Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    11-12-2023 01:24

General

  • Target

    246bc43dddcb46823b81aa3aab776e87.exe

  • Size

    2.5MB

  • MD5

    246bc43dddcb46823b81aa3aab776e87

  • SHA1

    0d8df13b80d6f50a107be6ad934d0a3353064d06

  • SHA256

    a406bfcf106fa5ba45ae292a1f0e5c3e805bec1ce594f2f5b5a012e07f384801

  • SHA512

    e57ede33f80d833e0d700bb7ea41592a3f15cd02c53c6a6b8526c90230c084e97adfe9e7c0c1b2d9d7a0ce1651f67eed0cce1432bc9fcee13ad2a5aefebe7505

  • SSDEEP

    49152:ZdSgw81FfOUtWIzmpr2uiy1VgBEjsKuo2unZwzPoM0XbXSoxdauV:ygVFWUtWQOxiVJo2unZwKXbX/7au

Malware Config

Extracted

Family

amadey

Version

4.13

C2

http://185.172.128.5

Attributes
  • install_dir

    4fdb51ccdc

  • install_file

    Utsysc.exe

  • strings_key

    11bb398ff31ee80d2c37571aecd1d36d

  • url_paths

    /v8sjh3hs8/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\246bc43dddcb46823b81aa3aab776e87.exe
    "C:\Users\Admin\AppData\Local\Temp\246bc43dddcb46823b81aa3aab776e87.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe
      "C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2408
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:2372
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll, Main
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2616
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll, Main
          4⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2152
          • C:\Windows\system32\netsh.exe
            netsh wlan show profiles
            5⤵
              PID:2620
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\80c6bf70bf3f8f\clip64.dll, Main
          3⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          PID:2228
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {980AF3C6-A4DB-4304-B7B0-608B83F6D049} S-1-5-21-1154728922-3261336865-3456416385-1000:TLIDUQCQ\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2972
      • C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe
        C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe
        2⤵
        • Executes dropped EXE
        PID:2724
      • C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe
        C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe
        2⤵
        • Executes dropped EXE
        PID:1456
      • C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe
        C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe
        2⤵
        • Executes dropped EXE
        PID:2428

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\154728922326

      Filesize

      60KB

      MD5

      b817961d87a2fb31cf78af0a4c15488e

      SHA1

      8d6af0c5a9e2ad30f08163d8f54bf61d33c3161d

      SHA256

      5b24c6c108c6a6aec43a05ba2d6506a3fd83b6301e0b29dd11f3e803b6f67902

      SHA512

      7af468583683e66b10403298ba513b058b4309e25ea3e945a2609694b98b7b290981af697bca0d8fedf78d924e1c0411b5e1db40fa1564b87bced96433fac044

    • C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe

      Filesize

      413KB

      MD5

      7c7dd8ca17f4b6fd3104f58c0cd2296f

      SHA1

      4a3f341cc2b4f172bfda0d8c6788a59d6cbb180c

      SHA256

      61a5a308617eaf659761e09ce8e752c0faaba44ce6f141b16d19b882eb54b799

      SHA512

      bbd2f44221ae7ddee10cbf4332cc602734b48d2de2f5ab29ef87b51ede5ebfdd3d085ab24245ccbfb6ce76e5836d98fd91fcbd9cc50bde68f105650e2d0eb92c

    • C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe

      Filesize

      338KB

      MD5

      c1a1033663268050f0d0fc502b62439b

      SHA1

      61fae59371c7f019fcc571d3d32b7c00087a7475

      SHA256

      7ddde3b8f97ca082cef86f5e9a346e4a8212f8064d674e925497ec7c4b508760

      SHA512

      13bef3d14931590e7350b184528622a83dd48271edeb31d7aeb0c1bc223e9f77212b5e025c52cb236982a7babf15134f41ec2cd7d64b51b2c1bff74024184e05

    • C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe

      Filesize

      2.5MB

      MD5

      246bc43dddcb46823b81aa3aab776e87

      SHA1

      0d8df13b80d6f50a107be6ad934d0a3353064d06

      SHA256

      a406bfcf106fa5ba45ae292a1f0e5c3e805bec1ce594f2f5b5a012e07f384801

      SHA512

      e57ede33f80d833e0d700bb7ea41592a3f15cd02c53c6a6b8526c90230c084e97adfe9e7c0c1b2d9d7a0ce1651f67eed0cce1432bc9fcee13ad2a5aefebe7505

