Analysis

  • max time kernel
    262s
  • max time network
    236s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2023, 04:06

General

  • Target

    y4319932.exe

  • Size

    319KB

  • MD5

    dc1dbfb64196b1e96eab343bfa921662

  • SHA1

    d11b1a478343d4d897c35ba303ec40bcda3fb5b2

  • SHA256

    a2db76e7be23b5d22650343744feca884e24178430caf653fce67b0cf46076cc

  • SHA512

    751e57980d56e65609cb1a915cfc66c5800bc85b7d86d1c7209c8ffe290156120867a4fa81b29b83917bfd9a7c859215625ed354f7870cf73aae97d1cf0e881f

  • SSDEEP

    6144:Kxy+bnr+Np0yN90QEwrKEP3ve7yRfsK6KRFjEXtaBv745ONZD8DrC:3Mr9y906KU/e7RK6KRdEXYp72WZD8DW

Malware Config

Extracted

Family

amadey

Version

3.87

C2

77.91.68.18/nice/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 10 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\y4319932.exe
    "C:\Users\Admin\AppData\Local\Temp\y4319932.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l2048340.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l2048340.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1620
      • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
        "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2976
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:2732
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2836
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:2696
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "saves.exe" /P "Admin:N"
              5⤵
                PID:2692
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "saves.exe" /P "Admin:R" /E
                5⤵
                  PID:2716
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:2760
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\b40d11255d" /P "Admin:N"
                    5⤵
                      PID:2776
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\b40d11255d" /P "Admin:R" /E
                      5⤵
                        PID:2372
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:2392
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6175003.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6175003.exe
                  2⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  PID:2804
              • C:\Windows\system32\taskeng.exe
                taskeng.exe {AFFC7294-F6B6-425E-938B-AB4FF8239FB8} S-1-5-21-377084978-2088738870-2818360375-1000:DSWJWADP\Admin:Interactive:[1]
                1⤵
                  PID:1028
                  • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                    C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                    2⤵
                    • Executes dropped EXE
                    PID:1512
                  • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                    C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                    2⤵
                    • Executes dropped EXE
                    PID:1908
                  • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                    C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                    2⤵
                    • Executes dropped EXE
                    PID:1396
                  • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                    C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                    2⤵
                    • Executes dropped EXE
                    PID:2940
                  • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                    C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                    2⤵
                    • Executes dropped EXE
                    PID:2600

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l2048340.exe

                  Filesize

                  324KB

                  MD5

                  6d2a768cdcef663867b4c8defcae1691

                  SHA1

                  e794e723d07af063a2b4d061a9557e53936243ec

                  SHA256

                  163dd632d307bd3fb11d64dcaa819ff9fcec08da30a57d596995fa41ddc749c5

                  SHA512

                  2f06b377221fec191388797f8c106cbfe30a371a988e0b27ff132b004cc780d0565f58f99cc5c0ed5cb5f1b0047e61f245460b30174ea3efe552e951cff315b4

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l2048340.exe

                  Filesize

                  324KB

                  MD5

                  6d2a768cdcef663867b4c8defcae1691

                  SHA1

                  e794e723d07af063a2b4d061a9557e53936243ec

                  SHA256

                  163dd632d307bd3fb11d64dcaa819ff9fcec08da30a57d596995fa41ddc749c5

                  SHA512

                  2f06b377221fec191388797f8c106cbfe30a371a988e0b27ff132b004cc780d0565f58f99cc5c0ed5cb5f1b0047e61f245460b30174ea3efe552e951cff315b4

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6175003.exe

                  Filesize

                  141KB

                  MD5

                  cfc861964c95c37a630f5ba6ddb99063

                  SHA1

                  f1eb3bef9eb05db9860e3581d82f60881386f9c6

                  SHA256

                  463e8c5d0e47522e37a6e27d3d1ddfeaa2c216be24bd0cd1c945387260547f9c

                  SHA512

                  450f40a935d80a5f8f0784779612c263de129da0ed4989a6da48e6663517fc3eb76cfbd0e0986fb59468d0d33f0f287b9ce0eff934e3e259f65e094741298cbb

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6175003.exe

                  Filesize

                  141KB

                  MD5

                  cfc861964c95c37a630f5ba6ddb99063

                  SHA1

                  f1eb3bef9eb05db9860e3581d82f60881386f9c6

                  SHA256

                  463e8c5d0e47522e37a6e27d3d1ddfeaa2c216be24bd0cd1c945387260547f9c

                  SHA512

                  450f40a935d80a5f8f0784779612c263de129da0ed4989a6da48e6663517fc3eb76cfbd0e0986fb59468d0d33f0f287b9ce0eff934e3e259f65e094741298cbb

                • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                  Filesize

                  324KB

                  MD5

                  6d2a768cdcef663867b4c8defcae1691

                  SHA1

                  e794e723d07af063a2b4d061a9557e53936243ec

                  SHA256

                  163dd632d307bd3fb11d64dcaa819ff9fcec08da30a57d596995fa41ddc749c5

                  SHA512

                  2f06b377221fec191388797f8c106cbfe30a371a988e0b27ff132b004cc780d0565f58f99cc5c0ed5cb5f1b0047e61f245460b30174ea3efe552e951cff315b4

                • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                  Filesize

                  324KB

                  MD5

                  6d2a768cdcef663867b4c8defcae1691

                  SHA1

                  e794e723d07af063a2b4d061a9557e53936243ec

                  SHA256

                  163dd632d307bd3fb11d64dcaa819ff9fcec08da30a57d596995fa41ddc749c5

                  SHA512

                  2f06b377221fec191388797f8c106cbfe30a371a988e0b27ff132b004cc780d0565f58f99cc5c0ed5cb5f1b0047e61f245460b30174ea3efe552e951cff315b4

                • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                  Filesize

                  324KB

                  MD5

                  6d2a768cdcef663867b4c8defcae1691

                  SHA1

                  e794e723d07af063a2b4d061a9557e53936243ec

                  SHA256

                  163dd632d307bd3fb11d64dcaa819ff9fcec08da30a57d596995fa41ddc749c5

                  SHA512

                  2f06b377221fec191388797f8c106cbfe30a371a988e0b27ff132b004cc780d0565f58f99cc5c0ed5cb5f1b0047e61f245460b30174ea3efe552e951cff315b4

                • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                  Filesize

                  324KB

                  MD5

                  6d2a768cdcef663867b4c8defcae1691

                  SHA1

                  e794e723d07af063a2b4d061a9557e53936243ec

                  SHA256

                  163dd632d307bd3fb11d64dcaa819ff9fcec08da30a57d596995fa41ddc749c5

                  SHA512

                  2f06b377221fec191388797f8c106cbfe30a371a988e0b27ff132b004cc780d0565f58f99cc5c0ed5cb5f1b0047e61f245460b30174ea3efe552e951cff315b4

                • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                  Filesize

                  324KB

                  MD5

                  6d2a768cdcef663867b4c8defcae1691

                  SHA1

                  e794e723d07af063a2b4d061a9557e53936243ec

                  SHA256

                  163dd632d307bd3fb11d64dcaa819ff9fcec08da30a57d596995fa41ddc749c5

                  SHA512

                  2f06b377221fec191388797f8c106cbfe30a371a988e0b27ff132b004cc780d0565f58f99cc5c0ed5cb5f1b0047e61f245460b30174ea3efe552e951cff315b4

                • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                  Filesize

                  324KB

                  MD5

                  6d2a768cdcef663867b4c8defcae1691

                  SHA1

                  e794e723d07af063a2b4d061a9557e53936243ec

                  SHA256

                  163dd632d307bd3fb11d64dcaa819ff9fcec08da30a57d596995fa41ddc749c5

                  SHA512

                  2f06b377221fec191388797f8c106cbfe30a371a988e0b27ff132b004cc780d0565f58f99cc5c0ed5cb5f1b0047e61f245460b30174ea3efe552e951cff315b4

                • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                  Filesize

                  324KB

                  MD5

                  6d2a768cdcef663867b4c8defcae1691

                  SHA1

                  e794e723d07af063a2b4d061a9557e53936243ec

                  SHA256

                  163dd632d307bd3fb11d64dcaa819ff9fcec08da30a57d596995fa41ddc749c5

                  SHA512

                  2f06b377221fec191388797f8c106cbfe30a371a988e0b27ff132b004cc780d0565f58f99cc5c0ed5cb5f1b0047e61f245460b30174ea3efe552e951cff315b4

                • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                  Filesize

                  324KB

                  MD5

                  6d2a768cdcef663867b4c8defcae1691

                  SHA1

                  e794e723d07af063a2b4d061a9557e53936243ec

                  SHA256

                  163dd632d307bd3fb11d64dcaa819ff9fcec08da30a57d596995fa41ddc749c5

                  SHA512

                  2f06b377221fec191388797f8c106cbfe30a371a988e0b27ff132b004cc780d0565f58f99cc5c0ed5cb5f1b0047e61f245460b30174ea3efe552e951cff315b4

