Analysis

  • max time kernel
    292s
  • max time network
    300s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    29-03-2024 01:49

General

  • Target

    639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exe

  • Size

    420KB

  • MD5

    8219dda07acbb3e33bf0683527e57bfe

  • SHA1

    b918fe7c55f89360ffe7dd8545287dbde3c2607c

  • SHA256

    639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b

  • SHA512

    330715518f51207db3a8a90ae036cdb7d0c8e873a1c2480887c26a5ab0c6c18b111577fe2f095d9e5134fc5829c13625ceb3cd13fff310050690dc67f8d341a6

  • SSDEEP

    6144:00BAcIN3u6RznWo2PX9526kR2MlNa6GO2rMRZzApr5vYqkN:FSN3u6lnWo6+6kR2MHax4R2FSX

Score
10/10

Malware Config

Extracted

Family

amadey

Version

4.18

Attributes
  • install_dir

    154561dcbf

  • install_file

    Dctooux.exe

  • strings_key

    2cd47fa043c815e1a033c67832f3c6a5

  • url_paths

    /j4Fvskd3/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Executes dropped EXE 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 11 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exe
    "C:\Users\Admin\AppData\Local\Temp\639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of FindShellTrayWindow
    PID:916
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 916 -s 688
      2⤵
      • Program crash
      PID:1476
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 916 -s 740
      2⤵
      • Program crash
      PID:2412
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 916 -s 812
      2⤵
      • Program crash
      PID:1460
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 916 -s 860
      2⤵
      • Program crash
      PID:1564
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 916 -s 864
      2⤵
      • Program crash
      PID:3248
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 916 -s 892
      2⤵
      • Program crash
      PID:2176
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 916 -s 1060
      2⤵
      • Program crash
      PID:1776
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 916 -s 1088
      2⤵
      • Program crash
      PID:2112
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 916 -s 1140
      2⤵
      • Program crash
      PID:1724
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 916 -s 1216
      2⤵
      • Program crash
      PID:2272
  • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
    C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
    1⤵
    • Executes dropped EXE
    PID:4600
  • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
    C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
    1⤵
    • Executes dropped EXE
    PID:1096
  • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
    C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
    1⤵
    • Executes dropped EXE
    PID:3280
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3280 -s 508
      2⤵
      • Program crash
      PID:644
  • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
    C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
    1⤵
    • Executes dropped EXE
    PID:3688
  • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
    C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
    1⤵
    • Executes dropped EXE
    PID:4232

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
    Filesize

    420KB

    MD5

    8219dda07acbb3e33bf0683527e57bfe

    SHA1

    b918fe7c55f89360ffe7dd8545287dbde3c2607c

    SHA256

    639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b

    SHA512

    330715518f51207db3a8a90ae036cdb7d0c8e873a1c2480887c26a5ab0c6c18b111577fe2f095d9e5134fc5829c13625ceb3cd13fff310050690dc67f8d341a6

  • memory/916-16-0x0000000000C00000-0x0000000000D00000-memory.dmp
    Filesize

    1024KB

  • memory/916-2-0x0000000002700000-0x000000000276F000-memory.dmp
    Filesize

    444KB

  • memory/916-3-0x0000000000400000-0x0000000000B12000-memory.dmp
    Filesize

    7.1MB

  • memory/916-8-0x0000000000400000-0x0000000000B12000-memory.dmp
    Filesize

    7.1MB

  • memory/916-1-0x0000000000C00000-0x0000000000D00000-memory.dmp
    Filesize

    1024KB

  • memory/1096-27-0x0000000000400000-0x0000000000B12000-memory.dmp
    Filesize

    7.1MB

  • memory/1096-26-0x0000000000400000-0x0000000000B12000-memory.dmp
    Filesize

    7.1MB

  • memory/1096-25-0x0000000000D00000-0x0000000000E00000-memory.dmp
    Filesize

    1024KB

  • memory/3280-38-0x0000000000400000-0x0000000000B12000-memory.dmp
    Filesize

    7.1MB

  • memory/3280-36-0x0000000000C50000-0x0000000000D50000-memory.dmp
    Filesize

    1024KB

  • memory/3280-37-0x0000000000400000-0x0000000000B12000-memory.dmp
    Filesize

    7.1MB

  • memory/3688-47-0x0000000000C20000-0x0000000000D20000-memory.dmp
    Filesize

    1024KB

  • memory/3688-48-0x0000000000400000-0x0000000000B12000-memory.dmp
    Filesize

    7.1MB

  • memory/3688-49-0x0000000000400000-0x0000000000B12000-memory.dmp
    Filesize

    7.1MB

  • memory/4232-58-0x0000000000CB0000-0x0000000000DB0000-memory.dmp
    Filesize

    1024KB

  • memory/4232-59-0x0000000000400000-0x0000000000B12000-memory.dmp
    Filesize

    7.1MB

  • memory/4232-60-0x0000000000400000-0x0000000000B12000-memory.dmp
    Filesize

    7.1MB

  • memory/4600-15-0x0000000000400000-0x0000000000B12000-memory.dmp
    Filesize

    7.1MB

  • memory/4600-14-0x0000000000400000-0x0000000000B12000-memory.dmp
    Filesize

    7.1MB

  • memory/4600-12-0x0000000000EA0000-0x0000000000FA0000-memory.dmp
    Filesize

    1024KB

  • memory/4600-13-0x0000000002740000-0x00000000027AF000-memory.dmp
    Filesize

    444KB