Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2023 10:51

General

  • Target

    167442cdddc3ad06aa3cd879ebacd81a.exe

  • Size

    317KB

  • MD5

    167442cdddc3ad06aa3cd879ebacd81a

  • SHA1

    246a74400c573f1035acbc1da4c3776c4d8ad58b

  • SHA256

    b812dbe9129d88c1678a30de2ef373f01f7f6077c15b5652acbc18692427c8be

  • SHA512

    2b72fedf0e62213a3c926b2bc40f1c8ea72495d05343f20e14a62a40cca9d48a2c64d12d7d23c00462ee4f24f6413b2f91573f76d61cee58445c6ea48b2e6e20

  • SSDEEP

    6144:572yjcT7NjWEpGwZKFM8+a+e4cZNvemhN5h9ZnTJkz:cocT7NjEwZA2a+rQNvhhN5h9Za

Score
10/10

Malware Config

Extracted

Family

amadey

Version

2.50

C2

http://185.215.113.206

Attributes
  • install_dir

    bd1299733e

  • install_file

    rnyuf.exe

  • strings_key

    ad15f4a6e80870b6c41345d8514d8ee1

  • url_paths

    /k8FppT/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\167442cdddc3ad06aa3cd879ebacd81a.exe
    "C:\Users\Admin\AppData\Local\Temp\167442cdddc3ad06aa3cd879ebacd81a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1612
    • C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe
      "C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2324
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\bd1299733e\
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2720
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\bd1299733e\
          4⤵
            PID:2592
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rnyuf.exe /TR "C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe" /F
          3⤵
          • Creates scheduled task(s)
          PID:2332
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {C4DF8775-9ED2-45EA-8DC3-F5CFDB1B6914} S-1-5-21-1603059206-2004189698-4139800220-1000:AILVMYUM\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1352
      • C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe
        C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe
        2⤵
        • Executes dropped EXE
        PID:2076
      • C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe
        C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe
        2⤵
        • Executes dropped EXE
        PID:812

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\152116030592

      Filesize

      65KB

      MD5

      eccc47df0f3bc4512f34d89bbb871aef

      SHA1

      9e94248c36c6a73a51802fab1e8378219964b99a

      SHA256

      fe3bf4b1731bb6f56991ef412e8c5fd43e32d97f97aaa6a8ccb91a771f6b3a4a

      SHA512

      0d73f128085e4ba303482ba3bb979ab6d53aed1d67f97427482d2857261c99f743274ace2fea6960ba0e7312f3df3841a6dede75b3f9b2185f9f03e46921cf0d

    • C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe

      Filesize

      128KB

      MD5

      32c57d8f44fd9e70a88265c85d839256

      SHA1

      92aeca60abaa1621ff7ff9875a8867e927be0ec0

      SHA256

      c96b3d151c7c97f4dc006161ee02dd520da297a23402bfdeabcc509628aaabda

      SHA512

      5a5534d739ffda9494030d779d5f19281d0a5e69a637c41262069fa2436cc42d8f406fc83814c4f3f538839cfbcc2c0788206c65074ae3d60031ca209beae270

    • C:\Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe

      Filesize

      64KB

      MD5

      49da4d97a512ebe8aaf15ff252d1c4bf

      SHA1

      8d4a1ece150448179ecda2463f619b08d5da872e

      SHA256

      38b6f70a7a7ea41a883065a34d6694afbc33d37309c18e6e636720320ad7ad21

      SHA512

      a246ee90d9f505ae33163d78a6d00b631812c19f8cf65c4775c303fb11cf80d981b1c24111d5755450c6f00e9b225603239ab4473e69b45b592f2922f966c440

    • \Users\Admin\AppData\Local\Temp\bd1299733e\rnyuf.exe

      Filesize

      317KB

      MD5

      167442cdddc3ad06aa3cd879ebacd81a

      SHA1

      246a74400c573f1035acbc1da4c3776c4d8ad58b

      SHA256

      b812dbe9129d88c1678a30de2ef373f01f7f6077c15b5652acbc18692427c8be

      SHA512

      2b72fedf0e62213a3c926b2bc40f1c8ea72495d05343f20e14a62a40cca9d48a2c64d12d7d23c00462ee4f24f6413b2f91573f76d61cee58445c6ea48b2e6e20

    • memory/1612-2-0x0000000000220000-0x0000000000253000-memory.dmp

      Filesize

      204KB

    • memory/1612-18-0x0000000000400000-0x00000000023BA000-memory.dmp

      Filesize

      31.7MB

    • memory/1612-20-0x0000000000220000-0x0000000000253000-memory.dmp

      Filesize

      204KB

    • memory/1612-10-0x0000000000400000-0x00000000023BA000-memory.dmp

      Filesize

      31.7MB

    • memory/1612-1-0x00000000024D0000-0x00000000025D0000-memory.dmp

      Filesize

      1024KB

    • memory/2076-53-0x0000000000400000-0x00000000023BA000-memory.dmp

      Filesize

      31.7MB

    • memory/2076-54-0x0000000000270000-0x0000000000370000-memory.dmp

      Filesize

      1024KB

    • memory/2324-29-0x0000000000400000-0x00000000023BA000-memory.dmp

      Filesize

      31.7MB

    • memory/2324-36-0x0000000000400000-0x00000000023BA000-memory.dmp

      Filesize

      31.7MB

    • memory/2324-34-0x0000000002430000-0x0000000002530000-memory.dmp

      Filesize

      1024KB

    • memory/2324-32-0x0000000000400000-0x00000000023BA000-memory.dmp

      Filesize

      31.7MB

    • memory/2324-26-0x0000000002430000-0x0000000002530000-memory.dmp

      Filesize

      1024KB

    • memory/2324-62-0x0000000000400000-0x00000000023BA000-memory.dmp

      Filesize

      31.7MB