Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231130-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-12-2023 07:31

General

  • Target

    2b3b153fd47433b92c199c148d5a2a431e107cae6ad2be0a07d0fe5ea9227285.exe

  • Size

    430KB

  • MD5

    fac43cfef66cbe7a612f11ab8acbce9f

  • SHA1

    ecbe7847537433957097edf20659b532ef9f8819

  • SHA256

    2b3b153fd47433b92c199c148d5a2a431e107cae6ad2be0a07d0fe5ea9227285

  • SHA512

    44f668b81704d6cf1a435ed4072e00d58ac4b98dae6fc1b069fc3c0da77553667fbc6f1c0c8db7084ae4b93bc6478e6e95b3933c6e3ed44d3ada60fbe99a127d

  • SSDEEP

    6144:5UNHaj0eTOkkyYrfKFoWTWbvYK8jHCw1E9BO21NE6iYSd3Sg/x:x0SfPFogWbyHRkBOuWY2Z5

Score
10/10

Malware Config

Extracted

Family

amadey

Version

4.11

C2

http://shohetrc.com

http://sibcomputer.ru

http://tve-mail.com

Attributes
  • install_dir

    d4dd819322

  • install_file

    Utsysc.exe

  • strings_key

    8419b3024d6f72beef8af6915e592308

  • url_paths

    /forum/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 32 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b3b153fd47433b92c199c148d5a2a431e107cae6ad2be0a07d0fe5ea9227285.exe
    "C:\Users\Admin\AppData\Local\Temp\2b3b153fd47433b92c199c148d5a2a431e107cae6ad2be0a07d0fe5ea9227285.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2456
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 616
      2⤵
      • Program crash
      PID:772
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 696
      2⤵
      • Program crash
      PID:3152
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 756
      2⤵
      • Program crash
      PID:3876
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 860
      2⤵
      • Program crash
      PID:544
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 768
      2⤵
      • Program crash
      PID:2752
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 884
      2⤵
      • Program crash
      PID:2756
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 1124
      2⤵
      • Program crash
      PID:4100
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 1140
      2⤵
      • Program crash
      PID:4412
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 1224
      2⤵
      • Program crash
      PID:3384
    • C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe
      "C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3096
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 640
        3⤵
        • Program crash
        PID:3004
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 760
        3⤵
        • Program crash
        PID:4880
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 760
        3⤵
        • Program crash
        PID:2244
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 980
        3⤵
        • Program crash
        PID:2476
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 1004
        3⤵
        • Program crash
        PID:4332
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 1004
        3⤵
        • Program crash
        PID:3208
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 1048
        3⤵
        • Program crash
        PID:2668
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:3536
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 924
        3⤵
        • Program crash
        PID:1040
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 1196
        3⤵
        • Program crash
        PID:2840
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 640
        3⤵
        • Program crash
        PID:4560
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 708
        3⤵
        • Program crash
        PID:4908
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 704
        3⤵
        • Program crash
        PID:4996
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 1228
        3⤵
        • Program crash
        PID:3620
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 1244
        3⤵
        • Program crash
        PID:1344
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 1296
        3⤵
        • Program crash
        PID:852
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 1320
        3⤵
        • Program crash
        PID:4244
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 1476
        3⤵
        • Program crash
        PID:3020
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 1552
        3⤵
        • Program crash
        PID:448
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 1576
        3⤵
        • Program crash
        PID:4840
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 1680
        3⤵
        • Program crash
        PID:440
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 1020
        3⤵
        • Program crash
        PID:3852
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 1344
      2⤵
      • Program crash
      PID:4968
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2456 -ip 2456
    1⤵
      PID:4560
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2456 -ip 2456
      1⤵
        PID:3892
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2456 -ip 2456
        1⤵
          PID:1088
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2456 -ip 2456
          1⤵
            PID:3840
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2456 -ip 2456
            1⤵
              PID:1344
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2456 -ip 2456
              1⤵
                PID:716
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2456 -ip 2456
                1⤵
                  PID:264
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2456 -ip 2456
                  1⤵
                    PID:2956
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2456 -ip 2456
                    1⤵
                      PID:4756
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2456 -ip 2456
                      1⤵
                        PID:388
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3096 -ip 3096
                        1⤵
                          PID:400
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3096 -ip 3096
                          1⤵
                            PID:3864
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3096 -ip 3096
                            1⤵
                              PID:884
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3096 -ip 3096
                              1⤵
                                PID:4684
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3096 -ip 3096
                                1⤵
                                  PID:1464
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3096 -ip 3096
                                  1⤵
                                    PID:4720
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3096 -ip 3096
                                    1⤵
                                      PID:5108
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3096 -ip 3096
                                      1⤵
                                        PID:3188
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3096 -ip 3096
                                        1⤵
                                          PID:3696
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3096 -ip 3096
                                          1⤵
                                            PID:4184
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3096 -ip 3096
                                            1⤵
                                              PID:4548
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3096 -ip 3096
                                              1⤵
                                                PID:4052
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3096 -ip 3096
                                                1⤵
                                                  PID:700
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3096 -ip 3096
                                                  1⤵
                                                    PID:2276
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3096 -ip 3096
                                                    1⤵
                                                      PID:2304
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3096 -ip 3096
                                                      1⤵
                                                        PID:3392
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3096 -ip 3096
                                                        1⤵
                                                          PID:5048
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3096 -ip 3096
                                                          1⤵
                                                            PID:1312
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3096 -ip 3096
                                                            1⤵
                                                              PID:1360
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3096 -ip 3096
                                                              1⤵
                                                                PID:3752
                                                              • C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe
                                                                C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe
                                                                1⤵
                                                                • Executes dropped EXE
                                                                PID:5028
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 464
                                                                  2⤵
                                                                  • Program crash
                                                                  PID:3448
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3096 -ip 3096
                                                                1⤵
                                                                  PID:3572
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5028 -ip 5028
                                                                  1⤵
                                                                    PID:3948
                                                                  • C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe
                                                                    1⤵
                                                                    • Executes dropped EXE
                                                                    PID:2164

