Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16-08-2023 07:04

General

  • Target

    c010da0b5ee5ca9b8d48491d007af10e5b80f6d7950145e1cf81a195c19836d7.exe

  • Size

    2.3MB

  • MD5

    aa486e83365ae67a5778758685ca4d6f

  • SHA1

    633e328f5deb9c09e99368fa25f6deca4a601bbb

  • SHA256

    c010da0b5ee5ca9b8d48491d007af10e5b80f6d7950145e1cf81a195c19836d7

  • SHA512

    e16ef48515eccea7dcb27521027785e9a42ec9d8c76af86f598be363998453f3a71e976bb9ac38caf0751286c41f443cd3a3fad0507f4eedd1d7affeb4734dfd

  • SSDEEP

    24576:hH1FcclmgReLIGaIhJxSJ2lKZZAsKQ7F1RBdaBZZR0DBfg92KVOikDlbnJ6dT17x:DlbKxF8qg11A1o6Xqm

Malware Config

Extracted

Family

amadey

Version

3.86

C2

45.9.74.182/b7djSDcPcZ/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Downloads MZ/PE file
  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 4 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c010da0b5ee5ca9b8d48491d007af10e5b80f6d7950145e1cf81a195c19836d7.exe
    "C:\Users\Admin\AppData\Local\Temp\c010da0b5ee5ca9b8d48491d007af10e5b80f6d7950145e1cf81a195c19836d7.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2996
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4948
      • C:\Users\Admin\AppData\Local\Temp\1000349051\BRR.exe
        "C:\Users\Admin\AppData\Local\Temp\1000349051\BRR.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:4420

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1000349051\BRR.exe

    Filesize

    2.3MB

    MD5

    2aeb1e594acb1da82c20c0409a2e7e1d

    SHA1

    c8775e48fe033e849cc8ed4ee4db028c343f5c8a

    SHA256

    da5c8e8318ae806672dcf7571d3586b8e3e03837d9e45f02a407e1222d7142ff

    SHA512

    613e2297c104c2e34206006d85e1f29fad345e993a22b0df44d5ee9b2dfb0adabba9e35a0823e438c4bee07dab5c548a3e6c170e4a7c318affae11c4d8159c34

  • C:\Users\Admin\AppData\Local\Temp\1000349051\BRR.exe

    Filesize

    2.3MB

    MD5

    2aeb1e594acb1da82c20c0409a2e7e1d

    SHA1

    c8775e48fe033e849cc8ed4ee4db028c343f5c8a

    SHA256

    da5c8e8318ae806672dcf7571d3586b8e3e03837d9e45f02a407e1222d7142ff

    SHA512

    613e2297c104c2e34206006d85e1f29fad345e993a22b0df44d5ee9b2dfb0adabba9e35a0823e438c4bee07dab5c548a3e6c170e4a7c318affae11c4d8159c34

  • C:\Users\Admin\AppData\Local\Temp\1000349051\BRR.exe

    Filesize

    2.3MB

    MD5

    2aeb1e594acb1da82c20c0409a2e7e1d

    SHA1

    c8775e48fe033e849cc8ed4ee4db028c343f5c8a

    SHA256

    da5c8e8318ae806672dcf7571d3586b8e3e03837d9e45f02a407e1222d7142ff

    SHA512

    613e2297c104c2e34206006d85e1f29fad345e993a22b0df44d5ee9b2dfb0adabba9e35a0823e438c4bee07dab5c548a3e6c170e4a7c318affae11c4d8159c34

