Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2023 09:30

General

  • Target

    138b791bb04c3073e3e752fdcf5bc5490c4169e9f553954b025aab8414c4589a.exe

  • Size

    531KB

  • MD5

    a544d2c23c55904dbf0f0190f42eaac6

  • SHA1

    e9d920e5400b36562dfe81b900b99d35b70576b9

  • SHA256

    138b791bb04c3073e3e752fdcf5bc5490c4169e9f553954b025aab8414c4589a

  • SHA512

    21d50d0239326ced64c8c294f53fd58fe715c3f38550b151117786b1201997e899414fefc3734fc139502d27b81c36c64d07dc64305ead24b80ac9646f114ac5

  • SSDEEP

    12288:fz9JHhp3l7Nt0P78PyCp3qkxD+XYaVikoSG6s7XuwMefn:fzXtNeP7v6XZMYackkX/

Score
10/10

Malware Config

Extracted

Family

amadey

Version

4.12

C2

http://brodoyouevenlift.co.za

Attributes
  • install_dir

    ce3eb8f6b2

  • install_file

    Utsysc.exe

  • strings_key

    c5b804d7b4c8a99f5afb89e5203cf3ba

  • url_paths

    /g9sdjScV2/index.php

    /vdhe8ejs3/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 5 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\138b791bb04c3073e3e752fdcf5bc5490c4169e9f553954b025aab8414c4589a.exe
    "C:\Users\Admin\AppData\Local\Temp\138b791bb04c3073e3e752fdcf5bc5490c4169e9f553954b025aab8414c4589a.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2952
    • C:\Users\Admin\AppData\Local\Temp\138b791bb04c3073e3e752fdcf5bc5490c4169e9f553954b025aab8414c4589a.exe
      C:\Users\Admin\AppData\Local\Temp\138b791bb04c3073e3e752fdcf5bc5490c4169e9f553954b025aab8414c4589a.exe
      2⤵
      • Loads dropped DLL
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3028
      • C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe
        "C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2636
        • C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe
          C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2932
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:2512
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {412E9BC8-9322-48C1-8E90-3B83BC461895} S-1-5-21-2085049433-1067986815-1244098655-1000:AHLBRYJO\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe
      C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1700
      • C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe
        C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe
        3⤵
        • Executes dropped EXE
        PID:2368
    • C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe
      C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1788
      • C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe
        C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe
        3⤵
        • Executes dropped EXE
        PID:1828
      • C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe
        C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe
        3⤵
        • Executes dropped EXE
        PID:2532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\085049433106

    Filesize

    63KB

    MD5

    7fc7c572a9dd56be1fd7c71d117078d6

    SHA1

    4086cee6aab35f3feb137febc43c5bc0e0b4b21b

    SHA256

    880b686e3b41292de144cdf722222e3edbf471d75ad8fb978cd64086d3fb4d26

    SHA512

    09d7594605d8537b7176be2baf063793551edd81eb5355ca77e6bc2b5649f37bc4782304149cda246febaaa255f222d8b5d0ee3936d18e4966b971c146598b8a

  • C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe

    Filesize

    531KB

    MD5

    a544d2c23c55904dbf0f0190f42eaac6

    SHA1

    e9d920e5400b36562dfe81b900b99d35b70576b9

    SHA256

    138b791bb04c3073e3e752fdcf5bc5490c4169e9f553954b025aab8414c4589a

    SHA512

    21d50d0239326ced64c8c294f53fd58fe715c3f38550b151117786b1201997e899414fefc3734fc139502d27b81c36c64d07dc64305ead24b80ac9646f114ac5

  • C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe

    Filesize

    531KB

    MD5

    a544d2c23c55904dbf0f0190f42eaac6

    SHA1

    e9d920e5400b36562dfe81b900b99d35b70576b9

    SHA256

    138b791bb04c3073e3e752fdcf5bc5490c4169e9f553954b025aab8414c4589a

    SHA512

    21d50d0239326ced64c8c294f53fd58fe715c3f38550b151117786b1201997e899414fefc3734fc139502d27b81c36c64d07dc64305ead24b80ac9646f114ac5

  • C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe

    Filesize

    531KB

    MD5

    a544d2c23c55904dbf0f0190f42eaac6

    SHA1

    e9d920e5400b36562dfe81b900b99d35b70576b9

    SHA256

    138b791bb04c3073e3e752fdcf5bc5490c4169e9f553954b025aab8414c4589a

    SHA512

    21d50d0239326ced64c8c294f53fd58fe715c3f38550b151117786b1201997e899414fefc3734fc139502d27b81c36c64d07dc64305ead24b80ac9646f114ac5