                                                                  Network

                                                                  MITRE ATT&CK Matrix ATT&CK v13

                                                                  Execution

                                                                  Scheduled Task/Job

                                                                  1
                                                                  T1053

                                                                  Persistence

                                                                  Scheduled Task/Job

                                                                  1
                                                                  T1053

                                                                  Privilege Escalation

                                                                  Scheduled Task/Job

                                                                  1
                                                                  T1053

                                                                  Discovery

                                                                  Query Registry

                                                                  1
                                                                  T1012

                                                                  System Information Discovery

                                                                  2
                                                                  T1082

                                                                  Replay Monitor

                                                                  Loading Replay Monitor...

                                                                  Downloads

                                                                  • C:\Users\Admin\AppData\Local\Temp\231008292271
                                                                    Filesize

                                                                    81KB

                                                                    MD5

                                                                    a3142abe1be228b0f5b63a3f1a4a0449

                                                                    SHA1

                                                                    9ffb07c346896f82b3a8ee3dd1fdc5facd82b127

                                                                    SHA256

                                                                    f2e90cfa87f63058b8af2e6f7c9bd8a06093595eaefc1fbfb11b7ac14fbd7667

                                                                    SHA512

                                                                    6318c0fbda6dc6386d13a38fb7e0138a48e72dd9f2cb245468e413db89d0063050a12427ce513db1b685d05345d1b300180268c71b853f743922f7ebf3e8ec36

                                                                  • C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe
                                                                    Filesize

                                                                    430KB

                                                                    MD5

                                                                    fac43cfef66cbe7a612f11ab8acbce9f

                                                                    SHA1

                                                                    ecbe7847537433957097edf20659b532ef9f8819

                                                                    SHA256

                                                                    2b3b153fd47433b92c199c148d5a2a431e107cae6ad2be0a07d0fe5ea9227285

                                                                    SHA512

                                                                    44f668b81704d6cf1a435ed4072e00d58ac4b98dae6fc1b069fc3c0da77553667fbc6f1c0c8db7084ae4b93bc6478e6e95b3933c6e3ed44d3ada60fbe99a127d

                                                                  • C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe
                                                                    Filesize

                                                                    430KB

                                                                    MD5

                                                                    fac43cfef66cbe7a612f11ab8acbce9f

                                                                    SHA1

                                                                    ecbe7847537433957097edf20659b532ef9f8819

                                                                    SHA256

                                                                    2b3b153fd47433b92c199c148d5a2a431e107cae6ad2be0a07d0fe5ea9227285

                                                                    SHA512

                                                                    44f668b81704d6cf1a435ed4072e00d58ac4b98dae6fc1b069fc3c0da77553667fbc6f1c0c8db7084ae4b93bc6478e6e95b3933c6e3ed44d3ada60fbe99a127d

