Malware Analysis Report

2024-09-11 13:42

Sample ID 240613-2ndneatcqd
Target 32a6cc0f53a2a184384f62b73b6b27ec42521e7d705a2d6151108f22fc797a48
SHA256 32a6cc0f53a2a184384f62b73b6b27ec42521e7d705a2d6151108f22fc797a48
Tags
amadey 8fc809 trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

32a6cc0f53a2a184384f62b73b6b27ec42521e7d705a2d6151108f22fc797a48

Threat Level: Known bad

The file 32a6cc0f53a2a184384f62b73b6b27ec42521e7d705a2d6151108f22fc797a48 was found to be: Known bad.

Malicious Activity Summary

amadey 8fc809 trojan

Amadey

Executes dropped EXE

Loads dropped DLL

Drops file in Windows directory

Unsigned PE

Program crash

Enumerates physical storage devices

Suspicious use of FindShellTrayWindow

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-13 22:43

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 22:43

Reported

2024-06-13 22:48

Platform

win7-20240611-en

Max time kernel

299s

Max time network

304s

Command Line

"C:\Users\Admin\AppData\Local\Temp\32a6cc0f53a2a184384f62b73b6b27ec42521e7d705a2d6151108f22fc797a48.exe"

Signatures

Amadey

trojan amadey

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\Dctooux.job C:\Users\Admin\AppData\Local\Temp\32a6cc0f53a2a184384f62b73b6b27ec42521e7d705a2d6151108f22fc797a48.exe N/A

Enumerates physical storage devices

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\32a6cc0f53a2a184384f62b73b6b27ec42521e7d705a2d6151108f22fc797a48.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\32a6cc0f53a2a184384f62b73b6b27ec42521e7d705a2d6151108f22fc797a48.exe

"C:\Users\Admin\AppData\Local\Temp\32a6cc0f53a2a184384f62b73b6b27ec42521e7d705a2d6151108f22fc797a48.exe"

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

"C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 otyt.ru udp
US 8.8.8.8:53 nudump.com udp
US 8.8.8.8:53 selltix.org udp
RU 91.189.114.21:80 otyt.ru tcp
US 8.8.8.8:53 selltix.org udp
US 8.8.8.8:53 nudump.com udp
RU 91.189.114.21:80 otyt.ru tcp
US 8.8.8.8:53 selltix.org udp
RU 91.189.114.21:80 otyt.ru tcp
US 8.8.8.8:53 selltix.org udp
KR 220.125.3.190:80 selltix.org tcp
KR 220.125.3.190:80 selltix.org tcp
KR 220.125.3.190:80 selltix.org tcp
US 8.8.8.8:53 nudump.com udp
KR 220.125.3.190:80 selltix.org tcp
KR 220.125.3.190:80 selltix.org tcp
KR 220.125.3.190:80 selltix.org tcp
RU 91.189.114.21:80 otyt.ru tcp
US 8.8.8.8:53 nudump.com udp
US 8.8.8.8:53 nudump.com udp
RU 91.189.114.21:80 otyt.ru tcp
KR 220.125.3.190:80 selltix.org tcp
RU 91.189.114.21:80 otyt.ru tcp
KR 220.125.3.190:80 selltix.org tcp
BA 92.36.226.66:80 selltix.org tcp
RU 91.189.114.21:80 otyt.ru tcp
BA 92.36.226.66:80 selltix.org tcp
RU 91.189.114.21:80 otyt.ru tcp
MX 201.119.127.82:80 selltix.org tcp
RU 91.189.114.21:80 otyt.ru tcp
US 8.8.8.8:53 nudump.com udp

Files

memory/2876-1-0x0000000001C90000-0x0000000001D90000-memory.dmp

memory/2876-2-0x0000000000290000-0x00000000002FF000-memory.dmp

memory/2876-3-0x0000000000400000-0x0000000000472000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