  • C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe

    Filesize

    531KB

    MD5

    a544d2c23c55904dbf0f0190f42eaac6

    SHA1

    e9d920e5400b36562dfe81b900b99d35b70576b9

    SHA256

    138b791bb04c3073e3e752fdcf5bc5490c4169e9f553954b025aab8414c4589a

    SHA512

    21d50d0239326ced64c8c294f53fd58fe715c3f38550b151117786b1201997e899414fefc3734fc139502d27b81c36c64d07dc64305ead24b80ac9646f114ac5

  • C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe

    Filesize

    531KB

    MD5

    a544d2c23c55904dbf0f0190f42eaac6

    SHA1

    e9d920e5400b36562dfe81b900b99d35b70576b9

    SHA256

    138b791bb04c3073e3e752fdcf5bc5490c4169e9f553954b025aab8414c4589a

    SHA512

    21d50d0239326ced64c8c294f53fd58fe715c3f38550b151117786b1201997e899414fefc3734fc139502d27b81c36c64d07dc64305ead24b80ac9646f114ac5

  • C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe

    Filesize

    531KB

    MD5

    a544d2c23c55904dbf0f0190f42eaac6

    SHA1

    e9d920e5400b36562dfe81b900b99d35b70576b9

    SHA256

    138b791bb04c3073e3e752fdcf5bc5490c4169e9f553954b025aab8414c4589a

    SHA512

    21d50d0239326ced64c8c294f53fd58fe715c3f38550b151117786b1201997e899414fefc3734fc139502d27b81c36c64d07dc64305ead24b80ac9646f114ac5

  • C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe

    Filesize

    531KB

    MD5

    a544d2c23c55904dbf0f0190f42eaac6

    SHA1

    e9d920e5400b36562dfe81b900b99d35b70576b9

    SHA256

    138b791bb04c3073e3e752fdcf5bc5490c4169e9f553954b025aab8414c4589a

    SHA512

    21d50d0239326ced64c8c294f53fd58fe715c3f38550b151117786b1201997e899414fefc3734fc139502d27b81c36c64d07dc64305ead24b80ac9646f114ac5

  • C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe

    Filesize

    531KB

    MD5

    a544d2c23c55904dbf0f0190f42eaac6

    SHA1

    e9d920e5400b36562dfe81b900b99d35b70576b9

    SHA256

    138b791bb04c3073e3e752fdcf5bc5490c4169e9f553954b025aab8414c4589a

    SHA512

    21d50d0239326ced64c8c294f53fd58fe715c3f38550b151117786b1201997e899414fefc3734fc139502d27b81c36c64d07dc64305ead24b80ac9646f114ac5

  • C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe

    Filesize

    531KB

    MD5

    a544d2c23c55904dbf0f0190f42eaac6

    SHA1

    e9d920e5400b36562dfe81b900b99d35b70576b9

    SHA256

    138b791bb04c3073e3e752fdcf5bc5490c4169e9f553954b025aab8414c4589a

    SHA512

    21d50d0239326ced64c8c294f53fd58fe715c3f38550b151117786b1201997e899414fefc3734fc139502d27b81c36c64d07dc64305ead24b80ac9646f114ac5

  • \Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe

    Filesize

    531KB

    MD5

    a544d2c23c55904dbf0f0190f42eaac6

    SHA1

    e9d920e5400b36562dfe81b900b99d35b70576b9

    SHA256

    138b791bb04c3073e3e752fdcf5bc5490c4169e9f553954b025aab8414c4589a

    SHA512

    21d50d0239326ced64c8c294f53fd58fe715c3f38550b151117786b1201997e899414fefc3734fc139502d27b81c36c64d07dc64305ead24b80ac9646f114ac5

  • \Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe

    Filesize

    531KB

    MD5

    a544d2c23c55904dbf0f0190f42eaac6

    SHA1

    e9d920e5400b36562dfe81b900b99d35b70576b9

    SHA256

    138b791bb04c3073e3e752fdcf5bc5490c4169e9f553954b025aab8414c4589a

    SHA512

    21d50d0239326ced64c8c294f53fd58fe715c3f38550b151117786b1201997e899414fefc3734fc139502d27b81c36c64d07dc64305ead24b80ac9646f114ac5

