Analysis

  • max time kernel
    155s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-03-2024 09:55

General

  • Target

    91a3ef18527e726b4f65659774e6141bfb1a38f5bbee407143963de1bec3850b.exe

  • Size

    1.9MB

  • MD5

    1f59209462cea14c16e955af6c8bb13d

  • SHA1

    f4617169cc8bf7392497d5db9e3d6970ea8a6d49

  • SHA256

    91a3ef18527e726b4f65659774e6141bfb1a38f5bbee407143963de1bec3850b

  • SHA512

    12e69e188bbcee79608eccac3d7972e31cedbf207713e36d5eba7cc30b24f440e18daee182f2a7eddb56b2ee819fd588c9fa23b18d09a341902e6ad8bb45668c

  • SSDEEP

    49152:IyMS6zSWb9czXn7x0eDAmMVIDwx5RXcRFXYkXY8ReUIY:5kSWb91DiGXsnYkXZReU

Malware Config

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Identifies Wine through registry keys 2 TTPs 4 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\91a3ef18527e726b4f65659774e6141bfb1a38f5bbee407143963de1bec3850b.exe
    "C:\Users\Admin\AppData\Local\Temp\91a3ef18527e726b4f65659774e6141bfb1a38f5bbee407143963de1bec3850b.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:940
    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
      "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4620
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2824
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
          4⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3420
          • C:\Windows\system32\netsh.exe
            netsh wlan show profiles
            5⤵
              PID:2228
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\808065738166_Desktop.zip' -CompressionLevel Optimal
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4324
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
          3⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          PID:3320
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4172 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:5032
      • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
        C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
        1⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:4840
      • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
        C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
        1⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:4752

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

        Filesize

        444KB

        MD5

        d9546143a3a7c8eb55f855c88458d1c8

        SHA1

        f679463929a1965c15236d3e26b608982034703c

        SHA256

        60eff17cdc5110bb3949ccfafcb9997c4b7d48e28bc785e1d8a39dee285d5b46

        SHA512

        107da9277e3504dc8af3bf0a7fdbaedec865721cf3632c7ce1a6e512ba34c54098bb15afb4867121f97fca4135e0d6a917872b7b27095223f860c73b8e9d87eb

      • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

        Filesize

        1.8MB

        MD5

        243fb8d3e59cb88911022c2317cd08bd

        SHA1

        99fea7ac8263d562da1a475a66a17485ac75d399

        SHA256

        557e3263780e24484b2e2c0f64029688f3e3b69fbd4c746811029d7d9de5df7e

        SHA512

        dea43d8b70e56ce35af22b20df04eb6966f63893dcb4db8b34ce49beeb6390378c570c91c9d2f424d8bbedb58754ad83b7101b03e5aab111496ba74ef6f5999c

      • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

        Filesize

        234KB

        MD5

        59eed4e129fba3958a9aa94501da63ae

        SHA1

        4a26ae871e861e9409386a21487c35c7bae81c4f

        SHA256

        209eeab1ba3345fa9024f5be9cb8b8c51819213337a086111f290428596cc58c

        SHA512

        cceaf0d35eeeed8ba8ae8a850d089d984020b0fc27f5bd746316ff6b9a6ce7fab7efb76aee03f1cd1f85465b2547594b3c32cbc9a371e62e31a9f0d68619ca64

      • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

        Filesize

        62KB

        MD5

        bb73ada97260fae831c61573ad214f69

        SHA1

        5468f6887384e4c4f7488aa43592f7e849628c05

        SHA256

        100460b9ebdc5abac003e255b8c5e52edff73e5cdd22e973e737522bf4d79a3e

        SHA512

        47cba0e886ceca5a77cda72ce720fbf76d9c981e2fdfdb5aa3d6a7aa6ff4d3ad55331070da80a6ef9d768ede868be43eec5d357f426d3944c2312098248ce1f0

      • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

        Filesize

        1.9MB

        MD5

        1f59209462cea14c16e955af6c8bb13d

        SHA1

        f4617169cc8bf7392497d5db9e3d6970ea8a6d49

        SHA256

        91a3ef18527e726b4f65659774e6141bfb1a38f5bbee407143963de1bec3850b

        SHA512

        12e69e188bbcee79608eccac3d7972e31cedbf207713e36d5eba7cc30b24f440e18daee182f2a7eddb56b2ee819fd588c9fa23b18d09a341902e6ad8bb45668c

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_a3uszkvz.lpt.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

