Malware Analysis Report

2024-09-11 13:42

Sample ID 240613-2f5f6ashpf
Target 0adc51a81e63e89f233be4c86a26b1efaef4735b8bfe49b9c860e2a1b75136c7
SHA256 0adc51a81e63e89f233be4c86a26b1efaef4735b8bfe49b9c860e2a1b75136c7
Tags
amadey 8fc809 trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

0adc51a81e63e89f233be4c86a26b1efaef4735b8bfe49b9c860e2a1b75136c7

Threat Level: Known bad

The file 0adc51a81e63e89f233be4c86a26b1efaef4735b8bfe49b9c860e2a1b75136c7 was found to be: Known bad.

Malicious Activity Summary

amadey 8fc809 trojan

Amadey

Executes dropped EXE

Loads dropped DLL

Drops file in Windows directory

Enumerates physical storage devices

Program crash

Unsigned PE

Suspicious use of FindShellTrayWindow

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-13 22:32

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 22:32

Reported

2024-06-13 22:37

Platform

win7-20240508-en

Max time kernel

297s

Max time network

301s

Command Line

"C:\Users\Admin\AppData\Local\Temp\0adc51a81e63e89f233be4c86a26b1efaef4735b8bfe49b9c860e2a1b75136c7.exe"

Signatures

Amadey

trojan amadey

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\Dctooux.job C:\Users\Admin\AppData\Local\Temp\0adc51a81e63e89f233be4c86a26b1efaef4735b8bfe49b9c860e2a1b75136c7.exe N/A

Enumerates physical storage devices

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\0adc51a81e63e89f233be4c86a26b1efaef4735b8bfe49b9c860e2a1b75136c7.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\0adc51a81e63e89f233be4c86a26b1efaef4735b8bfe49b9c860e2a1b75136c7.exe

"C:\Users\Admin\AppData\Local\Temp\0adc51a81e63e89f233be4c86a26b1efaef4735b8bfe49b9c860e2a1b75136c7.exe"

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

"C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 nudump.com udp
US 8.8.8.8:53 selltix.org udp
US 8.8.8.8:53 otyt.ru udp
US 8.8.8.8:53 selltix.org udp
US 8.8.8.8:53 otyt.ru udp
US 8.8.8.8:53 nudump.com udp
US 8.8.8.8:53 selltix.org udp
US 8.8.8.8:53 otyt.ru udp
US 8.8.8.8:53 selltix.org udp
US 8.8.8.8:53 nudump.com udp
US 8.8.8.8:53 selltix.org udp
US 8.8.8.8:53 selltix.org udp
US 8.8.8.8:53 otyt.ru udp
US 8.8.8.8:53 otyt.ru udp
US 8.8.8.8:53 otyt.ru udp
US 8.8.8.8:53 nudump.com udp
US 8.8.8.8:53 nudump.com udp
US 8.8.8.8:53 nudump.com udp
US 8.8.8.8:53 otyt.ru udp
US 8.8.8.8:53 nudump.com udp
US 8.8.8.8:53 otyt.ru udp
US 8.8.8.8:53 nudump.com udp
US 8.8.8.8:53 selltix.org udp
US 8.8.8.8:53 selltix.org udp
US 8.8.8.8:53 selltix.org udp
US 8.8.8.8:53 otyt.ru udp
US 8.8.8.8:53 selltix.org udp
US 8.8.8.8:53 nudump.com udp

Files

memory/1544-1-0x00000000018C0000-0x00000000019C0000-memory.dmp

memory/1544-2-0x0000000000310000-0x000000000037F000-memory.dmp

memory/1544-3-0x0000000000400000-0x0000000000472000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

MD5 f41b7ce28ef4c0d09665630c769cc53a
SHA1 bd5cdcce987289a5dc27262f6e1fc857336d48ed
SHA256 0adc51a81e63e89f233be4c86a26b1efaef4735b8bfe49b9c860e2a1b75136c7
SHA512 86d258dba578b78630d14b3f8dfe0c11f418866aef4723b99580bc50d161b98bd4fec06edb7e20f3f38467f14a64499878cf7deceb4131c705c17017b6318200

memory/1544-16-0x0000000000400000-0x0000000000472000-memory.dmp

memory/1544-20-0x0000000000400000-0x0000000001826000-memory.dmp

memory/1544-15-0x0000000000400000-0x0000000001826000-memory.dmp

memory/1544-18-0x00000000018C0000-0x00000000019C0000-memory.dmp

memory/2596-26-0x0000000000400000-0x0000000001826000-memory.dmp

memory/1544-28-0x0000000000400000-0x0000000001826000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\737914667933

MD5 46c827e2782703df6bfe4d0a264c5fde
SHA1 0861f8515a0f3efd10234c615b0dde638c7d5bde
SHA256 497f589bdf0a1d828a6c2eaf487831bcd18d86fbb509bce6bc241f98e619b7ca
SHA512 f5dbe4dae8a14042e9b42e1fa0685653b4a2ee27cea05e7107698b065db280fa8139e417736de826b0557596163bed5cd553ff3cb5a4ab36b3e0e051ee172ddb

memory/2596-33-0x0000000000400000-0x0000000001826000-memory.dmp

memory/2596-39-0x0000000000400000-0x0000000001826000-memory.dmp

memory/2596-43-0x0000000000400000-0x0000000001826000-memory.dmp

memory/2596-65-0x0000000000400000-0x0000000001826000-memory.dmp

memory/2596-72-0x0000000000400000-0x0000000001826000-memory.dmp

memory/2596-78-0x0000000000400000-0x0000000001826000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 22:32

Reported

2024-06-13 22:37

Platform

win10-20240404-en

Max time kernel

292s

Max time network

303s

Command Line

"C:\Users\Admin\AppData\Local\Temp\0adc51a81e63e89f233be4c86a26b1efaef4735b8bfe49b9c860e2a1b75136c7.exe"

Signatures

Amadey

trojan amadey

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\Dctooux.job C:\Users\Admin\AppData\Local\Temp\0adc51a81e63e89f233be4c86a26b1efaef4735b8bfe49b9c860e2a1b75136c7.exe N/A

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\0adc51a81e63e89f233be4c86a26b1efaef4735b8bfe49b9c860e2a1b75136c7.exe

"C:\Users\Admin\AppData\Local\Temp\0adc51a81e63e89f233be4c86a26b1efaef4735b8bfe49b9c860e2a1b75136c7.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 512 -s 688

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 512 -s 736

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 512 -s 808

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 512 -s 816

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 512 -s 852

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 512 -s 824

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 512 -s 1056

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 512 -s 1084

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 512 -s 1012

Network

Country Destination Domain Proto
US 8.8.8.8:53 50.251.17.2.in-addr.arpa udp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 13.179.89.13.in-addr.arpa udp
US 8.8.8.8:53 98.251.17.2.in-addr.arpa udp

Files

memory/512-2-0x0000000001A90000-0x0000000001AFF000-memory.dmp

memory/512-1-0x0000000001B80000-0x0000000001C80000-memory.dmp

memory/512-3-0x0000000000400000-0x0000000000472000-memory.dmp

memory/512-5-0x0000000000400000-0x0000000001826000-memory.dmp

memory/512-8-0x0000000001A90000-0x0000000001AFF000-memory.dmp

memory/512-7-0x0000000001B80000-0x0000000001C80000-memory.dmp

memory/512-9-0x0000000000400000-0x0000000000472000-memory.dmp