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                  Filesize

                  89KB

                  MD5

                  5bc0153d2973241b72a38c51a2f72116

                  SHA1

                  cd9c689663557452631d9f8ff609208b01884a32

                  SHA256

                  68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                  SHA512

                  2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                  Filesize

                  89KB

                  MD5

                  5bc0153d2973241b72a38c51a2f72116

                  SHA1

                  cd9c689663557452631d9f8ff609208b01884a32

                  SHA256

                  68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                  SHA512

                  2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                  Filesize

                  273B

                  MD5

                  374bfdcfcf19f4edfe949022092848d2

                  SHA1

                  df5ee40497e98efcfba30012452d433373d287d4

                  SHA256

                  224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f

                  SHA512

                  bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7

                • \Users\Admin\AppData\Local\Temp\IXP000.TMP\l2048340.exe

                  Filesize

                  324KB

                  MD5

                  6d2a768cdcef663867b4c8defcae1691

                  SHA1

                  e794e723d07af063a2b4d061a9557e53936243ec

                  SHA256

                  163dd632d307bd3fb11d64dcaa819ff9fcec08da30a57d596995fa41ddc749c5

                  SHA512

                  2f06b377221fec191388797f8c106cbfe30a371a988e0b27ff132b004cc780d0565f58f99cc5c0ed5cb5f1b0047e61f245460b30174ea3efe552e951cff315b4

                • \Users\Admin\AppData\Local\Temp\IXP000.TMP\l2048340.exe

                  Filesize

                  324KB

                  MD5

                  6d2a768cdcef663867b4c8defcae1691

                  SHA1

                  e794e723d07af063a2b4d061a9557e53936243ec

                  SHA256

                  163dd632d307bd3fb11d64dcaa819ff9fcec08da30a57d596995fa41ddc749c5

                  SHA512

                  2f06b377221fec191388797f8c106cbfe30a371a988e0b27ff132b004cc780d0565f58f99cc5c0ed5cb5f1b0047e61f245460b30174ea3efe552e951cff315b4

                • \Users\Admin\AppData\Local\Temp\IXP000.TMP\m6175003.exe

                  Filesize

                  141KB

                  MD5

                  cfc861964c95c37a630f5ba6ddb99063

                  SHA1

                  f1eb3bef9eb05db9860e3581d82f60881386f9c6

                  SHA256

                  463e8c5d0e47522e37a6e27d3d1ddfeaa2c216be24bd0cd1c945387260547f9c

                  SHA512

                  450f40a935d80a5f8f0784779612c263de129da0ed4989a6da48e6663517fc3eb76cfbd0e0986fb59468d0d33f0f287b9ce0eff934e3e259f65e094741298cbb

                • \Users\Admin\AppData\Local\Temp\IXP000.TMP\m6175003.exe

                  Filesize

                  141KB

                  MD5

                  cfc861964c95c37a630f5ba6ddb99063

                  SHA1

                  f1eb3bef9eb05db9860e3581d82f60881386f9c6

                  SHA256

                  463e8c5d0e47522e37a6e27d3d1ddfeaa2c216be24bd0cd1c945387260547f9c

                  SHA512

                  450f40a935d80a5f8f0784779612c263de129da0ed4989a6da48e6663517fc3eb76cfbd0e0986fb59468d0d33f0f287b9ce0eff934e3e259f65e094741298cbb

                • \Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                  Filesize

                  324KB

                  MD5

                  6d2a768cdcef663867b4c8defcae1691

                  SHA1

                  e794e723d07af063a2b4d061a9557e53936243ec

                  SHA256

                  163dd632d307bd3fb11d64dcaa819ff9fcec08da30a57d596995fa41ddc749c5

                  SHA512

                  2f06b377221fec191388797f8c106cbfe30a371a988e0b27ff132b004cc780d0565f58f99cc5c0ed5cb5f1b0047e61f245460b30174ea3efe552e951cff315b4

                • \Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                  Filesize

                  324KB

                  MD5

                  6d2a768cdcef663867b4c8defcae1691

                  SHA1

                  e794e723d07af063a2b4d061a9557e53936243ec

                  SHA256

                  163dd632d307bd3fb11d64dcaa819ff9fcec08da30a57d596995fa41ddc749c5

                  SHA512

                  2f06b377221fec191388797f8c106cbfe30a371a988e0b27ff132b004cc780d0565f58f99cc5c0ed5cb5f1b0047e61f245460b30174ea3efe552e951cff315b4

                • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                  Filesize

                  89KB

                  MD5

                  5bc0153d2973241b72a38c51a2f72116

                  SHA1

                  cd9c689663557452631d9f8ff609208b01884a32

                  SHA256

                  68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                  SHA512

                  2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

                • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                  Filesize

                  89KB

                  MD5

                  5bc0153d2973241b72a38c51a2f72116

                  SHA1

                  cd9c689663557452631d9f8ff609208b01884a32

                  SHA256

                  68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                  SHA512

                  2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

                • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                  Filesize

                  89KB

                  MD5

                  5bc0153d2973241b72a38c51a2f72116

                  SHA1

                  cd9c689663557452631d9f8ff609208b01884a32

                  SHA256

                  68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                  SHA512

                  2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

                • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                  Filesize

                  89KB

                  MD5

                  5bc0153d2973241b72a38c51a2f72116

                  SHA1

                  cd9c689663557452631d9f8ff609208b01884a32

                  SHA256

                  68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                  SHA512

                  2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b