    • C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe

      Filesize

      399KB

      MD5

      413da62dcb4343e2b00369427a919e2a

      SHA1

      6cda29b56e6ea81cdd6fabdb8127fe4df33d6335

      SHA256

      b8d5cbbdbb6f8db18e7bc8959d4b8ef56dc01e57a7a38b054594919b30802963

      SHA512

      cafaf033609175312fecc6de39e88a0aba03f6165465ad5cb1a38d2bacd5370bf13f5f2d790f5d139b752f377a39eba0af035a7a3f3a1a1afdb55d3847ba5555

    • C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe

      Filesize

      2.3MB

      MD5

      375d6832f4a88e9dab6a104885722172

      SHA1

      a256fc3510563e6536038aaf16fd1d465eb7a4b8

      SHA256

      81a0200888e7c842530d0071df2d930afd0928991c0fec4dbc973170c43b3f28

      SHA512

      c9e56f1ab81bee203a265ee34c9024e32c6a298600109fa781f73dafc26a5bc7f77c3ced9576b6c202afb71604acbabf81754a3e5c093fbe6799ac6c5d876463

    • C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe

      Filesize

      709KB

      MD5

      3cc3cec313adb055208d5cbc84a949dc

      SHA1

      36ea9f240f6cdd6128cc7976483b06a2a7f2d59d

      SHA256

      a921fa9402b313c9ac16fee3a58117609e861c10b83ce3c09309410c71c92512

      SHA512

      2c4a6c5cabda7d889c9ef32d983f3d7adf9e7dbe10cf9777931df921c55a9c1f3daadda010577ee37181b20a8bdbd19397daf3eee515085b464be62bd5639d2d

    • C:\Users\Admin\AppData\Roaming\80c6bf70bf3f8f\clip64.dll

      Filesize

      102KB

      MD5

      c06513af505f65393b4ebcd2a11a2ee4

      SHA1

      6e9e8a6b93fc9afbcc781790881d821b0bfb0821

      SHA256

      f5d35a2366cf13312a30c9384f1ac30d9dc9ced46fa6b1b9c2d0621493cc2495

      SHA512

      b90b8dc0571b2dde83c5ceaa4f12f203973bc2049663c0a840fa20a900bc7018f1f392f10273a607e816ccaf8a2b4f70bbc30b354437a2c9aecf5626b7c0a5ce

    • C:\Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll

      Filesize

      134KB

      MD5

      7e5d2361a38404320c13561dc9f1f29d

      SHA1

      1d3de12b8a39264b7d8c80c36dd0e02bbe76dff3

      SHA256

      36e3169c48a72837348171c4ea1e778324a96f1fbb42655ab78d739f6fed0881

      SHA512

      8637beac45849cef4c98baa023941126967c70130f16f8afe72fdc14091d7151374a4cc141f613082b36180813616533a6c9702cec497bf93ad5a914e5c04ea9

    • C:\Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll

      Filesize

      835KB

      MD5

      3d42c99243f47960df420fe07f115217

      SHA1

      43c74a04995716f67d6d421466f578a3f53078cb

      SHA256

      75fd9d33e270bfa73247beda61b8687b5f0e7a584352d2caf2212fe0928f3db8

      SHA512

      e3b167eded9d92f832c3253f66d22dceb85597fc0c8646c016fd422695755fd7d3d7ed37679ea15d636b0273e37d000844774eea6ff3e7bcee0e95fc51b9c960

    • \Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe

      Filesize

      906KB

      MD5

      83925adc03659d31bc0c9a3d78af50f7

      SHA1

      fb886e79111340055ce2fb902ff20722638b53e7

      SHA256

      31ee8bd5e2600a4c88493894c3099389cd0a0c8ae00d2849214de7b91984c06c

      SHA512

      af0ec51ed3d9eb26f99023040a66942b2c71285176657462e1e958d6f56ae3b6c67bcefcccfe63cb2e51bbbd18e1e91ca11aee40daebb76a1289f13bbf74e96c

    • \Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll

      Filesize

      556KB

      MD5

      09fe2ecb009437a9a3333065dfcf7e01

      SHA1

      e01a76e91d9a05afd0810238beca928abaac32b0

      SHA256

      6492578c3ff6ba7854adc052ae43a438d30307ebc6287f3a175bf182122e08ce

      SHA512

      08deecddc91144c72f543e14c4dd126d418c779654d396bee9155ec65d9fc9b832872a4a179da27cb68935f2b0194b17ce8a03e047632f7ed0099b2d6b57ba5a

