

              3
              T1082

              Command and Control

              Web Service

              1
              T1102

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\1000057051\BR.exe
                Filesize

                2.4MB

                MD5

                b25124619774f8bc62c9bee115365360

                SHA1

                f5d887b6e4419aba51088a382e1319648994ca51

                SHA256

                f27af68fbe93741cf1042a0f35cca9313ab6a50ee9758077173c3ebc002ee333

                SHA512

                49b0c7f411c9180fd4b6e323f14238c6ceda21456e2180fac85453db71df5b78e006fb8e321ce72e14861642d8e3139f42be2b22138eec120ec6e36b09c0da83

              • C:\Users\Admin\AppData\Local\Temp\1000057051\BR.exe
                Filesize

                2.4MB

                MD5

                b25124619774f8bc62c9bee115365360

                SHA1

                f5d887b6e4419aba51088a382e1319648994ca51

                SHA256

                f27af68fbe93741cf1042a0f35cca9313ab6a50ee9758077173c3ebc002ee333

                SHA512

                49b0c7f411c9180fd4b6e323f14238c6ceda21456e2180fac85453db71df5b78e006fb8e321ce72e14861642d8e3139f42be2b22138eec120ec6e36b09c0da83

              • C:\Users\Admin\AppData\Local\Temp\1000057051\BR.exe
                Filesize

                2.4MB

                MD5

                b25124619774f8bc62c9bee115365360

                SHA1

                f5d887b6e4419aba51088a382e1319648994ca51

                SHA256

                f27af68fbe93741cf1042a0f35cca9313ab6a50ee9758077173c3ebc002ee333

                SHA512

                49b0c7f411c9180fd4b6e323f14238c6ceda21456e2180fac85453db71df5b78e006fb8e321ce72e14861642d8e3139f42be2b22138eec120ec6e36b09c0da83

              • C:\Users\Admin\AppData\Local\Temp\1000057051\BR.exe
                Filesize

                2.4MB

                MD5

                b25124619774f8bc62c9bee115365360

                SHA1

                f5d887b6e4419aba51088a382e1319648994ca51

                SHA256

                f27af68fbe93741cf1042a0f35cca9313ab6a50ee9758077173c3ebc002ee333

                SHA512

                49b0c7f411c9180fd4b6e323f14238c6ceda21456e2180fac85453db71df5b78e006fb8e321ce72e14861642d8e3139f42be2b22138eec120ec6e36b09c0da83

              • C:\Users\Admin\AppData\Local\Temp\1000058061\s64date.dll
                Filesize

                6.2MB

                MD5

                fa41cd786f675090140469778f566858

                SHA1

                3c1e1f8a707070d978d1aadf2810ba65096691a5

                SHA256

                9b65412579699856dda71cba0ae0aa6e435303c84ca33eb2be11d334d0afa83a

                SHA512

                4a87b116bbf1ed74d4beba52c1d3fc217be0499839c092d062459a5809692a70e26588f94e9686235268363c467afec97cdf04957b33dcc50eba578c4750628f

              • C:\Users\Admin\AppData\Local\Temp\1000058061\s64date.dll
                Filesize

                6.2MB

                MD5

                fa41cd786f675090140469778f566858

                SHA1

                3c1e1f8a707070d978d1aadf2810ba65096691a5

                SHA256

                9b65412579699856dda71cba0ae0aa6e435303c84ca33eb2be11d334d0afa83a

                SHA512

                4a87b116bbf1ed74d4beba52c1d3fc217be0499839c092d062459a5809692a70e26588f94e9686235268363c467afec97cdf04957b33dcc50eba578c4750628f

              • C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe
                Filesize

                6.5MB

                MD5

                047b5d2075c2d6610b0b63c34d0455be

                SHA1

                f5a29ddd6f1df5da62250f93094b754043cc586c

                SHA256

                f0e0e17a24223a3ae38281c669b9e9702cb63f41859bcb4f489a9048795e27ba

                SHA512

                6125cf9ab5cc9282a98867882207d0d5115970cc49bdbcdeea485995b66248e05dedf52f7246622d34b061687d8838edcce89338bb1623ba57ec9bd1d4086582

              • C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe
                Filesize

                6.5MB

                MD5

                047b5d2075c2d6610b0b63c34d0455be

                SHA1

                f5a29ddd6f1df5da62250f93094b754043cc586c

                SHA256

                f0e0e17a24223a3ae38281c669b9e9702cb63f41859bcb4f489a9048795e27ba

                SHA512

                6125cf9ab5cc9282a98867882207d0d5115970cc49bdbcdeea485995b66248e05dedf52f7246622d34b061687d8838edcce89338bb1623ba57ec9bd1d4086582

              • C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe
                Filesize

                6.5MB

                MD5

                047b5d2075c2d6610b0b63c34d0455be

                SHA1

                f5a29ddd6f1df5da62250f93094b754043cc586c

                SHA256

                f0e0e17a24223a3ae38281c669b9e9702cb63f41859bcb4f489a9048795e27ba

                SHA512

                6125cf9ab5cc9282a98867882207d0d5115970cc49bdbcdeea485995b66248e05dedf52f7246622d34b061687d8838edcce89338bb1623ba57ec9bd1d4086582

              • C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe
                Filesize

                6.5MB

                MD5

                047b5d2075c2d6610b0b63c34d0455be

                SHA1

                f5a29ddd6f1df5da62250f93094b754043cc586c

                SHA256

                f0e0e17a24223a3ae38281c669b9e9702cb63f41859bcb4f489a9048795e27ba

                SHA512

                6125cf9ab5cc9282a98867882207d0d5115970cc49bdbcdeea485995b66248e05dedf52f7246622d34b061687d8838edcce89338bb1623ba57ec9bd1d4086582

              • \Users\Admin\AppData\Local\Temp\1000058061\s64date.dll
                Filesize

                6.2MB

                MD5

                fa41cd786f675090140469778f566858

                SHA1

                3c1e1f8a707070d978d1aadf2810ba65096691a5

                SHA256

                9b65412579699856dda71cba0ae0aa6e435303c84ca33eb2be11d334d0afa83a

                SHA512

                4a87b116bbf1ed74d4beba52c1d3fc217be0499839c092d062459a5809692a70e26588f94e9686235268363c467afec97cdf04957b33dcc50eba578c4750628f

              • \Users\Admin\AppData\Local\Temp\1000058061\s64date.dll
                Filesize

                6.2MB

                MD5

                fa41cd786f675090140469778f566858

                SHA1

                3c1e1f8a707070d978d1aadf2810ba65096691a5

                SHA256

                9b65412579699856dda71cba0ae0aa6e435303c84ca33eb2be11d334d0afa83a

                SHA512

                4a87b116bbf1ed74d4beba52c1d3fc217be0499839c092d062459a5809692a70e26588f94e9686235268363c467afec97cdf04957b33dcc50eba578c4750628f

              • \Users\Admin\AppData\Local\Temp\1000058061\s64date.dll
                Filesize

                6.2MB

                MD5

                fa41cd786f675090140469778f566858

                SHA1

                3c1e1f8a707070d978d1aadf2810ba65096691a5

                SHA256

                9b65412579699856dda71cba0ae0aa6e435303c84ca33eb2be11d334d0afa83a

                SHA512

                4a87b116bbf1ed74d4beba52c1d3fc217be0499839c092d062459a5809692a70e26588f94e9686235268363c467afec97cdf04957b33dcc50eba578c4750628f

              • \Users\Admin\AppData\Local\Temp\1000058061\s64date.dll
                Filesize

                6.2MB

                MD5

                fa41cd786f675090140469778f566858

                SHA1

                3c1e1f8a707070d978d1aadf2810ba65096691a5

                SHA256

                9b65412579699856dda71cba0ae0aa6e435303c84ca33eb2be11d334d0afa83a

                SHA512

                4a87b116bbf1ed74d4beba52c1d3fc217be0499839c092d062459a5809692a70e26588f94e9686235268363c467afec97cdf04957b33dcc50eba578c4750628f

              • memory/372-135-0x0000000000DA0000-0x0000000001842000-memory.dmp
                Filesize

                10.6MB

              • memory/372-134-0x0000000000DA0000-0x0000000001842000-memory.dmp
                Filesize

                10.6MB

              • memory/372-133-0x00000000018A0000-0x00000000018A1000-memory.dmp
                Filesize

                4KB

              • memory/372-166-0x0000000000DA0000-0x0000000001842000-memory.dmp
                Filesize

                10.6MB

              • memory/932-204-0x00007FFB2CC20000-0x00007FFB2D668000-memory.dmp
                Filesize

                10.3MB

              • memory/1632-190-0x00007FFB38A60000-0x00007FFB38A62000-memory.dmp
                Filesize

                8KB

              • memory/1632-191-0x00007FFB38A70000-0x00007FFB38A72000-memory.dmp
                Filesize

                8KB

              • memory/1632-200-0x00007FFB35A30000-0x00007FFB35A32000-memory.dmp
                Filesize

                8KB

              • memory/1632-197-0x00007FFB35A20000-0x00007FFB35A22000-memory.dmp
                Filesize

                8KB

              • memory/1632-195-0x00007FFB38670000-0x00007FFB38672000-memory.dmp
                Filesize

                8KB

              • memory/1632-193-0x00007FFB2CC20000-0x00007FFB2D668000-memory.dmp
                Filesize

                10.3MB

              • memory/1632-194-0x00007FFB383C0000-0x00007FFB383C2000-memory.dmp
                Filesize

