Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2024 20:23
Behavioral task
behavioral1
Sample
AAv3exe.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
AAv3exe.exe
Resource
win10v2004-20231215-en
General
-
Target
AAv3exe.exe
-
Size
722KB
-
MD5
45c9b54d66cbcc2de89f93e25f368a45
-
SHA1
2e5265f35f75a50c89e592e127bc80e1e45aa840
-
SHA256
349f7e00ee29b349b00c32318cb9b829b162167702957295712d37ebbb2a7a9a
-
SHA512
25c3f1ec6d2e233464090f584777b15f18acfd1cb12124c236680689545ec8208bc364d26d7202e38368dbec34cd824600afb51845df8c9de8c8e83fba8d8b1f
-
SSDEEP
12288:x2QKNGp2YPjE0d63iVg5Bfi781Rt1hpGqzdpW9eKVQvTPRpsbS5hEgK:xSIp2Ydd6SVcpz1RtXpGadsbShK
Malware Config
Signatures
-
FlawedAmmyy RAT
Remote-access trojan based on leaked code for the Ammyy remote admin software.
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 AAv3exe.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE AAv3exe.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies AAv3exe.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 AAv3exe.exe -
Modifies data under HKEY_USERS 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" AAv3exe.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin\hr3 = 8b52ec4cb6ea3fa29033c2c3aa5040e2dc47934ad76e2e4edd1a2828f4a893b359728f219498aaf3dfda22dc52b1151ab3a5206bda32410fac2f9d893c57c74e7e26e1f3 AAv3exe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy\Admin AAv3exe.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE AAv3exe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Ammyy AAv3exe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin AAv3exe.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin\hr = 537d56736608796d5b5b4e155253eed9fe20841bb26b AAv3exe.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix AAv3exe.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" AAv3exe.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2020 AAv3exe.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2020 AAv3exe.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4676 wrote to memory of 2020 4676 AAv3exe.exe 23 PID 4676 wrote to memory of 2020 4676 AAv3exe.exe 23 PID 4676 wrote to memory of 2020 4676 AAv3exe.exe 23
Processes
-
C:\Users\Admin\AppData\Local\Temp\AAv3exe.exe"C:\Users\Admin\AppData\Local\Temp\AAv3exe.exe"1⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\AAv3exe.exe"C:\Users\Admin\AppData\Local\Temp\AAv3exe.exe" -service -lunch1⤵
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\AAv3exe.exe"C:\Users\Admin\AppData\Local\Temp\AAv3exe.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2020
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22B
MD5fe1d8ad32775f423f3152bec0a4fab68
SHA1b219d2486b0e7e3816b4dc82401cb2482ba0c3a3
SHA2566bc0f2daec23d0dcef4fbba08580d129b3c09dfbb8d35aa01aa21ea592309ab7
SHA51216b1e11fdbc3230f2e3f14d59564f08aa590c5fc74092d675fb79d9ac8b58d04703572f8091e5fe09c576677ee28dd39bcaefa0fe3062020f92e9abf2d540808
-
Filesize
68B
MD500ad8e02512ceaf61dac1a0384505245
SHA123b5aeb1eeb8b8f2caf33d01f7e5024365f7d4db
SHA256c30bb584fa563c885661b77e31b68f0e0a1cc65c0add63c49e7eb69a30d24e50
SHA5120768a18dbca3e23a6f7a7a5b2cab16fc84a9d0b5a655a3a343d6e242bbdd5da585946a0828a0d4f6f247f1503e27f76d1a5e2fac0c00c91dd80a3ff905d617e1
-
Filesize
270B
MD56910d9160b66c4395f587a279e80f132
SHA154949c04c8c0970aa5e2d3fb2912318daab97b98
SHA25672d44ac6019d486fc1a58334ff8ed692de0a9ed96de3142638c71376ceade87c
SHA51282967a8bdbad58f2a81d063c84294153dbdd86322d4b6e3631122530dc7f00fd209ed1d2b0683eb60f726fd3d6f93c7615bd1d0d1fa1f5441119d0e5007582b9