    • \Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll

      Filesize

      114KB

      MD5

      320bb25e561a63b40a059af074a92742

      SHA1

      da21906f136f4e4a6d36706ee10305db0f3649f8

      SHA256

      4f18f6988ec51723dc07cc25b0bbb7d73d8704163805984bc01f5edd527abbec

      SHA512

      24369e34d220063923060e1cde3c5f61346d934695f5ad207f7a329c5e1ff75de26d33b7b835d117c4f3d549cb9113245f41e377daee7482b96a528b86cd427d

    • \Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll

      Filesize

      478KB

      MD5

      cd51f0ceb854693c32229e66c28f7c25

      SHA1

      d1b8d5be4192151c51b112f53d6a6774ceb20b8f

      SHA256

      1ed754f07927c40c556216c0f34c561ce4441f666c0d09b9cae7bde2b58b4763

      SHA512

      68afd2e2d871ccb7f7cd1d8c366fe65af0c2590a19876adc113b5a112f0f009cebb31509e4555a3c7ac41431c2472e87421a7d5ea4a8047b5f2c8957ec47cf1a

    • \Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll

      Filesize

      518KB

      MD5

      794691d072e9ce645baca19ed7bf0e40

      SHA1

      32a343dc266b8101a5aadb0bd96b2a609b49240b

      SHA256

      dbc4d6435944b63a36c45b5140d1bf9ecf55a80225843fa051ac65f8457f1ba6

      SHA512

      0ef847674bf3fdad69a3f7798baed188632fc172157c33fc3e9024ad314606aaa5519d07975b77ba9ae5d9247dd65a9f1e4e85dadd18ac9c64203e11e19f5f7e

    • \Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll

      Filesize

      424KB

      MD5

      58393d81657a93057437d6e0511cf98e

      SHA1

      46c04df597ff68a031c6e4259af9bf7b5fca9752

      SHA256

      7cf8257a55e25d1ad5bd0bbc89919bb8846c8a5538d0b8c1ab94be479652b5f3

      SHA512

      9a7a798936ee90b2d4b9026db57b9f8042307c2e50430a619618efad0858ea01b46227c698bf8218b0e66d57be7a58d8a59a481e91409ceb2115ec7a94581237

    • \Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll

      Filesize

      269KB

      MD5

      c6b406348068b269d292876ac4fac5c1

      SHA1

      bc186366a1b86c0b747a2931fea44caa12eae08d

      SHA256

      a72d01c0acd992ba83e7fa86e1f050a202e43d794b01ef14c46f1f514d30095c

      SHA512

      6e36b69c7b4119b90ce70f1f05aa759b86acd5b640b7e05a25a8f5c5380d266cf1d899e7a9f213dbc66188ed353a27fff87b088fc8c0ae7fba8c57bf7da5b634

    • \Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll

      Filesize

      573KB

      MD5

      5c7b413c446a082442a2d3ae964883f2

      SHA1

      c70ae792732da5983392a5ea956a4a2abc4f908c

      SHA256

      0c1e3f016f164469dc5ed8aab7c29f96d936993c2fbd95199febefe13f56ffc0

      SHA512

      531a28b8aa91e0b8d6eb35e16798d1b6abb495ec9afe781a0b92b672829c6b21d33518ecd2fd26774fa0596a604fe0adea40c438a483569d00c0f2e9a2ab8485

    • \Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll

      Filesize

      270KB

      MD5

      fb15c083133bbd382b742de33b8a10f9

      SHA1

      f41dfa18737253e1c96b9677b1d3c18edab9c201

      SHA256

      fbb85e29ca62b62df3148c51b29ff65b38bc21f838e7753469d609df17e7a5ac

      SHA512

      334625ba2b7ab78d54529bd1db04400854defa27211c56b45e027d0a41bee9767891775aeb83122e4f23cc3d9b8b283c4c36f89aa6fafff92101b1f416004a6e

    • memory/1456-62-0x0000000000D10000-0x0000000001140000-memory.dmp

      Filesize

      4.2MB

    • memory/1908-0-0x0000000001160000-0x0000000001590000-memory.dmp

      Filesize

      4.2MB

    • memory/1908-3-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/2408-12-0x0000000000D10000-0x0000000001140000-memory.dmp

      Filesize

      4.2MB

    • memory/2428-66-0x0000000000D10000-0x0000000001140000-memory.dmp

      Filesize

      4.2MB

    • memory/2724-26-0x0000000000D10000-0x0000000001140000-memory.dmp

      Filesize

      4.2MB