Analysis
-
max time kernel
152s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
01-12-2023 15:06
Behavioral task
behavioral1
Sample
4731517b198414342891553881913565819509086b8154214462788c740b34c9.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
4731517b198414342891553881913565819509086b8154214462788c740b34c9.exe
Resource
win10v2004-20231127-en
General
-
Target
4731517b198414342891553881913565819509086b8154214462788c740b34c9.exe
-
Size
726KB
-
MD5
190785b2bb664324334c1b5231b5c4b0
-
SHA1
07539abb2623fe24b9a05e240f675fa2d15268cb
-
SHA256
4731517b198414342891553881913565819509086b8154214462788c740b34c9
-
SHA512
ab40f182fb52e5281f0761cf064a7f4b82ea04a2c9c00fe6faa4e61f8e632b8c7a64820e226b2ab668c99ada195c1ca117b702474bd023d84991a16dd10ba85c
-
SSDEEP
12288:8YdNctvsfu2LVBfKf057C9lRt3i5olGJsxhzagH:HdNikfu2hBfK8ilRty5olGJsxNH
Malware Config
Signatures
-
FlawedAmmyy RAT
Remote-access trojan based on leaked code for the Ammyy remote admin software.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
4731517b198414342891553881913565819509086b8154214462788c740b34c9.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Control Panel\International\Geo\Nation 4731517b198414342891553881913565819509086b8154214462788c740b34c9.exe -
Modifies data under HKEY_USERS 7 IoCs
Processes:
4731517b198414342891553881913565819509086b8154214462788c740b34c9.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy\Admin 4731517b198414342891553881913565819509086b8154214462788c740b34c9.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE 4731517b198414342891553881913565819509086b8154214462788c740b34c9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Ammyy 4731517b198414342891553881913565819509086b8154214462788c740b34c9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin 4731517b198414342891553881913565819509086b8154214462788c740b34c9.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin\hr = 537d56736608796e5f5e4c105953c77dbffd247bb26b 4731517b198414342891553881913565819509086b8154214462788c740b34c9.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin\hr3 = 07e16b812ece3298ecfc29a10cb8a6dbd45313635e473691bc69e310158a5d89b13bfc3059ad71ffff80888f37e73d04f3b73ee66b8644f05851b1388d8ee49b36280a33 4731517b198414342891553881913565819509086b8154214462788c740b34c9.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings 4731517b198414342891553881913565819509086b8154214462788c740b34c9.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
4731517b198414342891553881913565819509086b8154214462788c740b34c9.exepid process 2368 4731517b198414342891553881913565819509086b8154214462788c740b34c9.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
4731517b198414342891553881913565819509086b8154214462788c740b34c9.exepid process 2368 4731517b198414342891553881913565819509086b8154214462788c740b34c9.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
4731517b198414342891553881913565819509086b8154214462788c740b34c9.exedescription pid process target process PID 2228 wrote to memory of 2368 2228 4731517b198414342891553881913565819509086b8154214462788c740b34c9.exe 4731517b198414342891553881913565819509086b8154214462788c740b34c9.exe PID 2228 wrote to memory of 2368 2228 4731517b198414342891553881913565819509086b8154214462788c740b34c9.exe 4731517b198414342891553881913565819509086b8154214462788c740b34c9.exe PID 2228 wrote to memory of 2368 2228 4731517b198414342891553881913565819509086b8154214462788c740b34c9.exe 4731517b198414342891553881913565819509086b8154214462788c740b34c9.exe PID 2228 wrote to memory of 2368 2228 4731517b198414342891553881913565819509086b8154214462788c740b34c9.exe 4731517b198414342891553881913565819509086b8154214462788c740b34c9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4731517b198414342891553881913565819509086b8154214462788c740b34c9.exe"C:\Users\Admin\AppData\Local\Temp\4731517b198414342891553881913565819509086b8154214462788c740b34c9.exe"1⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\4731517b198414342891553881913565819509086b8154214462788c740b34c9.exe"C:\Users\Admin\AppData\Local\Temp\4731517b198414342891553881913565819509086b8154214462788c740b34c9.exe" -service -lunch1⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\4731517b198414342891553881913565819509086b8154214462788c740b34c9.exe"C:\Users\Admin\AppData\Local\Temp\4731517b198414342891553881913565819509086b8154214462788c740b34c9.exe"2⤵
- Checks computer location settings
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22B
MD5c69a96d2f781281f7508e08f1a0f95fb
SHA1130383ffa4974d99456f3fc4189e464f3de3e90b
SHA25639b10beb0035aa6bb2c424669d333077ff24625223433bf329c20bfdee4dcc5b
SHA51274fb6c0aeff16fb81b231081badc3df4f57bca5972e7aa517c8433383f13af1381b121330e48f69de71fcf7f41981d8b99b481c9fda00b9f9529455ec8019ede
-
Filesize
68B
MD5642e2d4c03ee37296c610dc53ebeca51
SHA1b87401fcca031cece87a3a08477ad72e9f2888e8
SHA25608c9bb8eb0355b0695d04f340434ef83e233e3aadaf22dd3b14e38f08d25ede6
SHA51293049bc9d9c5117401f4a964941f7e0b972d09443bfedbfc1b58fd3ca56533d781f8f381b6de03b6b3830127046653ef23a5aa1479316d6c00747b8cffdc750c
-
Filesize
271B
MD54cb889e527b0d0781a17f6c2dd968129
SHA16a6a55cd5604370660f1c1ad1025195169be8978
SHA2562658cd46dd49335e739cafa31ff2ec63f3315b65ecc171a0f7612713d3ac702b
SHA512297d2c05d2ac950faeb519d3e7bc56ea9d9fcab65b5dfdbba2720be8eddc8b2d5ead3dc7c122b82d6937be6c2d7bb88872dd7b80961138571245fba381daac3f