                8KB

              • memory/1632-192-0x00007FFB38A80000-0x00007FFB38A82000-memory.dmp
                Filesize

                8KB

              • memory/2908-132-0x0000000000DA0000-0x0000000001842000-memory.dmp
                Filesize

                10.6MB

              • memory/2908-120-0x00000000003F0000-0x00000000003F1000-memory.dmp
                Filesize

                4KB

              • memory/2908-121-0x0000000000DA0000-0x0000000001842000-memory.dmp
                Filesize

                10.6MB

              • memory/2908-122-0x0000000000DA0000-0x0000000001842000-memory.dmp
                Filesize

                10.6MB

              • memory/4592-183-0x0000000077230000-0x0000000077300000-memory.dmp
                Filesize

                832KB

              • memory/4592-180-0x0000000077230000-0x0000000077300000-memory.dmp
                Filesize

                832KB

              • memory/4592-182-0x00000000748E0000-0x0000000074AA2000-memory.dmp
                Filesize

                1.8MB

              • memory/4592-218-0x00000000748E0000-0x0000000074AA2000-memory.dmp
                Filesize

                1.8MB

              • memory/4592-219-0x0000000077230000-0x0000000077300000-memory.dmp
                Filesize

                832KB

              • memory/4592-185-0x00000000748E0000-0x0000000074AA2000-memory.dmp
                Filesize

                1.8MB

              • memory/4592-215-0x0000000000400000-0x0000000000A1A000-memory.dmp
                Filesize

                6.1MB

              • memory/4592-179-0x0000000077230000-0x0000000077300000-memory.dmp
                Filesize

                832KB

              • memory/4592-177-0x0000000000400000-0x0000000000A1A000-memory.dmp
                Filesize

                6.1MB

              • memory/4592-189-0x0000000000400000-0x0000000000A1A000-memory.dmp
                Filesize

                6.1MB

              • memory/4592-217-0x0000000077230000-0x0000000077300000-memory.dmp
                Filesize

                832KB

              • memory/4592-216-0x0000000077230000-0x0000000077300000-memory.dmp
                Filesize

                832KB

              • memory/4912-155-0x00000000748E0000-0x0000000074AA2000-memory.dmp
                Filesize

                1.8MB

              • memory/4912-165-0x0000000005790000-0x00000000057F6000-memory.dmp
                Filesize

                408KB

              • memory/4912-164-0x0000000005730000-0x0000000005780000-memory.dmp
                Filesize

                320KB

              • memory/4912-163-0x00000000056A0000-0x0000000005716000-memory.dmp
                Filesize

                472KB

              • memory/4912-162-0x00000000054D0000-0x0000000005692000-memory.dmp
                Filesize

                1.8MB

              • memory/4912-196-0x0000000000400000-0x0000000000A1A000-memory.dmp
                Filesize

                6.1MB

              • memory/4912-199-0x0000000077230000-0x0000000077300000-memory.dmp
                Filesize

                832KB

              • memory/4912-161-0x0000000004EE0000-0x0000000004F72000-memory.dmp
                Filesize

                584KB

              • memory/4912-160-0x0000000004FD0000-0x00000000054CE000-memory.dmp
                Filesize

                5.0MB

              • memory/4912-206-0x0000000077230000-0x0000000077300000-memory.dmp
                Filesize

                832KB

              • memory/4912-207-0x00000000748E0000-0x0000000074AA2000-memory.dmp
                Filesize

                1.8MB

              • memory/4912-213-0x0000000077230000-0x0000000077300000-memory.dmp
                Filesize

                832KB

              • memory/4912-159-0x0000000000400000-0x0000000000A1A000-memory.dmp
                Filesize

                6.1MB

              • memory/4912-157-0x0000000077230000-0x0000000077300000-memory.dmp
                Filesize

                832KB

              • memory/4912-156-0x00000000748E0000-0x0000000074AA2000-memory.dmp
                Filesize

                1.8MB

              • memory/4912-154-0x0000000077230000-0x0000000077300000-memory.dmp
                Filesize

                832KB

              • memory/4912-153-0x0000000077230000-0x0000000077300000-memory.dmp
                Filesize

                832KB

              • memory/4912-152-0x0000000000400000-0x0000000000A1A000-memory.dmp
                Filesize

                6.1MB

              • memory/5080-225-0x0000000000DA0000-0x0000000001842000-memory.dmp
                Filesize

                10.6MB

              • memory/5080-226-0x0000000001970000-0x0000000001971000-memory.dmp
                Filesize

                4KB

              • memory/5080-227-0x0000000000DA0000-0x0000000001842000-memory.dmp
                Filesize

                10.6MB

              • memory/5080-230-0x0000000000DA0000-0x0000000001842000-memory.dmp
                Filesize

                10.6MB