Analysis

  • max time kernel
    182s
  • max time network
    237s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28/08/2023, 04:36

General

  • Target

    y3394774.exe

  • Size

    320KB

  • MD5

    509da1dda78d29a6dd036420d9693729

  • SHA1

    0937f3c6f37030e4ca59532eba7ec89e781c8aa3

  • SHA256

    6fc9b1a9cf410f38cb75c2c7e02694abf76b7a3b594663ee912db580d4c29a17

  • SHA512

    f627f0b4e70bc7e7ea8f8e0a53367d0d58eed5dbd026ccf8736c315f897cdb0661fcf8700529d7515fd7f6a06fdb9e5c7d6fcd316f6eb5a3ce2e0f92bc6fb88d

  • SSDEEP

    6144:K6y+bnr+Np0yN90QEprKEP3ve7yRfsK6KRFjEXtaBv7T8KgxW94sMk:yMrhy90/KU/e7RK6KRdEXYp7I7xW94Jk

Malware Config

Extracted

Family

amadey

Version

3.87

C2

77.91.68.18/nice/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\y3394774.exe
    "C:\Users\Admin\AppData\Local\Temp\y3394774.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3392
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l5265920.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l5265920.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3716
      • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
        "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:920
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:2444
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3964
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:340
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "saves.exe" /P "Admin:N"
              5⤵
                PID:4256
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "saves.exe" /P "Admin:R" /E
                5⤵
                  PID:3936
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:3576
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\b40d11255d" /P "Admin:N"
                    5⤵
                      PID:3056
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\b40d11255d" /P "Admin:R" /E
                      5⤵
                        PID:1892
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:3848
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m9943034.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m9943034.exe
                  2⤵
                  • Executes dropped EXE
                  PID:5012
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:4480

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l5265920.exe

                Filesize

                322KB

                MD5

                ffe512a49f5b67365d1f54ff54ac0189

                SHA1

                80e05bf2c1e8720c79208660ac30f011c35bdf88

                SHA256

                55b7464fbd89492bcc661e65940738b27eceec2499623dd6a4d77029803538ec

                SHA512

                4263c3db943fb5b7aa3eb6719209cf372798b33b887d91673cef5894ee9f75cd158082ea72498286c1743f20ac9eace8851ca05920659d0288c2dc17edb70812

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l5265920.exe

                Filesize

                322KB

                MD5

                ffe512a49f5b67365d1f54ff54ac0189

                SHA1

                80e05bf2c1e8720c79208660ac30f011c35bdf88

                SHA256

                55b7464fbd89492bcc661e65940738b27eceec2499623dd6a4d77029803538ec

                SHA512

                4263c3db943fb5b7aa3eb6719209cf372798b33b887d91673cef5894ee9f75cd158082ea72498286c1743f20ac9eace8851ca05920659d0288c2dc17edb70812

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m9943034.exe

                Filesize

                140KB

                MD5

                cd35f0bf18be1246d46ee7c18c465f78

                SHA1

                07e28967c78bb47d0791a00e55d33ad6e54cafa0

                SHA256

                ee61ae00f2ec54bd3c1859ec8ca0d59c3549908a81bbcc489dd962a877ef44a8

                SHA512

                ba3ad77b2a578057a6ca6f6f6a6a9df6a39bc88b4736729a48972ceccc641b645d546d6e862539d609ebf3531995187b33adb4db32293a972603d98296cec8e1

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m9943034.exe

                Filesize

                140KB

                MD5

                cd35f0bf18be1246d46ee7c18c465f78

                SHA1

                07e28967c78bb47d0791a00e55d33ad6e54cafa0

                SHA256

                ee61ae00f2ec54bd3c1859ec8ca0d59c3549908a81bbcc489dd962a877ef44a8

                SHA512

                ba3ad77b2a578057a6ca6f6f6a6a9df6a39bc88b4736729a48972ceccc641b645d546d6e862539d609ebf3531995187b33adb4db32293a972603d98296cec8e1

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                322KB

                MD5

                ffe512a49f5b67365d1f54ff54ac0189

                SHA1

                80e05bf2c1e8720c79208660ac30f011c35bdf88

                SHA256

                55b7464fbd89492bcc661e65940738b27eceec2499623dd6a4d77029803538ec

                SHA512

                4263c3db943fb5b7aa3eb6719209cf372798b33b887d91673cef5894ee9f75cd158082ea72498286c1743f20ac9eace8851ca05920659d0288c2dc17edb70812

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                322KB

                MD5

                ffe512a49f5b67365d1f54ff54ac0189

                SHA1

                80e05bf2c1e8720c79208660ac30f011c35bdf88

                SHA256

                55b7464fbd89492bcc661e65940738b27eceec2499623dd6a4d77029803538ec

                SHA512

                4263c3db943fb5b7aa3eb6719209cf372798b33b887d91673cef5894ee9f75cd158082ea72498286c1743f20ac9eace8851ca05920659d0288c2dc17edb70812

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                322KB

                MD5

                ffe512a49f5b67365d1f54ff54ac0189

                SHA1

                80e05bf2c1e8720c79208660ac30f011c35bdf88

                SHA256

                55b7464fbd89492bcc661e65940738b27eceec2499623dd6a4d77029803538ec

                SHA512

                4263c3db943fb5b7aa3eb6719209cf372798b33b887d91673cef5894ee9f75cd158082ea72498286c1743f20ac9eace8851ca05920659d0288c2dc17edb70812

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                322KB

                MD5

                ffe512a49f5b67365d1f54ff54ac0189

                SHA1

                80e05bf2c1e8720c79208660ac30f011c35bdf88

                SHA256

                55b7464fbd89492bcc661e65940738b27eceec2499623dd6a4d77029803538ec

                SHA512

                4263c3db943fb5b7aa3eb6719209cf372798b33b887d91673cef5894ee9f75cd158082ea72498286c1743f20ac9eace8851ca05920659d0288c2dc17edb70812

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                374bfdcfcf19f4edfe949022092848d2

                SHA1

                df5ee40497e98efcfba30012452d433373d287d4

                SHA256

                224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f

                SHA512

                bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b