Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240319-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-03-2024 22:45

General

  • Target

    7b432411c12d3d0d31ecaf9011450e42.exe

  • Size

    420KB

  • MD5

    7b432411c12d3d0d31ecaf9011450e42

  • SHA1

    968943d42ba1e8938989b6ed1884195c2285396f

  • SHA256

    3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348

  • SHA512

    6881c00ec9674a90b6390e18bcff67d0a5c837411f83955869a9cb2b62bccdedbc93561e70f6ddab7baaf908c8154de3a5bb982d0ee9ecc62363cc67d9cf563b

  • SSDEEP

    6144:lfBwgfV+aXoGJR1xpppStlxu4qGilNZZDLxFLWj4+36o9:l3V+anFxZUq1NZJ9N8qu

Malware Config

Extracted

Family

amadey

Version

4.18

Attributes
  • install_dir

    154561dcbf

  • install_file

    Dctooux.exe

  • strings_key

    2cd47fa043c815e1a033c67832f3c6a5

  • url_paths

    /j4Fvskd3/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 26 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b432411c12d3d0d31ecaf9011450e42.exe
    "C:\Users\Admin\AppData\Local\Temp\7b432411c12d3d0d31ecaf9011450e42.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3176
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 712
      2⤵
      • Program crash
      PID:3476
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 800
      2⤵
      • Program crash
      PID:3160
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 856
      2⤵
      • Program crash
      PID:840
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 912
      2⤵
      • Program crash
      PID:3220
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 920
      2⤵
      • Program crash
      PID:4556
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 948
      2⤵
      • Program crash
      PID:3916
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 1136
      2⤵
      • Program crash
      PID:2504
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 1208
      2⤵
      • Program crash
      PID:4144
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 1260
      2⤵
      • Program crash
      PID:4420
    • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
      "C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe"
      2⤵
      • Executes dropped EXE
      PID:1760
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1760 -s 480
        3⤵
        • Program crash
        PID:4828
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 1336
      2⤵
      • Program crash
      PID:3036
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3176 -ip 3176
    1⤵
      PID:4828
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3176 -ip 3176
      1⤵
        PID:1924
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3176 -ip 3176
        1⤵
          PID:3672
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3176 -ip 3176
          1⤵
            PID:3512
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3176 -ip 3176
            1⤵
              PID:4904
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3176 -ip 3176
              1⤵
                PID:4580
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3176 -ip 3176
                1⤵
                  PID:2368
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3176 -ip 3176
                  1⤵
                    PID:3168
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3176 -ip 3176
                    1⤵
                      PID:4948
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3176 -ip 3176
                      1⤵
                        PID:3000
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1760 -ip 1760
                        1⤵
                          PID:2684
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1032 --field-trial-handle=2264,i,7994609493164365963,13212734413040148104,262144 --variations-seed-version /prefetch:8
                          1⤵
                            PID:4144
                          • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                            C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                            1⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • Suspicious use of WriteProcessMemory
                            PID:3808
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 524
                              2⤵
                              • Program crash
                              PID:3988
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 532
                              2⤵
                              • Program crash
                              PID:1436
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 544
                              2⤵
                              • Program crash
                              PID:2684
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 692
                              2⤵
                              • Program crash
                              PID:1848
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 812
                              2⤵
                              • Program crash
                              PID:4400
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 844
                              2⤵
                              • Program crash
                              PID:3716
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 884
                              2⤵
                              • Program crash
                              PID:4772
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 904
                              2⤵
                              • Program crash
                              PID:4288
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 852
                              2⤵
                              • Program crash
                              PID:1900
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 700
                              2⤵
                              • Program crash
                              PID:4960
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 1104
                              2⤵
                              • Program crash
                              PID:2948
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 836
                              2⤵
                              • Program crash
                              PID:2152
                            • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                              "C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe"
                              2⤵
                                PID:4588
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 1560
                                2⤵
                                • Program crash
                                PID:868
                              • C:\Windows\SysWOW64\rundll32.exe
                                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main
                                2⤵
                                • Loads dropped DLL
                                • Suspicious use of WriteProcessMemory
                                PID:2228
                                • C:\Windows\system32\rundll32.exe
                                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main
                                  3⤵
                                  • Blocklisted process makes network request
                                  • Loads dropped DLL
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of WriteProcessMemory
                                  PID:4424
                                  • C:\Windows\system32\netsh.exe
                                    netsh wlan show profiles
                                    4⤵
                                      PID:3988
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\172592802658_Desktop.zip' -CompressionLevel Optimal
                                      4⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1856
                                • C:\Windows\SysWOW64\rundll32.exe
                                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\clip64.dll, Main
                                  2⤵
                                  • Blocklisted process makes network request
                                  • Loads dropped DLL
                                  PID:3512
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 1412
                                  2⤵
                                  • Program crash
                                  PID:1044
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 1576
                                  2⤵
                                  • Program crash
                                  PID:2108
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3808 -ip 3808
                                1⤵
                                  PID:4352
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3808 -ip 3808
                                  1⤵
                                    PID:4056
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3808 -ip 3808
                                    1⤵
                                      PID:3628
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3808 -ip 3808
                                      1⤵
                                        PID:1856
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 392 -p 3808 -ip 3808
                                        1⤵
                                          PID:4940
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3808 -ip 3808
                                          1⤵
                                            PID:1760
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3808 -ip 3808
                                            1⤵
                                              PID:4696
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3808 -ip 3808
                                              1⤵
                                                PID:2348
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3808 -ip 3808
                                                1⤵
                                                  PID:3028
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3808 -ip 3808
                                                  1⤵
                                                    PID:2852
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3808 -ip 3808
                                                    1⤵
                                                      PID:4512
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3808 -ip 3808
                                                      1⤵
                                                        PID:3916
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3808 -ip 3808
                                                        1⤵
                                                          PID:3588
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3808 -ip 3808
                                                          1⤵
                                                            PID:1160
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3808 -ip 3808
                                                            1⤵
                                                              PID:3116

