Malware Analysis Report

2024-10-16 05:12

Sample ID 231031-rc586shc4t
Target ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe.zip
SHA256 1b775f652ddda4985cdee327095f4506f9f0a4ebd876b9e8ab2010742e099147
Tags
ammyyadmin flawedammyy bootkit persistence trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

1b775f652ddda4985cdee327095f4506f9f0a4ebd876b9e8ab2010742e099147

Threat Level: Known bad

The file ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe.zip was found to be: Known bad.

Malicious Activity Summary

ammyyadmin flawedammyy bootkit persistence trojan

Ammyyadmin family

FlawedAmmyy RAT

AmmyyAdmin payload

Writes to the Master Boot Record (MBR)

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-10-31 14:03

Signatures

AmmyyAdmin payload

Description Indicator Process Target
N/A N/A N/A N/A

Ammyyadmin family

ammyyadmin

Analysis: behavioral1

Detonation Overview

Submitted

2023-10-31 14:03

Reported

2023-10-31 14:27

Platform

win7-20231020-en

Max time kernel

118s

Max time network

132s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe"

Signatures

FlawedAmmyy RAT

trojan flawedammyy

Writes to the Master Boot Record (MBR)

bootkit persistence
Description Indicator Process Target
File opened for modification \??\PhysicalDrive0 C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe

"C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe"

C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe

"C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe" -service -lunch

C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe

"C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe"

Network

N/A

Files

C:\ProgramData\AMMYY\settings3.bin

MD5 eee25487e63ebac80dfa30d8329ad990
SHA1 a724b2707fdf97dec3db99796163883e2ef5a135
SHA256 95e08a9ca6170ba7ab8e1ced49880eb1c5b570ca3696b0fd0fc5aca947be4334
SHA512 898362e04cc04c1bd90d40edc227e31612704fd0c13b0700fee6fdfb3912cbd7b10d792537908b2e4b2cc70eac63969a91b5d7d7dac346328d6ae8db03e3b1a7

Analysis: behavioral2

Detonation Overview

Submitted

2023-10-31 14:03

Reported

2023-10-31 14:27

Platform

win10v2004-20231020-en

Max time kernel

141s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe

"C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe"

C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe

"C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe" -service -lunch

C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe

"C:\Users\Admin\AppData\Local\Temp\ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 29.81.57.23.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 158.240.127.40.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 1.208.79.178.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
IE 20.123.104.105:443 tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 8.8.8.8:53 8.3.197.209.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
FR 23.57.81.29:443 tcp
US 192.229.221.95:80 tcp
US 8.8.8.8:53 209.80.50.20.in-addr.arpa udp

Files

C:\ProgramData\AMMYY\settings3.bin

MD5 af29d5dce81acaaba25bd84febd558bc
SHA1 8abb8eb66514e0c1a0770dee427c8f87a594fdce
SHA256 2804f2504d52e4c9b6b646f7954b0bf2e9a29844ea67854646ed4c9b7bd00897
SHA512 57d566cdaeb4d40badb4427091026f81153f6ffdcbc6cd896ad1cebad725a785345a0d9f27d445e9ca4e7ba9450be7f1610cfc0e067075940363127017e1a506