                                                                  • C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe
                                                                    Filesize

                                                                    430KB

                                                                    MD5

                                                                    fac43cfef66cbe7a612f11ab8acbce9f

                                                                    SHA1

                                                                    ecbe7847537433957097edf20659b532ef9f8819

                                                                    SHA256

                                                                    2b3b153fd47433b92c199c148d5a2a431e107cae6ad2be0a07d0fe5ea9227285

                                                                    SHA512

                                                                    44f668b81704d6cf1a435ed4072e00d58ac4b98dae6fc1b069fc3c0da77553667fbc6f1c0c8db7084ae4b93bc6478e6e95b3933c6e3ed44d3ada60fbe99a127d

                                                                  • C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe
                                                                    Filesize

                                                                    430KB

                                                                    MD5

                                                                    fac43cfef66cbe7a612f11ab8acbce9f

                                                                    SHA1

                                                                    ecbe7847537433957097edf20659b532ef9f8819

                                                                    SHA256

                                                                    2b3b153fd47433b92c199c148d5a2a431e107cae6ad2be0a07d0fe5ea9227285

                                                                    SHA512

                                                                    44f668b81704d6cf1a435ed4072e00d58ac4b98dae6fc1b069fc3c0da77553667fbc6f1c0c8db7084ae4b93bc6478e6e95b3933c6e3ed44d3ada60fbe99a127d

                                                                  • C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe
                                                                    Filesize

                                                                    430KB

                                                                    MD5

                                                                    fac43cfef66cbe7a612f11ab8acbce9f

                                                                    SHA1

                                                                    ecbe7847537433957097edf20659b532ef9f8819

                                                                    SHA256

                                                                    2b3b153fd47433b92c199c148d5a2a431e107cae6ad2be0a07d0fe5ea9227285

                                                                    SHA512

                                                                    44f668b81704d6cf1a435ed4072e00d58ac4b98dae6fc1b069fc3c0da77553667fbc6f1c0c8db7084ae4b93bc6478e6e95b3933c6e3ed44d3ada60fbe99a127d

                                                                  • memory/2456-2-0x0000000000C30000-0x0000000000C9C000-memory.dmp
                                                                    Filesize

                                                                    432KB

                                                                  • memory/2456-3-0x0000000000400000-0x00000000008B3000-memory.dmp
                                                                    Filesize

                                                                    4.7MB

                                                                  • memory/2456-14-0x0000000000400000-0x00000000008B3000-memory.dmp
                                                                    Filesize

                                                                    4.7MB

                                                                  • memory/2456-15-0x0000000000C30000-0x0000000000C9C000-memory.dmp
                                                                    Filesize

                                                                    432KB

                                                                  • memory/2456-1-0x0000000000B30000-0x0000000000C30000-memory.dmp
                                                                    Filesize

                                                                    1024KB

                                                                  • memory/3096-23-0x0000000000400000-0x00000000008B3000-memory.dmp
                                                                    Filesize

                                                                    4.7MB

                                                                  • memory/3096-18-0x0000000000400000-0x00000000008B3000-memory.dmp
                                                                    Filesize

                                                                    4.7MB

                                                                  • memory/3096-36-0x0000000000400000-0x00000000008B3000-memory.dmp
                                                                    Filesize

                                                                    4.7MB

                                                                  • memory/3096-37-0x0000000000C10000-0x0000000000D10000-memory.dmp
                                                                    Filesize

                                                                    1024KB

                                                                  • memory/3096-45-0x0000000000400000-0x00000000008B3000-memory.dmp
                                                                    Filesize

                                                                    4.7MB

                                                                  • memory/3096-17-0x0000000000C10000-0x0000000000D10000-memory.dmp
                                                                    Filesize

                                                                    1024KB

                                                                  • memory/5028-41-0x0000000000950000-0x0000000000A50000-memory.dmp
                                                                    Filesize

                                                                    1024KB

                                                                  • memory/5028-42-0x0000000000400000-0x00000000008B3000-memory.dmp
                                                                    Filesize

                                                                    4.7MB

                                                                  • memory/5028-43-0x0000000000400000-0x00000000008B3000-memory.dmp
                                                                    Filesize

                                                                    4.7MB