Analysis

  • max time kernel
    291s
  • max time network
    295s
  • platform
    windows10-1703_x64
  • resource
    win10-20240214-en
  • resource tags

    arch:x64arch:x86image:win10-20240214-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2024 22:25

General

  • Target

    339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99.exe

  • Size

    442KB

  • MD5

    34468074c946943518ab33be24c01ef9

  • SHA1

    742cf7ff13dcab6a99b372dc99f362f45be3d69c

  • SHA256

    339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99

  • SHA512

    b13def10893e34d5efcb52d5b11b16c14881c27aca7f263d59a19fdad99e27681cd8cee85ba83762772ecbbf4e32eb373006627b932047eff00cbb725e9f942b

  • SSDEEP

    6144:9qIH8p8GgMyYRhuPTMCGzlmJDZWgECsFjKdJtH3s5ZBjnA:9d8p8GgAWP4CYE4BCsmdJFij0

Score
10/10

Malware Config

Extracted

Family

amadey

Version

4.18

Attributes
  • install_dir

    154561dcbf

  • install_file

    Dctooux.exe

  • strings_key

    2cd47fa043c815e1a033c67832f3c6a5

  • url_paths

    /j4Fvskd3/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99.exe
    "C:\Users\Admin\AppData\Local\Temp\339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99.exe"
    1⤵
    • Drops file in Windows directory
    PID:4808
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 688
      2⤵
      • Program crash
      PID:4244
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 736
      2⤵
      • Program crash
      PID:2824
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 808
      2⤵
      • Program crash
      PID:1280
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 832
      2⤵
      • Program crash
      PID:4444
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 844
      2⤵
      • Program crash
      PID:1544
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 784
      2⤵
      • Program crash
      PID:4128
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 1056
      2⤵
      • Program crash
      PID:3816
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 1120
      2⤵
      • Program crash
      PID:2168
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 1064
      2⤵
      • Program crash
      PID:4192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4808-1-0x0000000000C00000-0x0000000000D00000-memory.dmp

    Filesize

    1024KB

  • memory/4808-2-0x0000000002700000-0x000000000276F000-memory.dmp

    Filesize

    444KB

  • memory/4808-3-0x0000000000400000-0x0000000000B17000-memory.dmp

    Filesize

    7.1MB

  • memory/4808-5-0x0000000000400000-0x0000000000B17000-memory.dmp

    Filesize

    7.1MB

  • memory/4808-6-0x0000000000C00000-0x0000000000D00000-memory.dmp

    Filesize

    1024KB