Analysis
-
max time kernel
166s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 09:35
Static task
static1
1 signatures
General
-
Target
cc710918467e4b28f04f27dbec45cb6168b4828de5771233f1ef0c5a485a55ca.exe
-
Size
4.0MB
-
MD5
a38e39cfe409a847b1252327796dd499
-
SHA1
ced9a956fea03e4def5fb8f5cdcdef814554f2a0
-
SHA256
cc710918467e4b28f04f27dbec45cb6168b4828de5771233f1ef0c5a485a55ca
-
SHA512
28da914ea74727cb8d9fd618cf5cd449e3d67d97f2e29016e532a3e7c1993b57506189ecfab654049aa9a8cab82396bcae83bd8b092953892c4305395856fa60
-
SSDEEP
24576:0d+yabNjLQp8+qlArd9+5l7OuB7S7THKU4eEO+wbbNny+1dZNd/eMvey:0diZvQp727OuBenKLbnwFNZeMvH
Malware Config
Extracted
Family
amadey
Version
3.86
C2
http://45.9.74.182/b7djSDcPcZ/index.php
Attributes
-
install_dir
f3f10bd848
-
install_file
bstyoops.exe
-
strings_key
05986a1cda6dc6caabf469f27fb6c32d
rc4.plain
Signatures
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/1320-1-0x0000000000DA0000-0x00000000011AC000-memory.dmp net_reactor -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\edddegyjjykj.lnk cc710918467e4b28f04f27dbec45cb6168b4828de5771233f1ef0c5a485a55ca.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1320 set thread context of 5084 1320 cc710918467e4b28f04f27dbec45cb6168b4828de5771233f1ef0c5a485a55ca.exe 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1320 cc710918467e4b28f04f27dbec45cb6168b4828de5771233f1ef0c5a485a55ca.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1320 wrote to memory of 5084 1320 cc710918467e4b28f04f27dbec45cb6168b4828de5771233f1ef0c5a485a55ca.exe 95 PID 1320 wrote to memory of 5084 1320 cc710918467e4b28f04f27dbec45cb6168b4828de5771233f1ef0c5a485a55ca.exe 95 PID 1320 wrote to memory of 5084 1320 cc710918467e4b28f04f27dbec45cb6168b4828de5771233f1ef0c5a485a55ca.exe 95 PID 1320 wrote to memory of 5084 1320 cc710918467e4b28f04f27dbec45cb6168b4828de5771233f1ef0c5a485a55ca.exe 95 PID 1320 wrote to memory of 5084 1320 cc710918467e4b28f04f27dbec45cb6168b4828de5771233f1ef0c5a485a55ca.exe 95 PID 1320 wrote to memory of 5084 1320 cc710918467e4b28f04f27dbec45cb6168b4828de5771233f1ef0c5a485a55ca.exe 95 PID 1320 wrote to memory of 5084 1320 cc710918467e4b28f04f27dbec45cb6168b4828de5771233f1ef0c5a485a55ca.exe 95 PID 1320 wrote to memory of 5084 1320 cc710918467e4b28f04f27dbec45cb6168b4828de5771233f1ef0c5a485a55ca.exe 95 PID 1320 wrote to memory of 5084 1320 cc710918467e4b28f04f27dbec45cb6168b4828de5771233f1ef0c5a485a55ca.exe 95 PID 1320 wrote to memory of 5084 1320 cc710918467e4b28f04f27dbec45cb6168b4828de5771233f1ef0c5a485a55ca.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc710918467e4b28f04f27dbec45cb6168b4828de5771233f1ef0c5a485a55ca.exe"C:\Users\Admin\AppData\Local\Temp\cc710918467e4b28f04f27dbec45cb6168b4828de5771233f1ef0c5a485a55ca.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"2⤵PID:5084
-