  • memory/2996-136-0x0000000005610000-0x0000000005625000-memory.dmp

    Filesize

    84KB

  • memory/2996-140-0x0000000005610000-0x0000000005625000-memory.dmp

    Filesize

    84KB

  • memory/2996-123-0x0000000005610000-0x0000000005625000-memory.dmp

    Filesize

    84KB

  • memory/2996-124-0x0000000005610000-0x0000000005625000-memory.dmp

    Filesize

    84KB

  • memory/2996-126-0x0000000005610000-0x0000000005625000-memory.dmp

    Filesize

    84KB

  • memory/2996-128-0x0000000005610000-0x0000000005625000-memory.dmp

    Filesize

    84KB

  • memory/2996-130-0x0000000005610000-0x0000000005625000-memory.dmp

    Filesize

    84KB

  • memory/2996-132-0x0000000005610000-0x0000000005625000-memory.dmp

    Filesize

    84KB

  • memory/2996-134-0x0000000005610000-0x0000000005625000-memory.dmp

    Filesize

    84KB

  • memory/2996-121-0x0000000073370000-0x0000000073A5E000-memory.dmp

    Filesize

    6.9MB

  • memory/2996-138-0x0000000005610000-0x0000000005625000-memory.dmp

    Filesize

    84KB

  • memory/2996-122-0x0000000005610000-0x000000000562C000-memory.dmp

    Filesize

    112KB

  • memory/2996-142-0x0000000005610000-0x0000000005625000-memory.dmp

    Filesize

    84KB

  • memory/2996-144-0x0000000005610000-0x0000000005625000-memory.dmp

    Filesize

    84KB

  • memory/2996-146-0x0000000005610000-0x0000000005625000-memory.dmp

    Filesize

    84KB

  • memory/2996-147-0x00000000059A0000-0x00000000059B0000-memory.dmp

    Filesize

    64KB

  • memory/2996-148-0x0000000005660000-0x0000000005661000-memory.dmp

    Filesize

    4KB

  • memory/2996-190-0x0000000073370000-0x0000000073A5E000-memory.dmp

    Filesize

    6.9MB

  • memory/2996-184-0x00000000059A0000-0x00000000059B0000-memory.dmp

    Filesize

    64KB

  • memory/2996-118-0x0000000000B20000-0x0000000000D68000-memory.dmp

    Filesize

    2.3MB

  • memory/2996-120-0x00000000056B0000-0x000000000574C000-memory.dmp

    Filesize

    624KB

  • memory/2996-119-0x0000000073370000-0x0000000073A5E000-memory.dmp

    Filesize

    6.9MB

  • memory/4420-174-0x0000000005030000-0x000000000552E000-memory.dmp

    Filesize

    5.0MB

  • memory/4420-176-0x0000000005530000-0x00000000056F2000-memory.dmp

    Filesize

    1.8MB

  • memory/4420-192-0x0000000074410000-0x00000000745D2000-memory.dmp

    Filesize

    1.8MB

  • memory/4420-191-0x0000000000400000-0x00000000009DA000-memory.dmp

    Filesize

    5.9MB

  • memory/4420-183-0x0000000006950000-0x000000000696E000-memory.dmp

    Filesize

    120KB

  • memory/4420-166-0x0000000000400000-0x00000000009DA000-memory.dmp

    Filesize

    5.9MB

  • memory/4420-167-0x0000000074410000-0x00000000745D2000-memory.dmp

    Filesize

    1.8MB

  • memory/4420-168-0x0000000074410000-0x00000000745D2000-memory.dmp

    Filesize

    1.8MB

  • memory/4420-169-0x0000000074410000-0x00000000745D2000-memory.dmp

    Filesize

    1.8MB

  • memory/4420-170-0x0000000074410000-0x00000000745D2000-memory.dmp

    Filesize

    1.8MB

  • memory/4420-173-0x0000000000400000-0x00000000009DA000-memory.dmp

    Filesize

    5.9MB

  • memory/4420-182-0x0000000006320000-0x000000000684C000-memory.dmp

    Filesize

    5.2MB

  • memory/4420-175-0x0000000004EE0000-0x0000000004F72000-memory.dmp

    Filesize

    584KB

  • memory/4420-181-0x0000000005E90000-0x0000000005EC8000-memory.dmp

    Filesize

    224KB

  • memory/4420-177-0x0000000004F80000-0x0000000004FF6000-memory.dmp

    Filesize

    472KB

  • memory/4420-178-0x0000000005700000-0x0000000005750000-memory.dmp

    Filesize

    320KB

  • memory/4420-179-0x0000000005750000-0x00000000057B6000-memory.dmp

    Filesize

    408KB

  • memory/4420-180-0x0000000005E60000-0x0000000005E8E000-memory.dmp

    Filesize

    184KB

  • memory/4948-160-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/4948-151-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/4948-164-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/4948-150-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/4948-149-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/4948-152-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/4948-153-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB