Analysis

  • max time kernel
    142s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-08-2023 11:52

General

  • Target

    952d825a264745bb52b6977ba5983568.exe

  • Size

    1.6MB

  • MD5

    952d825a264745bb52b6977ba5983568

  • SHA1

    627a0a841c2fe194dd54f9ec6b0c1231d7da135f

  • SHA256

    d35d55bb74a7cf4349e2fa4a92839e2a88f17a1fee9725801d0d97b2bf0d311c

  • SHA512

    461579e1b94049107a738d74433961b865a536c9e2896f708a3b70026ea18712db6bf57c0c62173659ed8f79ffb43beee0549a45858e401c3ee2f2a8a6eae73f

  • SSDEEP

    24576:vZNFBKNlMaSOHEB2eXSbSgAaCOHOpxeRpeJphGf4F3xERjf7sI:vZNKJSR5iAaDaeRpeJpof4F3xERjTsI

Malware Config

Extracted

Family

amadey

Version

3.86

C2

45.9.74.182/b7djSDcPcZ/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Downloads MZ/PE file
  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 4 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\952d825a264745bb52b6977ba5983568.exe
    "C:\Users\Admin\AppData\Local\Temp\952d825a264745bb52b6977ba5983568.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe"
      2⤵
        PID:4456
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3888
        • C:\Users\Admin\AppData\Local\Temp\1000349051\BRR.exe
          "C:\Users\Admin\AppData\Local\Temp\1000349051\BRR.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          PID:5072

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\1000349051\BRR.exe

      Filesize

      2.8MB

      MD5

      f290ed868caae994bbfae1b63aca1d28

      SHA1

      5ac7b60e56281dc0c72f7c1125b165867df56ed9

      SHA256

      501444c9d25c15ca62bafe062b6bb8a3b3f69f0ca13aff057e3b8b1a0595f3a4

      SHA512

      c7e79af2f49c52c73bf95bbe92890edacbaaf0ea2648e475b312bc1b4831a5607e20bf8ce717de9b396620111cd3f1788d9aae86fd6f4dd168167af2a59d2b42

    • C:\Users\Admin\AppData\Local\Temp\1000349051\BRR.exe

      Filesize

      2.8MB

      MD5

      f290ed868caae994bbfae1b63aca1d28

      SHA1

      5ac7b60e56281dc0c72f7c1125b165867df56ed9

      SHA256

      501444c9d25c15ca62bafe062b6bb8a3b3f69f0ca13aff057e3b8b1a0595f3a4

      SHA512

      c7e79af2f49c52c73bf95bbe92890edacbaaf0ea2648e475b312bc1b4831a5607e20bf8ce717de9b396620111cd3f1788d9aae86fd6f4dd168167af2a59d2b42

    • C:\Users\Admin\AppData\Local\Temp\1000349051\BRR.exe

      Filesize

      2.8MB

      MD5

      f290ed868caae994bbfae1b63aca1d28

      SHA1

      5ac7b60e56281dc0c72f7c1125b165867df56ed9

      SHA256

      501444c9d25c15ca62bafe062b6bb8a3b3f69f0ca13aff057e3b8b1a0595f3a4

      SHA512

      c7e79af2f49c52c73bf95bbe92890edacbaaf0ea2648e475b312bc1b4831a5607e20bf8ce717de9b396620111cd3f1788d9aae86fd6f4dd168167af2a59d2b42

    • memory/2208-152-0x0000000005050000-0x0000000005065000-memory.dmp

      Filesize

      84KB

    • memory/2208-156-0x0000000005050000-0x0000000005065000-memory.dmp

      Filesize

      84KB

    • memory/2208-141-0x0000000074890000-0x0000000075040000-memory.dmp

      Filesize

      7.7MB

    • memory/2208-142-0x00000000052A0000-0x00000000052B0000-memory.dmp

      Filesize

      64KB

    • memory/2208-143-0x0000000005050000-0x0000000005065000-memory.dmp

      Filesize

      84KB

    • memory/2208-144-0x0000000005050000-0x0000000005065000-memory.dmp

      Filesize

      84KB

    • memory/2208-146-0x0000000005050000-0x0000000005065000-memory.dmp

      Filesize

      84KB

    • memory/2208-148-0x0000000005050000-0x0000000005065000-memory.dmp

      Filesize

      84KB

    • memory/2208-150-0x0000000005050000-0x0000000005065000-memory.dmp

      Filesize

      84KB

    • memory/2208-136-0x0000000074890000-0x0000000075040000-memory.dmp

      Filesize

      7.7MB

    • memory/2208-154-0x0000000005050000-0x0000000005065000-memory.dmp

      Filesize

      84KB

    • memory/2208-140-0x0000000005080000-0x000000000511C000-memory.dmp

      Filesize

      624KB

    • memory/2208-158-0x0000000005050000-0x0000000005065000-memory.dmp

      Filesize

      84KB

    • memory/2208-160-0x0000000005050000-0x0000000005065000-memory.dmp

      Filesize

      84KB

    • memory/2208-162-0x0000000005050000-0x0000000005065000-memory.dmp

      Filesize

      84KB

    • memory/2208-164-0x0000000005050000-0x0000000005065000-memory.dmp

      Filesize

      84KB

    • memory/2208-166-0x0000000005050000-0x0000000005065000-memory.dmp

      Filesize

      84KB

    • memory/2208-167-0x0000000005270000-0x0000000005271000-memory.dmp

      Filesize

      4KB

    • memory/2208-215-0x0000000074890000-0x0000000075040000-memory.dmp

      Filesize

      7.7MB

    • memory/2208-139-0x0000000001150000-0x0000000001151000-memory.dmp

      Filesize

      4KB

    • memory/2208-138-0x00000000052A0000-0x00000000052B0000-memory.dmp

      Filesize

      64KB

    • memory/2208-137-0x0000000000500000-0x00000000006AA000-memory.dmp

      Filesize

      1.7MB

    • memory/3888-172-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/3888-171-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/3888-179-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/3888-188-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/3888-170-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/3888-169-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/3888-168-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/5072-201-0x0000000005050000-0x00000000050E2000-memory.dmp

      Filesize

      584KB

    • memory/5072-204-0x0000000005960000-0x00000000059B0000-memory.dmp

      Filesize

      320KB

    • memory/5072-194-0x0000000076930000-0x0000000076A20000-memory.dmp

      Filesize

      960KB

    • memory/5072-195-0x0000000076930000-0x0000000076A20000-memory.dmp

      Filesize

      960KB

    • memory/5072-196-0x0000000076930000-0x0000000076A20000-memory.dmp

      Filesize

      960KB

    • memory/5072-197-0x00000000773A4000-0x00000000773A6000-memory.dmp

      Filesize

      8KB

    • memory/5072-199-0x0000000000400000-0x0000000000B28000-memory.dmp

      Filesize

      7.2MB

    • memory/5072-200-0x00000000051E0000-0x0000000005784000-memory.dmp

      Filesize

      5.6MB

    • memory/5072-192-0x0000000076930000-0x0000000076A20000-memory.dmp

      Filesize

      960KB

    • memory/5072-202-0x0000000005790000-0x0000000005952000-memory.dmp

      Filesize

      1.8MB

    • memory/5072-203-0x0000000005120000-0x0000000005196000-memory.dmp

      Filesize

      472KB

    • memory/5072-193-0x0000000076930000-0x0000000076A20000-memory.dmp

      Filesize

      960KB

    • memory/5072-205-0x00000000059C0000-0x0000000005A26000-memory.dmp

      Filesize

      408KB

    • memory/5072-206-0x00000000060D0000-0x00000000060FE000-memory.dmp

      Filesize

      184KB

    • memory/5072-207-0x0000000006100000-0x0000000006138000-memory.dmp

      Filesize

      224KB

    • memory/5072-208-0x0000000006590000-0x0000000006ABC000-memory.dmp

      Filesize

      5.2MB

    • memory/5072-210-0x0000000006BC0000-0x0000000006BDE000-memory.dmp

      Filesize

      120KB

    • memory/5072-191-0x0000000000400000-0x0000000000B28000-memory.dmp

      Filesize

      7.2MB

    • memory/5072-216-0x0000000000400000-0x0000000000B28000-memory.dmp

      Filesize

      7.2MB

    • memory/5072-217-0x0000000076930000-0x0000000076A20000-memory.dmp

      Filesize

      960KB

    • memory/5072-219-0x0000000076930000-0x0000000076A20000-memory.dmp

      Filesize

      960KB

    • memory/5072-220-0x0000000076930000-0x0000000076A20000-memory.dmp

      Filesize

      960KB

    • memory/5072-221-0x0000000076930000-0x0000000076A20000-memory.dmp

      Filesize

      960KB