Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12/01/2024, 23:03

General

  • Target

    254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76.exe

  • Size

    5.0MB

  • MD5

    b1339ad6250fec1d3a23a937e5bac9e8

  • SHA1

    9168638e8819de7a7415412f2bac059db500ca4b

  • SHA256

    254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76

  • SHA512

    5c2b630985e7f79bee3a5851b2344ea109457dce4b6d1e792f4d293889d4b8fe44107231a06972a8335ef928398533d1c3288b87f6619a961d71e8d2748c8d01

  • SSDEEP

    49152:10PYJq3qZ4XZr2Uuac+kp5Zu0i93Dg2rXlBAz55QENm3rUEexR3OFwqGu+AUUWUv:1XJq3qZYnAl+2m3rFeR+6R0HG

Score
10/10

Malware Config

Extracted

Family

amadey

Version

4.15

C2

http://185.172.128.63

Attributes
  • install_dir

    6187fcb526

  • install_file

    Dctooux.exe

  • strings_key

    cd3b2619c9009c441355ae581d53163e

  • url_paths

    /v8sjh3hs8/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect ZGRat V1 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • .NET Reactor proctector 1 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76.exe
    "C:\Users\Admin\AppData\Local\Temp\254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      2⤵
        PID:2728
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        2⤵
          PID:2576

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • \Users\Admin\AppData\Local\Temp\Protect544cd51a.dll

        Filesize

        316KB

        MD5

        3603777425746d87189ed7d540ac9ef6

        SHA1

        ea624afc02e39a5007c7c3dc025b5a024597fc1c

        SHA256

        aad0716758711948b6779cd22de462b39b315b132d66b66a376971cedd16921d

        SHA512

        36bcf216242e89e4360d1739e803aa77069f5f2ee3299b4c093ab7bf706ecc4dd3b182db6d2c231e92be74ec9f6cceec11a37ee714ae44765a66e7a8919abdb0

      • memory/1936-40-0x0000000005040000-0x0000000005080000-memory.dmp

        Filesize

        256KB

      • memory/1936-36-0x0000000005040000-0x0000000005080000-memory.dmp

        Filesize

        256KB

      • memory/1936-3-0x0000000005040000-0x0000000005080000-memory.dmp

        Filesize

        256KB

      • memory/1936-4-0x00000000068A0000-0x0000000006B28000-memory.dmp

        Filesize

        2.5MB

      • memory/1936-5-0x0000000007D80000-0x0000000007F12000-memory.dmp

        Filesize

        1.6MB

      • memory/1936-1-0x0000000000C10000-0x000000000110A000-memory.dmp

        Filesize

        5.0MB

      • memory/1936-13-0x0000000005040000-0x0000000005080000-memory.dmp

        Filesize

        256KB

      • memory/1936-14-0x0000000005040000-0x0000000005080000-memory.dmp

        Filesize

        256KB

      • memory/1936-12-0x0000000000610000-0x0000000000620000-memory.dmp

        Filesize

        64KB

      • memory/1936-11-0x0000000005040000-0x0000000005080000-memory.dmp

        Filesize

        256KB

      • memory/1936-10-0x0000000005040000-0x0000000005080000-memory.dmp

        Filesize

        256KB

      • memory/1936-17-0x0000000005040000-0x0000000005080000-memory.dmp

        Filesize

        256KB

      • memory/1936-16-0x0000000005040000-0x0000000005080000-memory.dmp

        Filesize

        256KB

      • memory/1936-15-0x0000000005040000-0x0000000005080000-memory.dmp

        Filesize

        256KB

      • memory/1936-19-0x0000000005040000-0x0000000005080000-memory.dmp

        Filesize

        256KB

      • memory/1936-20-0x0000000005040000-0x0000000005080000-memory.dmp

        Filesize

        256KB

      • memory/1936-2-0x00000000745C0000-0x0000000074CAE000-memory.dmp

        Filesize

        6.9MB

      • memory/1936-44-0x00000000080C0000-0x00000000081C0000-memory.dmp

        Filesize

        1024KB

      • memory/1936-45-0x0000000005040000-0x0000000005080000-memory.dmp

        Filesize

        256KB

      • memory/1936-43-0x0000000005040000-0x0000000005080000-memory.dmp

        Filesize

        256KB

      • memory/1936-42-0x0000000005040000-0x0000000005080000-memory.dmp

        Filesize

        256KB

      • memory/1936-41-0x0000000005040000-0x0000000005080000-memory.dmp

        Filesize

        256KB

      • memory/1936-37-0x0000000005040000-0x0000000005080000-memory.dmp

        Filesize

        256KB

      • memory/1936-38-0x0000000005040000-0x0000000005080000-memory.dmp

        Filesize

        256KB

      • memory/1936-39-0x0000000005040000-0x0000000005080000-memory.dmp

        Filesize

        256KB

      • memory/1936-18-0x00000000080C0000-0x00000000081C0000-memory.dmp

        Filesize

        1024KB

      • memory/1936-0-0x00000000745C0000-0x0000000074CAE000-memory.dmp

        Filesize

        6.9MB

      • memory/2576-21-0x0000000000400000-0x000000000046D000-memory.dmp

        Filesize

        436KB

      • memory/2576-23-0x0000000000400000-0x000000000046D000-memory.dmp

        Filesize

        436KB

      • memory/2576-27-0x0000000000400000-0x000000000046D000-memory.dmp

        Filesize

        436KB

      • memory/2576-29-0x0000000000400000-0x000000000046D000-memory.dmp

        Filesize

        436KB

      • memory/2576-31-0x0000000000400000-0x000000000046D000-memory.dmp

        Filesize

        436KB

      • memory/2576-33-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2576-35-0x0000000000400000-0x000000000046D000-memory.dmp

        Filesize

        436KB

      • memory/2576-25-0x0000000000400000-0x000000000046D000-memory.dmp

        Filesize

        436KB