Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2024 12:12
Behavioral task
behavioral1
Sample
AA_v3.1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
AA_v3.1.exe
Resource
win10v2004-20240226-en
General
-
Target
AA_v3.1.exe
-
Size
717KB
-
MD5
9561c8f7bd981a9eaac23ec6fa9a65e5
-
SHA1
519d06745dad2be35d2de25f9739b80ea64e1fdd
-
SHA256
0fd5789a6ff2a978eddc093ac89df7192d17fd73825042c44acc844d7aa6517e
-
SHA512
6f263987d0d432d7b8d6080be1a5bd69d35f458ada851c301ec4162d91e14e9a6fcd20115920943ebf86ea4a64fd4c6e781ab430cc0c8eed97a5ed834686ae5b
-
SSDEEP
12288:UKHp9fDIItMm2o44sGTdBqWvwD+8ChCbW3XTjY1r1RtH8ePhAU5u0AhpZxAh9gJ:UorLkbDEhyW3XS1RtcePKUBATZxXJ
Malware Config
Signatures
-
FlawedAmmyy RAT
Remote-access trojan based on leaked code for the Ammyy remote admin software.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
AA_v3.1.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation AA_v3.1.exe -
Modifies data under HKEY_USERS 6 IoCs
Processes:
AA_v3.1.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE AA_v3.1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Ammyy AA_v3.1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin AA_v3.1.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin\hr = 537d56736608796d5b5b4e155253feca5a8f772ab26b AA_v3.1.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin\hr3 = f6dda5dcb4972cc780018e0eae115047a7021d3d8593e5b953ab167d8442353b5ee870749df6477d14fead6b6ac1b3cadc00d74a7d336788b18a1286fce26ad18f4708c7 AA_v3.1.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy\Admin AA_v3.1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AA_v3.1.exepid process 2188 AA_v3.1.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
AA_v3.1.exepid process 2188 AA_v3.1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
AA_v3.1.exedescription pid process target process PID 1656 wrote to memory of 2188 1656 AA_v3.1.exe AA_v3.1.exe PID 1656 wrote to memory of 2188 1656 AA_v3.1.exe AA_v3.1.exe PID 1656 wrote to memory of 2188 1656 AA_v3.1.exe AA_v3.1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\AA_v3.1.exe"C:\Users\Admin\AppData\Local\Temp\AA_v3.1.exe"1⤵PID:668
-
C:\Users\Admin\AppData\Local\Temp\AA_v3.1.exe"C:\Users\Admin\AppData\Local\Temp\AA_v3.1.exe" -service -lunch1⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\AA_v3.1.exe"C:\Users\Admin\AppData\Local\Temp\AA_v3.1.exe"2⤵
- Checks computer location settings
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22B
MD5cda6c93ee408bae8fc5ef0019136f331
SHA1fd8a76e47fa78ebe26d1dacd43a84b2eb703f3ee
SHA25686b2c584d34de4b55a1530f27abfd5429fa3c87b3eae3185dff12a7af2c50524
SHA512dd3aa6bbd934486b465d0e2f8413358cfd90063a88976c1f4f6ca65f37cc25a8ce457ca82e681297c91c7d40d28d276c5e1b0f8bbb397f8d50c45c91997c3498
-
Filesize
68B
MD5949dff3f2f052e8041b1e388333e6186
SHA113415d1d1b04a6d7b04f80cb600a1d1968a6639c
SHA2568e5f51dc679736192579f36f08c944768674093e0582b569bd89a93eae9c1ec4
SHA512127235956044dca664a2dbbd214ab3e5b982940be6e145c5ae3cfdc15eaf47eaee72719991cacae7dc05742954880c1ed1a89476745c58dbba54d9a87eadb439
-
Filesize
269B
MD5a55567fceb74f9ca4f151f4ab84b68c7
SHA163b4a57b258e640b165732dbcd0ca00fc69b4c8b
SHA256f649823939d0bf2b01f5c785e55d3e278c1ee7cc11b547c6644ac9f90996e9d7
SHA5123cbeb788c068008bdf2c7c19b696d464e66f66a969164cf98793e3150cf5ff82822de41deabb79921cbfcc93897ee824872c64a7bd9e131b1304105cad0f010f