MD5 ed1925b85177fab5e7246bf1d5c1a9d2
SHA1 8ea18800a3358d659db9595471c1818601fdaf87
SHA256 32a6cc0f53a2a184384f62b73b6b27ec42521e7d705a2d6151108f22fc797a48
SHA512 b279a799e16460e120c0e8e01e8cd0320566538abed49c5f23e117fd8055272cc837e2801c2a5b50f388a42f6cb194d157bb2ac307c4568b70383b0c39291e87

memory/2876-20-0x0000000000400000-0x0000000001829000-memory.dmp

memory/2876-16-0x0000000000400000-0x0000000001829000-memory.dmp

memory/2876-19-0x0000000000400000-0x0000000000472000-memory.dmp

memory/2876-18-0x0000000001C90000-0x0000000001D90000-memory.dmp

memory/2876-17-0x0000000000290000-0x00000000002FF000-memory.dmp

memory/2400-27-0x0000000000400000-0x0000000001829000-memory.dmp

memory/2876-29-0x0000000000400000-0x0000000001829000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\969036373035

MD5 4374a5f0186b3cee4108f303cb804b06
SHA1 a2c1e095b9f61b9c1079b68a5512adf01a935b57
SHA256 ae0cf7d98a6a5cf5baea2d2d3e7e5138ead83c9ac2e4edc3da88cce5336ed05b
SHA512 ac56e233c511c9c816fa0c492b77719fb73e1bc1910fc36712371a033847388c08eb98f01bc86ab56b064ba942637fc2e03b2be4bc723edb5159802e6b28e1dd

memory/2400-34-0x0000000000400000-0x0000000001829000-memory.dmp

memory/2400-45-0x0000000000400000-0x0000000001829000-memory.dmp

C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll

MD5 d47b646093dd84d34885a714ce4bd74e
SHA1 c4df23671b6440e29159093dc52cb8c4aa184597
SHA256 6807c84bf35d67496e020c1528303b87d4759933c09817e514a7159ac689d352
SHA512 906fb89d5ec9dc4338f9d5e26fdc9ccc041225157a8f114465449106128d69e9fbc7723b2bcdd56a17c74c29983f7126a1d970b24e3902a3c4e817834f21f338

memory/2400-53-0x0000000000400000-0x0000000001829000-memory.dmp

memory/2400-59-0x0000000000400000-0x0000000001829000-memory.dmp

memory/2400-71-0x0000000000400000-0x0000000001829000-memory.dmp

memory/2400-77-0x0000000000400000-0x0000000001829000-memory.dmp

memory/2400-91-0x0000000000400000-0x0000000001829000-memory.dmp

memory/2400-97-0x0000000000400000-0x0000000001829000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 22:43

Reported

2024-06-13 22:48

Platform

win10-20240404-en

Max time kernel

291s

Max time network

272s

Command Line

"C:\Users\Admin\AppData\Local\Temp\32a6cc0f53a2a184384f62b73b6b27ec42521e7d705a2d6151108f22fc797a48.exe"

Signatures

Amadey

trojan amadey

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\Dctooux.job C:\Users\Admin\AppData\Local\Temp\32a6cc0f53a2a184384f62b73b6b27ec42521e7d705a2d6151108f22fc797a48.exe N/A

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\32a6cc0f53a2a184384f62b73b6b27ec42521e7d705a2d6151108f22fc797a48.exe

"C:\Users\Admin\AppData\Local\Temp\32a6cc0f53a2a184384f62b73b6b27ec42521e7d705a2d6151108f22fc797a48.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 688

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 740

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 812

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 832

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 848

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 724

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 1064

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 1092

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 1056

Network

Country Destination Domain Proto
US 8.8.8.8:53 50.251.17.2.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 52.111.227.14:443 tcp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 66.112.168.52.in-addr.arpa udp
US 8.8.8.8:53 88.251.17.2.in-addr.arpa udp
US 8.8.8.8:53 25.24.18.2.in-addr.arpa udp

Files

memory/2676-1-0x0000000001B60000-0x0000000001C60000-memory.dmp

memory/2676-3-0x0000000000400000-0x0000000000472000-memory.dmp

memory/2676-2-0x0000000001AB0000-0x0000000001B1F000-memory.dmp

memory/2676-5-0x0000000000400000-0x0000000001829000-memory.dmp

memory/2676-6-0x0000000001B60000-0x0000000001C60000-memory.dmp

memory/2676-8-0x0000000000400000-0x0000000000472000-memory.dmp