        Filesize

        109KB

        MD5

        726cd06231883a159ec1ce28dd538699

        SHA1

        404897e6a133d255ad5a9c26ac6414d7134285a2

        SHA256

        12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

        SHA512

        9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

      • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

        Filesize

        1.2MB

        MD5

        15a42d3e4579da615a384c717ab2109b

        SHA1

        22aeedeb2307b1370cdab70d6a6b6d2c13ad2301

        SHA256

        3c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103

        SHA512

        1eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444

      • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

        Filesize

        768KB

        MD5

        49e89eb80fbde94494451ee330f4621c

        SHA1

        87abe226d853b34469e2a03264310b155dac3325

        SHA256

        03dab89ab4f4d0a57f77b7deea27f041ca46d313726204469ce26d498b01ed90

        SHA512

        ba2c192e994e42cd1bf8e39615c92b77a08e5f8d89c8d16ce5d7d87f6832ee6b61bdefedce855c7bb42b7053ed4a448bc7414019d80daf79a05ce8e95e3a60f0

      • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

        Filesize

        261KB

        MD5

        a0a529e80c24a07dce74899615735617

        SHA1

        04633bb2b803103afbb8faf4b00884599e36eaf1

        SHA256

        97cce5d62f658eb0a330670f4627fc2fe899ac8387c4528f12ab50206c53ee3c

        SHA512

        4ebf98d7f389dc765ed2c1ab940a3a9f8843dac876f1c5c0e221b3ce71f9560199210cfe78bb38522bdb17716bf1e98cbb27704f17c283d2c5d3aa1ee9b93a2b

