Analysis Overview
SHA256
1b775f652ddda4985cdee327095f4506f9f0a4ebd876b9e8ab2010742e099147
Threat Level: Known bad
The file ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe.zip was found to be: Known bad.
Malicious Activity Summary
Ammyyadmin family
FlawedAmmyy RAT
AmmyyAdmin payload
Writes to the Master Boot Record (MBR)
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2023-10-31 14:03
Signatures
AmmyyAdmin payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Ammyyadmin family
Analysis: behavioral1
Detonation Overview
Submitted
2023-10-31 14:03
Reported
2023-10-31 14:27
Platform
win7-20231020-en
Max time kernel
118s
Max time network
132s
Command Line
Signatures
FlawedAmmyy RAT
Writes to the Master Boot Record (MBR)
| Description | Indicator | Process | Target |
| File opened for modification | \??\PhysicalDrive0 | C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe
"C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe"
C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe
"C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe" -service -lunch
C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe
"C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe"
Network
Files
C:\ProgramData\AMMYY\settings3.bin
| MD5 | eee25487e63ebac80dfa30d8329ad990 |
| SHA1 | a724b2707fdf97dec3db99796163883e2ef5a135 |
| SHA256 | 95e08a9ca6170ba7ab8e1ced49880eb1c5b570ca3696b0fd0fc5aca947be4334 |
| SHA512 | 898362e04cc04c1bd90d40edc227e31612704fd0c13b0700fee6fdfb3912cbd7b10d792537908b2e4b2cc70eac63969a91b5d7d7dac346328d6ae8db03e3b1a7 |
Analysis: behavioral2
Detonation Overview
Submitted
2023-10-31 14:03
Reported
2023-10-31 14:27
Platform
win10v2004-20231020-en
Max time kernel
141s
Max time network
149s
Command Line
Signatures
FlawedAmmyy RAT
Writes to the Master Boot Record (MBR)
| Description | Indicator | Process | Target |
| File opened for modification | \??\PhysicalDrive0 | C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4376 wrote to memory of 2144 | N/A | C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe | C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe |
| PID 4376 wrote to memory of 2144 | N/A | C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe | C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe |
| PID 4376 wrote to memory of 2144 | N/A | C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe | C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe
"C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe"
C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe
"C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe" -service -lunch
C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe
"C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 29.81.57.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 158.240.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 86.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 1.208.79.178.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| IE | 20.123.104.105:443 | tcp | |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 8.8.8.8:53 | 8.3.197.209.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 48.229.111.52.in-addr.arpa | udp |
| FR | 23.57.81.29:443 | tcp | |
| US | 192.229.221.95:80 | tcp | |
| US | 8.8.8.8:53 | 209.80.50.20.in-addr.arpa | udp |
Files
C:\ProgramData\AMMYY\settings3.bin
| MD5 | af29d5dce81acaaba25bd84febd558bc |
| SHA1 | 8abb8eb66514e0c1a0770dee427c8f87a594fdce |
| SHA256 | 2804f2504d52e4c9b6b646f7954b0bf2e9a29844ea67854646ed4c9b7bd00897 |
| SHA512 | 57d566cdaeb4d40badb4427091026f81153f6ffdcbc6cd896ad1cebad725a785345a0d9f27d445e9ca4e7ba9450be7f1610cfc0e067075940363127017e1a506 |