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe

                                                              Filesize

                                                              420KB

                                                              MD5

                                                              7b432411c12d3d0d31ecaf9011450e42

                                                              SHA1

                                                              968943d42ba1e8938989b6ed1884195c2285396f

                                                              SHA256

                                                              3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348

                                                              SHA512

                                                              6881c00ec9674a90b6390e18bcff67d0a5c837411f83955869a9cb2b62bccdedbc93561e70f6ddab7baaf908c8154de3a5bb982d0ee9ecc62363cc67d9cf563b

                                                            • C:\Users\Admin\AppData\Local\Temp\172592802658

                                                              Filesize

                                                              80KB

                                                              MD5

                                                              a45743802b03983225ccd4a0da3a6cbb

                                                              SHA1

                                                              d6eb40ef46c2b312fab9e3c40a4379a1ba617410

                                                              SHA256

                                                              3e5621bc133a09b8eaab7ca95659d21021af3fdf2a27e44b7496906233876aa7

                                                              SHA512

                                                              519993201af1ebf834c269bfde3bfff418395382e929a2902595ae3c982028e792236936a58ac8e3b77d7ee2eb137c06fe3ee3c9a971b3f541af11b6aea0b289

                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2nknqdst.qza.ps1

                                                              Filesize

                                                              60B

                                                              MD5

                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                              SHA1

                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                              SHA256

                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                              SHA512

                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                            • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\clip64.dll

                                                              Filesize

                                                              109KB

                                                              MD5

                                                              ca684dc5ebed4381701a39f1cc3a0fb2

                                                              SHA1

                                                              8c4a375aa583bd1c705597a7f45fd18934276770

                                                              SHA256

                                                              b8c5ad09c5b62fa8d8bcb8e1c317700274b4756d04fc964ccae38103c318ddd2

                                                              SHA512

                                                              8b414799e37d50f664e04e704ab06a8f6f25cb9f9c24f157e998a72aad9c0a0cd9435b42c629dc26643f039725d22a89ca3468dc39009d11d910420a80e9c510

                                                            • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll

                                                              Filesize

                                                              1.2MB

                                                              MD5

                                                              4876ee75ce2712147c41ff1277cd2d30

                                                              SHA1

                                                              3733dc92318f0c6b92cb201e49151686281acda6

                                                              SHA256

                                                              bbfba2d40f48c16a53b5806555c08aff1982c3fe4a77964963edbab9d7e672ed

                                                              SHA512

                                                              9bf25d4d0dfebd287b0c84abb64612b3db00a26b0217490b35925e77487d6c872632c936cedf1205c46ecbf9d4dfc9bc7600bee05afc550b30ae0d0964c5afe9

                                                            • memory/1760-22-0x0000000000D90000-0x0000000000DFF000-memory.dmp

                                                              Filesize

                                                              444KB

                                                            • memory/1760-25-0x0000000000400000-0x0000000000B12000-memory.dmp

                                                              Filesize

                                                              7.1MB

                                                            • memory/1760-21-0x0000000000E80000-0x0000000000F80000-memory.dmp

                                                              Filesize

                                                              1024KB

                                                            • memory/1760-23-0x0000000000400000-0x0000000000B12000-memory.dmp

                                                              Filesize

                                                              7.1MB

                                                            • memory/1856-63-0x00007FFC74C50000-0x00007FFC75711000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/1856-66-0x0000021CE2A30000-0x0000021CE2A40000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/1856-67-0x0000021CE29A0000-0x0000021CE29B2000-memory.dmp

                                                              Filesize

                                                              72KB

                                                            • memory/1856-74-0x00007FFC74C50000-0x00007FFC75711000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/1856-68-0x0000021CE2980000-0x0000021CE298A000-memory.dmp

                                                              Filesize

                                                              40KB

                                                            • memory/1856-53-0x0000021CCA390000-0x0000021CCA3B2000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/1856-64-0x0000021CE2A30000-0x0000021CE2A40000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/3176-1-0x0000000000BC0000-0x0000000000CC0000-memory.dmp

                                                              Filesize

                                                              1024KB

                                                            • memory/3176-2-0x0000000002870000-0x00000000028DF000-memory.dmp

                                                              Filesize

                                                              444KB

                                                            • memory/3176-3-0x0000000000400000-0x0000000000B12000-memory.dmp

                                                              Filesize

                                                              7.1MB

                                                            • memory/3176-24-0x0000000000400000-0x0000000000B12000-memory.dmp

                                                              Filesize

                                                              7.1MB

                                                            • memory/3808-41-0x0000000000400000-0x0000000000B12000-memory.dmp

                                                              Filesize

                                                              7.1MB

                                                            • memory/3808-65-0x0000000000D70000-0x0000000000E70000-memory.dmp

                                                              Filesize

                                                              1024KB

                                                            • memory/3808-29-0x0000000000400000-0x0000000000B12000-memory.dmp

                                                              Filesize

                                                              7.1MB

                                                            • memory/3808-75-0x0000000000400000-0x0000000000B12000-memory.dmp

                                                              Filesize

                                                              7.1MB

                                                            • memory/3808-28-0x0000000000D70000-0x0000000000E70000-memory.dmp

                                                              Filesize

                                                              1024KB

                                                            • memory/3808-87-0x0000000000400000-0x0000000000B12000-memory.dmp

                                                              Filesize

                                                              7.1MB