      • memory/940-7-0x0000000005590000-0x0000000005591000-memory.dmp

        Filesize

        4KB

      • memory/940-6-0x0000000005570000-0x0000000005571000-memory.dmp

        Filesize

        4KB

      • memory/940-13-0x0000000000F70000-0x0000000001440000-memory.dmp

        Filesize

        4.8MB

      • memory/940-16-0x0000000000F70000-0x0000000001440000-memory.dmp

        Filesize

        4.8MB

      • memory/940-11-0x00000000055F0000-0x00000000055F1000-memory.dmp

        Filesize

        4KB

      • memory/940-5-0x00000000055E0000-0x00000000055E1000-memory.dmp

        Filesize

        4KB

      • memory/940-8-0x0000000005580000-0x0000000005581000-memory.dmp

        Filesize

        4KB

      • memory/940-24-0x0000000000F70000-0x0000000001440000-memory.dmp

        Filesize

        4.8MB

      • memory/940-9-0x00000000055D0000-0x00000000055D1000-memory.dmp

        Filesize

        4KB

      • memory/940-26-0x0000000000F70000-0x0000000001440000-memory.dmp

        Filesize

        4.8MB

      • memory/940-0-0x0000000000F70000-0x0000000001440000-memory.dmp

        Filesize

        4.8MB

      • memory/940-10-0x0000000005600000-0x0000000005601000-memory.dmp

        Filesize

        4KB

      • memory/940-1-0x0000000077DA4000-0x0000000077DA6000-memory.dmp

        Filesize

        8KB

      • memory/940-2-0x0000000000F70000-0x0000000001440000-memory.dmp

        Filesize

        4.8MB

      • memory/940-3-0x00000000055B0000-0x00000000055B1000-memory.dmp

        Filesize

        4KB

      • memory/940-4-0x00000000055A0000-0x00000000055A1000-memory.dmp

        Filesize

        4KB

      • memory/4324-74-0x000001F5E33A0000-0x000001F5E33B0000-memory.dmp

        Filesize

        64KB

      • memory/4324-75-0x000001F5E33A0000-0x000001F5E33B0000-memory.dmp

        Filesize

        64KB

      • memory/4324-73-0x00007FFD74BC0000-0x00007FFD75681000-memory.dmp

        Filesize

        10.8MB

      • memory/4324-63-0x000001F5E3330000-0x000001F5E3352000-memory.dmp

        Filesize

        136KB

      • memory/4324-78-0x000001F5E34B0000-0x000001F5E34BA000-memory.dmp

        Filesize

        40KB

      • memory/4324-77-0x000001F5E34D0000-0x000001F5E34E2000-memory.dmp

        Filesize

        72KB

      • memory/4324-84-0x00007FFD74BC0000-0x00007FFD75681000-memory.dmp

        Filesize

        10.8MB

      • memory/4620-96-0x00000000008F0000-0x0000000000DC0000-memory.dmp

        Filesize

        4.8MB

      • memory/4620-99-0x00000000008F0000-0x0000000000DC0000-memory.dmp

        Filesize

        4.8MB

      • memory/4620-39-0x00000000008F0000-0x0000000000DC0000-memory.dmp

        Filesize

        4.8MB

      • memory/4620-38-0x00000000008F0000-0x0000000000DC0000-memory.dmp

        Filesize

        4.8MB

      • memory/4620-115-0x00000000008F0000-0x0000000000DC0000-memory.dmp

        Filesize

        4.8MB

      • memory/4620-114-0x00000000008F0000-0x0000000000DC0000-memory.dmp

        Filesize

        4.8MB

      • memory/4620-113-0x00000000008F0000-0x0000000000DC0000-memory.dmp

        Filesize

        4.8MB

      • memory/4620-112-0x00000000008F0000-0x0000000000DC0000-memory.dmp

        Filesize

        4.8MB

      • memory/4620-40-0x00000000008F0000-0x0000000000DC0000-memory.dmp

        Filesize

        4.8MB

      • memory/4620-27-0x00000000008F0000-0x0000000000DC0000-memory.dmp

        Filesize

        4.8MB

      • memory/4620-100-0x00000000008F0000-0x0000000000DC0000-memory.dmp

        Filesize

        4.8MB

      • memory/4620-28-0x00000000008F0000-0x0000000000DC0000-memory.dmp

        Filesize

        4.8MB

      • memory/4620-98-0x00000000008F0000-0x0000000000DC0000-memory.dmp

        Filesize

        4.8MB

      • memory/4620-36-0x0000000004CB0000-0x0000000004CB1000-memory.dmp

        Filesize

        4KB

      • memory/4620-37-0x0000000004CA0000-0x0000000004CA1000-memory.dmp

        Filesize

        4KB

      • memory/4620-31-0x0000000004C40000-0x0000000004C41000-memory.dmp

        Filesize

        4KB

      • memory/4620-32-0x0000000004C90000-0x0000000004C91000-memory.dmp

        Filesize

        4KB

      • memory/4620-33-0x0000000004C20000-0x0000000004C21000-memory.dmp

        Filesize

        4KB

      • memory/4620-97-0x00000000008F0000-0x0000000000DC0000-memory.dmp

        Filesize

        4.8MB

      • memory/4620-34-0x0000000004C30000-0x0000000004C31000-memory.dmp

        Filesize

        4KB

      • memory/4620-35-0x0000000004C80000-0x0000000004C81000-memory.dmp

        Filesize

        4KB

      • memory/4620-30-0x0000000004C60000-0x0000000004C61000-memory.dmp

        Filesize

        4KB

      • memory/4620-85-0x00000000008F0000-0x0000000000DC0000-memory.dmp

        Filesize

        4.8MB

      • memory/4620-29-0x0000000004C50000-0x0000000004C51000-memory.dmp

        Filesize

        4KB

      • memory/4752-110-0x00000000052C0000-0x00000000052C1000-memory.dmp

        Filesize

        4KB

      • memory/4752-104-0x0000000005290000-0x0000000005291000-memory.dmp

        Filesize

        4KB

      • memory/4752-111-0x00000000008F0000-0x0000000000DC0000-memory.dmp

        Filesize

        4.8MB

      • memory/4752-103-0x00000000008F0000-0x0000000000DC0000-memory.dmp

        Filesize

        4.8MB

      • memory/4752-105-0x00000000052A0000-0x00000000052A1000-memory.dmp

        Filesize

        4KB

      • memory/4752-106-0x0000000005280000-0x0000000005281000-memory.dmp

        Filesize

        4KB

      • memory/4752-102-0x00000000008F0000-0x0000000000DC0000-memory.dmp

        Filesize

        4.8MB

      • memory/4752-107-0x00000000052D0000-0x00000000052D1000-memory.dmp

        Filesize

        4KB

      • memory/4752-109-0x0000000005270000-0x0000000005271000-memory.dmp

        Filesize

        4KB

      • memory/4752-108-0x0000000005260000-0x0000000005261000-memory.dmp

        Filesize

        4KB

      • memory/4840-61-0x0000000004F60000-0x0000000004F61000-memory.dmp

        Filesize

        4KB

      • memory/4840-57-0x0000000004F90000-0x0000000004F91000-memory.dmp

        Filesize

        4KB

      • memory/4840-62-0x0000000004FB0000-0x0000000004FB1000-memory.dmp

        Filesize

        4KB

      • memory/4840-76-0x00000000008F0000-0x0000000000DC0000-memory.dmp

        Filesize

        4.8MB

      • memory/4840-56-0x0000000004F80000-0x0000000004F81000-memory.dmp

        Filesize

        4KB

      • memory/4840-55-0x00000000008F0000-0x0000000000DC0000-memory.dmp

        Filesize

        4.8MB

      • memory/4840-60-0x0000000004F50000-0x0000000004F51000-memory.dmp

        Filesize

        4KB

      • memory/4840-59-0x0000000004FC0000-0x0000000004FC1000-memory.dmp

        Filesize

        4KB

      • memory/4840-58-0x0000000004F70000-0x0000000004F71000-memory.dmp

        Filesize

        4KB

      • memory/4840-54-0x00000000008F0000-0x0000000000DC0000-memory.dmp

        Filesize

        4.8MB