Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    31-10-2023 14:10

General

  • Target

    6f15160778efbf7ea7ae3d232d90cc8a1773841745e4bf370df3860570bb49f9.exe

  • Size

    770KB

  • MD5

    4b27ce8ba1995308e26f1c2cc7effc94

  • SHA1

    e0fef9d68b3b09971bf1462fd0541f16647bceef

  • SHA256

    6f15160778efbf7ea7ae3d232d90cc8a1773841745e4bf370df3860570bb49f9

  • SHA512

    55df4dcee0a1a7555faf66efbd51bbd3652a3d302e4f3ae9961a4fdb443f0940a77f94445608a339e47e05eecc7e10ec53e61048716f451c27ec79d0a7b1e569

  • SSDEEP

    24576:H3YRddOnSok4fx2j2z5kMNbsRtrxc130jVP:IRenlHx2j2zxlkpjV

Score
10/10

Malware Config

Signatures

  • FlawedAmmyy RAT

    Remote-access trojan based on leaked code for the Ammyy remote admin software.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 11 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f15160778efbf7ea7ae3d232d90cc8a1773841745e4bf370df3860570bb49f9.exe
    "C:\Users\Admin\AppData\Local\Temp\6f15160778efbf7ea7ae3d232d90cc8a1773841745e4bf370df3860570bb49f9.exe"
    1⤵
      PID:3032
    • C:\Users\Admin\AppData\Local\Temp\6f15160778efbf7ea7ae3d232d90cc8a1773841745e4bf370df3860570bb49f9.exe
      "C:\Users\Admin\AppData\Local\Temp\6f15160778efbf7ea7ae3d232d90cc8a1773841745e4bf370df3860570bb49f9.exe" -service -lunch
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2128
      • C:\Users\Admin\AppData\Local\Temp\6f15160778efbf7ea7ae3d232d90cc8a1773841745e4bf370df3860570bb49f9.exe
        "C:\Users\Admin\AppData\Local\Temp\6f15160778efbf7ea7ae3d232d90cc8a1773841745e4bf370df3860570bb49f9.exe"
        2⤵
        • Checks computer location settings
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Modifies system certificate store
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2972
        • C:\Windows\system32\rundll32.exe
          rundll32.exe "C:\ProgramData\AMMYY\aa_nts.dll",run
          3⤵
          • Loads dropped DLL
          PID:1092

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\AMMYY\aa_nts.dll

      Filesize

      902KB

      MD5

      480a66902e6e7cdafaa6711e8697ff8c

      SHA1

      6ac730962e7c1dba9e2ecc5733a506544f3c8d11

      SHA256

      7eaaaa6010bbcd6bb8c9ad08d4b0966c7aedc9b2ac24758f170012ac36e508b5

      SHA512

      7d010cd47b7d1adf66f9c97afc6c3805997aa5c7cc6ff13eddee81f24cf2b95a3fe375ec5b3d6185c0bc8840b4ad91ae143c73a39af26391cc182ab6a1793ba5

    • C:\ProgramData\AMMYY\aa_nts.msg

      Filesize

      45B

      MD5

      b1d22f734830054cf3da67b7ff3f84d6

      SHA1

      c3e21f75f2d7359d096a11de7b863e6cc3cf6808

      SHA256

      51909f0bcf49a68e1d041c72af208328a3352ffa531a09902f010a023466e82f

      SHA512

      3f59d8955bab67f1ad901e2c90f4a14bc039cc704a34e2b1f81f0c4e3f7ffd31a71a5c1fbb8f40d37c5822f59b999631368abe2a3da685686e36128a2b8b51c2

    • C:\ProgramData\AMMYY\settings3.bin

      Filesize

      282B

      MD5

      ac7221c691ef0a93dbbb5bee6efcb7ec

      SHA1

      54f197fef16badefb4bf0d7339f6bd1099e505da

      SHA256

      b6b033b71d3f7f92986e32a61b3244b9856e82a9c3d233696a0dfa29a517106f

      SHA512

      226299ab1b7b388473163f4fecc41d536755586b4c275475128c5e5946554cd9ca69df223469130d85516f2ac2330a2cb35dec2879355ea0186b63d8429dcd6b

    • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      9f61062ac645252ce686e74e23084dd8

      SHA1

      30487a85133230f35cab5634c092a1f9fa682e51

      SHA256

      c6e72eb0b49e3bc8c1aa4d4fc766138c90e7fd10d672dbdb6ad3616aad053f37

      SHA512

      ddabf9e182e4f15d1cf41723bb35515e915e7fa498a61b4130a63a2bf94e7719b4b41640902c35f26ce2964f4162e6b3db4a9f7f2771005c44ae28beb2427b5e

    • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      57d8bd99e9beb16237a9a89fc78300dd

      SHA1

      9751acb823124a347f57ed52b6c8b0d301312996

      SHA256

      864a3be6af43b8e505f053151b9a1f1e4aca9c71f36c77e717bb1facfa52ff36

      SHA512

      d39b104ce0c431d3d89758f3fe4049c36a7661dc2549b59e5bda0d1aa5c206aa49ca37152f1a6999a6b823e166e401e3719e0516326563f411a1bc6ebb65e4ab

    • C:\Windows\Temp\Tar92A.tmp

      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • \ProgramData\AMMYY\aa_nts.dll

      Filesize

      902KB

      MD5

      480a66902e6e7cdafaa6711e8697ff8c

      SHA1

      6ac730962e7c1dba9e2ecc5733a506544f3c8d11

      SHA256

      7eaaaa6010bbcd6bb8c9ad08d4b0966c7aedc9b2ac24758f170012ac36e508b5

      SHA512

      7d010cd47b7d1adf66f9c97afc6c3805997aa5c7cc6ff13eddee81f24cf2b95a3fe375ec5b3d6185c0bc8840b4ad91ae143c73a39af26391cc182ab6a1793ba5

    • \ProgramData\AMMYY\aa_nts.dll

      Filesize

      902KB

      MD5

      480a66902e6e7cdafaa6711e8697ff8c

      SHA1

      6ac730962e7c1dba9e2ecc5733a506544f3c8d11

      SHA256

      7eaaaa6010bbcd6bb8c9ad08d4b0966c7aedc9b2ac24758f170012ac36e508b5

      SHA512

      7d010cd47b7d1adf66f9c97afc6c3805997aa5c7cc6ff13eddee81f24cf2b95a3fe375ec5b3d6185c0bc8840b4ad91ae143c73a39af26391cc182ab6a1793ba5

    • \ProgramData\AMMYY\aa_nts.dll

      Filesize

      902KB

      MD5

      480a66902e6e7cdafaa6711e8697ff8c

      SHA1

      6ac730962e7c1dba9e2ecc5733a506544f3c8d11

      SHA256

      7eaaaa6010bbcd6bb8c9ad08d4b0966c7aedc9b2ac24758f170012ac36e508b5

      SHA512

      7d010cd47b7d1adf66f9c97afc6c3805997aa5c7cc6ff13eddee81f24cf2b95a3fe375ec5b3d6185c0bc8840b4ad91ae143c73a39af26391cc182ab6a1793ba5

    • \ProgramData\AMMYY\aa_nts.dll

      Filesize

      902KB

      MD5

      480a66902e6e7cdafaa6711e8697ff8c

      SHA1

      6ac730962e7c1dba9e2ecc5733a506544f3c8d11

      SHA256

      7eaaaa6010bbcd6bb8c9ad08d4b0966c7aedc9b2ac24758f170012ac36e508b5

      SHA512

      7d010cd47b7d1adf66f9c97afc6c3805997aa5c7cc6ff13eddee81f24cf2b95a3fe375ec5b3d6185c0bc8840b4ad91ae143c73a39af26391cc182ab6a1793ba5

    • memory/1092-119-0x0000000064200000-0x00000000642EE000-memory.dmp

      Filesize

      952KB