  • \Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe

    Filesize

    531KB

    MD5

    a544d2c23c55904dbf0f0190f42eaac6

    SHA1

    e9d920e5400b36562dfe81b900b99d35b70576b9

    SHA256

    138b791bb04c3073e3e752fdcf5bc5490c4169e9f553954b025aab8414c4589a

    SHA512

    21d50d0239326ced64c8c294f53fd58fe715c3f38550b151117786b1201997e899414fefc3734fc139502d27b81c36c64d07dc64305ead24b80ac9646f114ac5

  • \Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe

    Filesize

    531KB

    MD5

    a544d2c23c55904dbf0f0190f42eaac6

    SHA1

    e9d920e5400b36562dfe81b900b99d35b70576b9

    SHA256

    138b791bb04c3073e3e752fdcf5bc5490c4169e9f553954b025aab8414c4589a

    SHA512

    21d50d0239326ced64c8c294f53fd58fe715c3f38550b151117786b1201997e899414fefc3734fc139502d27b81c36c64d07dc64305ead24b80ac9646f114ac5

  • \Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe

    Filesize

    531KB

    MD5

    a544d2c23c55904dbf0f0190f42eaac6

    SHA1

    e9d920e5400b36562dfe81b900b99d35b70576b9

    SHA256

    138b791bb04c3073e3e752fdcf5bc5490c4169e9f553954b025aab8414c4589a

    SHA512

    21d50d0239326ced64c8c294f53fd58fe715c3f38550b151117786b1201997e899414fefc3734fc139502d27b81c36c64d07dc64305ead24b80ac9646f114ac5

  • memory/1700-70-0x0000000074010000-0x00000000746FE000-memory.dmp

    Filesize

    6.9MB

  • memory/1700-69-0x0000000000330000-0x00000000003BC000-memory.dmp

    Filesize

    560KB

  • memory/1700-71-0x0000000001F00000-0x0000000001F40000-memory.dmp

    Filesize

    256KB

  • memory/1700-88-0x0000000074010000-0x00000000746FE000-memory.dmp

    Filesize

    6.9MB

  • memory/1788-91-0x0000000000330000-0x00000000003BC000-memory.dmp

    Filesize

    560KB

  • memory/1788-93-0x0000000004680000-0x00000000046C0000-memory.dmp

    Filesize

    256KB

  • memory/1788-92-0x0000000074040000-0x000000007472E000-memory.dmp

    Filesize

    6.9MB

  • memory/1788-108-0x0000000074040000-0x000000007472E000-memory.dmp

    Filesize

    6.9MB

  • memory/2368-87-0x0000000000401000-0x0000000000454000-memory.dmp

    Filesize

    332KB

  • memory/2532-110-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2636-34-0x0000000073FD0000-0x00000000746BE000-memory.dmp

    Filesize

    6.9MB

  • memory/2636-33-0x0000000000330000-0x00000000003BC000-memory.dmp

    Filesize

    560KB

  • memory/2636-35-0x00000000002E0000-0x0000000000320000-memory.dmp

    Filesize

    256KB

  • memory/2636-48-0x0000000073FD0000-0x00000000746BE000-memory.dmp

    Filesize

    6.9MB

  • memory/2932-51-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2932-67-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2932-89-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2932-49-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2932-43-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2932-50-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2952-2-0x0000000004900000-0x0000000004940000-memory.dmp

    Filesize

    256KB

  • memory/2952-3-0x00000000041C0000-0x0000000004238000-memory.dmp

    Filesize

    480KB

  • memory/2952-1-0x0000000074530000-0x0000000074C1E000-memory.dmp

    Filesize

    6.9MB

  • memory/2952-4-0x0000000004C20000-0x0000000004C98000-memory.dmp

    Filesize

    480KB

  • memory/2952-19-0x0000000074530000-0x0000000074C1E000-memory.dmp

    Filesize

    6.9MB

  • memory/2952-0-0x0000000000CD0000-0x0000000000D5C000-memory.dmp

    Filesize

    560KB

  • memory/2952-5-0x0000000004CA0000-0x0000000004D1A000-memory.dmp

    Filesize

    488KB

  • memory/2952-6-0x0000000000700000-0x0000000000760000-memory.dmp

    Filesize

    384KB

  • memory/2952-7-0x0000000004240000-0x00000000042A0000-memory.dmp

    Filesize

    384KB

  • memory/2952-8-0x0000000000380000-0x00000000003CC000-memory.dmp

    Filesize

    304KB

  • memory/3028-13-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/3028-11-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/3028-10-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/3028-9-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/3028-12-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/3028-15-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/3028-14-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/3028-17-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/3028-21-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/3028-20-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/3028-22-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/3028-31-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB