Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    18/04/2024, 04:53

General

  • Target

    c92ec1cea5a09af2f334a2e0d127f41827855c21c5e72.exe

  • Size

    436KB

  • MD5

    f6ee2a295cd2ba584f9a363ade3d55b3

  • SHA1

    c6966445c9adf9a0afe1a62b91d1e4f75c5ac55c

  • SHA256

    c92ec1cea5a09af2f334a2e0d127f41827855c21c5e725afb702ec29e705d1f3

  • SHA512

    7db8c37f43efc0414e394dfe3c335e8073dcc53f11093dd9452a750c34b2e16fc058f83fdddbb17b430ac501aabc6af6b03b23afa7826ccac1678f86546b025b

  • SSDEEP

    6144:vZLBvj27DEXhnzCaknvrhHq6p5Km/OZ2iqzUhYA0FvYgtv3EagG64/dAdUcgf:hd72YmQ/mWZUzGUvYgt8FGBxcg

Malware Config

Extracted

Family

amadey

Version

4.19

Attributes
  • install_dir

    cbb1d94791

  • install_file

    Dctooux.exe

  • strings_key

    fcebaf717c71f51f8908b537784e2bee

  • url_paths

    /8bjndDcoA3/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 14 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c92ec1cea5a09af2f334a2e0d127f41827855c21c5e72.exe
    "C:\Users\Admin\AppData\Local\Temp\c92ec1cea5a09af2f334a2e0d127f41827855c21c5e72.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Users\Admin\AppData\Local\Temp\cbb1d94791\Dctooux.exe
      "C:\Users\Admin\AppData\Local\Temp\cbb1d94791\Dctooux.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2028
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2452
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main
          4⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1016
          • C:\Windows\system32\netsh.exe
            netsh wlan show profiles
            5⤵
              PID:2832
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\610426812287_Desktop.zip' -CompressionLevel Optimal
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2680
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\clip64.dll, Main
          3⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          PID:2168

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\610426812287

      Filesize

      66KB

      MD5

      1f2cb8e093010f03efc7c14547174085

      SHA1

      2f243a4a91272d1ac85a91fd9e757c2099443df6

      SHA256

      0ecb1915e561c5fdc596378325c928cea299b1bb4d42e9399e5439beea8455d2

      SHA512

      7a631e05c44e2b7e5167c88d1fd9d101b90f0b5b9b466b580b420c60bcfa53dc6b259e97a9fb9f6e22ce7c13b2b559c50a4991d511187ac101e2dfd3e794eef4

    • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\clip64.dll

      Filesize

      109KB

      MD5

      647ac550e51ad6d7e47a6f1e94e11fd2

      SHA1

      433991b760cbfd265d45240891300c3652aefe6f

      SHA256

      4d743335ff8cdf1e505f4bd82b0efafde077b9bf0f88a615db99feada880e3ba

      SHA512

      5a2905133e53490dcfdad84b65525f2925d1e82a609ad0ff551d8d90a3c61a3a58b370056b84aa5c33db71f49fffb86e58284dc317a3541d6f5572438e428bfb

    • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll

      Filesize

      1.2MB

      MD5

      877cb2f10c78a046d81f678f88d7a6a1

      SHA1

      0ecc4a6282a412802756dc5bfd1e60cf789f2687

      SHA256

      2caf66964f582a9a1add1f13205f8797f2f4e791d980000ea6b55c719c174ed2

      SHA512

      9a8ea29fcfcf2a4e274095819ba27261bf551c976b697ccc6fe0598d13c309042e317ec8a32d2a9dec38ebd8223fc6c9e08daf5c611cdc72c11c8fe91baf3399

    • \Users\Admin\AppData\Local\Temp\cbb1d94791\Dctooux.exe

      Filesize

      436KB

      MD5

      f6ee2a295cd2ba584f9a363ade3d55b3

      SHA1

      c6966445c9adf9a0afe1a62b91d1e4f75c5ac55c

      SHA256

      c92ec1cea5a09af2f334a2e0d127f41827855c21c5e725afb702ec29e705d1f3

      SHA512

      7db8c37f43efc0414e394dfe3c335e8073dcc53f11093dd9452a750c34b2e16fc058f83fdddbb17b430ac501aabc6af6b03b23afa7826ccac1678f86546b025b

    • memory/2028-78-0x0000000000400000-0x0000000002C4F000-memory.dmp

      Filesize

      40.3MB

    • memory/2028-64-0x0000000002D50000-0x0000000002E50000-memory.dmp

      Filesize

      1024KB

    • memory/2028-63-0x0000000000400000-0x0000000002C4F000-memory.dmp

      Filesize

      40.3MB

    • memory/2028-33-0x0000000000400000-0x0000000002C4F000-memory.dmp

      Filesize

      40.3MB

    • memory/2028-21-0x0000000002D50000-0x0000000002E50000-memory.dmp

      Filesize

      1024KB

    • memory/2028-22-0x0000000000400000-0x0000000002C4F000-memory.dmp

      Filesize

      40.3MB

    • memory/2380-19-0x00000000030B0000-0x00000000031B0000-memory.dmp

      Filesize

      1024KB

    • memory/2380-20-0x0000000000220000-0x000000000028F000-memory.dmp

      Filesize

      444KB

    • memory/2380-1-0x00000000030B0000-0x00000000031B0000-memory.dmp

      Filesize

      1024KB

    • memory/2380-2-0x0000000000220000-0x000000000028F000-memory.dmp

      Filesize

      444KB

    • memory/2380-3-0x0000000000400000-0x0000000002C4F000-memory.dmp

      Filesize

      40.3MB

    • memory/2380-5-0x00000000045C0000-0x00000000045C1000-memory.dmp

      Filesize

      4KB

    • memory/2380-17-0x0000000000400000-0x0000000002C4F000-memory.dmp

      Filesize

      40.3MB

    • memory/2680-59-0x000007FEF54E0000-0x000007FEF5E7D000-memory.dmp

      Filesize

      9.6MB

    • memory/2680-60-0x0000000002570000-0x00000000025F0000-memory.dmp

      Filesize

      512KB

    • memory/2680-61-0x0000000002570000-0x00000000025F0000-memory.dmp

      Filesize

      512KB

    • memory/2680-62-0x000007FEF54E0000-0x000007FEF5E7D000-memory.dmp

      Filesize

      9.6MB

    • memory/2680-58-0x0000000002570000-0x00000000025F0000-memory.dmp

      Filesize

      512KB

    • memory/2680-57-0x000007FEF54E0000-0x000007FEF5E7D000-memory.dmp

      Filesize

      9.6MB

    • memory/2680-56-0x00000000022A0000-0x00000000022A8000-memory.dmp

      Filesize

      32KB

    • memory/2680-55-0x000000001B2E0000-0x000000001B5C2000-memory.dmp

      Filesize

      2.9MB