Analysis
-
max time kernel
6s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2023 22:27
Behavioral task
behavioral1
Sample
fcc84b2913606db9ed575affe65591ae.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fcc84b2913606db9ed575affe65591ae.exe
Resource
win10v2004-20231222-en
General
-
Target
fcc84b2913606db9ed575affe65591ae.exe
-
Size
322KB
-
MD5
fcc84b2913606db9ed575affe65591ae
-
SHA1
a6b6c3e28d245df70c307c354eab877e5fb8efd2
-
SHA256
34ee9da62967a53c3bf97f9301aa9353a3b42e5bd40c3122b929e50e08d146c5
-
SHA512
5e6f9b0040acea1dce8463bd30eb7905de215fd378d112a4d50dd80303539c38e1f516b7512297c215ae77050445785f994a96b7c8ea94a075ea340229b7e0c7
-
SSDEEP
6144:MtU6T/wE1MFGonDrJU2kY1b94hsmjVTPdgBGE7YpqTFIVo+AxU36WDbl3:aU+/wEKAonDrFyhtTR+YQTL+Axg
Malware Config
Signatures
-
Ammyy Admin
Remote admin tool with various capabilities.
-
AmmyyAdmin payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4012-4-0x0000000000400000-0x00000000004BE000-memory.dmp family_ammyyadmin behavioral2/memory/2372-7-0x0000000000400000-0x00000000004BE000-memory.dmp family_ammyyadmin behavioral2/memory/4888-6-0x0000000000400000-0x00000000004BE000-memory.dmp family_ammyyadmin -
FlawedAmmyy RAT
Remote-access trojan based on leaked code for the Ammyy remote admin software.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
fcc84b2913606db9ed575affe65591ae.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation fcc84b2913606db9ed575affe65591ae.exe -
Processes:
resource yara_rule behavioral2/memory/2372-0-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral2/memory/4012-4-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral2/memory/2372-7-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral2/memory/4888-6-0x0000000000400000-0x00000000004BE000-memory.dmp upx -
Modifies data under HKEY_USERS 6 IoCs
Processes:
fcc84b2913606db9ed575affe65591ae.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy\Admin fcc84b2913606db9ed575affe65591ae.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE fcc84b2913606db9ed575affe65591ae.exe Key created \REGISTRY\USER\.DEFAULT\Software\Ammyy fcc84b2913606db9ed575affe65591ae.exe Key created \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin fcc84b2913606db9ed575affe65591ae.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin\hr = 537d56736608796d5b5b4e1552537fed9cfc1261b26b fcc84b2913606db9ed575affe65591ae.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin\hr3 = 200c620920f6377fadea7f545d2597a629a088e13e1737a2febdd34c6abdb740cc76c5cd8729cac5ab3b1ed44e8a0150ad36a15f824a0bb9b349f8aeba7ae26248326c81 fcc84b2913606db9ed575affe65591ae.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
fcc84b2913606db9ed575affe65591ae.exepid Process 4888 fcc84b2913606db9ed575affe65591ae.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
fcc84b2913606db9ed575affe65591ae.exepid Process 4888 fcc84b2913606db9ed575affe65591ae.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
fcc84b2913606db9ed575affe65591ae.exedescription pid Process procid_target PID 4012 wrote to memory of 4888 4012 fcc84b2913606db9ed575affe65591ae.exe 21 PID 4012 wrote to memory of 4888 4012 fcc84b2913606db9ed575affe65591ae.exe 21 PID 4012 wrote to memory of 4888 4012 fcc84b2913606db9ed575affe65591ae.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\fcc84b2913606db9ed575affe65591ae.exe"C:\Users\Admin\AppData\Local\Temp\fcc84b2913606db9ed575affe65591ae.exe"1⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\fcc84b2913606db9ed575affe65591ae.exe"C:\Users\Admin\AppData\Local\Temp\fcc84b2913606db9ed575affe65591ae.exe" -service -lunch1⤵
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\fcc84b2913606db9ed575affe65591ae.exe"C:\Users\Admin\AppData\Local\Temp\fcc84b2913606db9ed575affe65591ae.exe"2⤵
- Checks computer location settings
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4888
-