Malware Analysis Report

2024-09-11 13:42

Sample ID 240613-31s5aszfrl
Target d22271e91a3b4665dfba4ff809ae90b464bb4faf3e5d2ca4752ca0b50dead4b4
SHA256 d22271e91a3b4665dfba4ff809ae90b464bb4faf3e5d2ca4752ca0b50dead4b4
Tags
amadey 8fc809 trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

d22271e91a3b4665dfba4ff809ae90b464bb4faf3e5d2ca4752ca0b50dead4b4

Threat Level: Known bad

The file d22271e91a3b4665dfba4ff809ae90b464bb4faf3e5d2ca4752ca0b50dead4b4 was found to be: Known bad.

Malicious Activity Summary

amadey 8fc809 trojan

Amadey

Executes dropped EXE

Loads dropped DLL

Drops file in Windows directory

Program crash

Unsigned PE

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Suspicious use of FindShellTrayWindow

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-13 23:59

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 23:59

Reported

2024-06-14 00:04

Platform

win7-20240611-en

Max time kernel

292s

Max time network

255s

Command Line

"C:\Users\Admin\AppData\Local\Temp\d22271e91a3b4665dfba4ff809ae90b464bb4faf3e5d2ca4752ca0b50dead4b4.exe"

Signatures

Amadey

trojan amadey

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\Dctooux.job C:\Users\Admin\AppData\Local\Temp\d22271e91a3b4665dfba4ff809ae90b464bb4faf3e5d2ca4752ca0b50dead4b4.exe N/A

Enumerates physical storage devices

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\d22271e91a3b4665dfba4ff809ae90b464bb4faf3e5d2ca4752ca0b50dead4b4.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\d22271e91a3b4665dfba4ff809ae90b464bb4faf3e5d2ca4752ca0b50dead4b4.exe

"C:\Users\Admin\AppData\Local\Temp\d22271e91a3b4665dfba4ff809ae90b464bb4faf3e5d2ca4752ca0b50dead4b4.exe"

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

"C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 selltix.org udp
US 8.8.8.8:53 nudump.com udp
US 8.8.8.8:53 otyt.ru udp
RU 91.189.114.21:80 otyt.ru tcp
US 8.8.8.8:53 nudump.com udp
PY 181.123.219.23:80 selltix.org tcp
PY 181.123.219.23:80 selltix.org tcp
KR 218.152.239.123:80 selltix.org tcp
KR 218.152.239.123:80 selltix.org tcp
KR 210.182.29.70:80 selltix.org tcp
KR 210.182.29.70:80 selltix.org tcp
AR 200.122.37.247:80 selltix.org tcp
AR 200.122.37.247:80 selltix.org tcp
AR 200.122.37.247:80 selltix.org tcp
AR 200.122.37.247:80 selltix.org tcp
US 8.8.8.8:53 nudump.com udp
AR 200.122.37.247:80 selltix.org tcp
AR 200.122.37.247:80 selltix.org tcp
AR 200.122.37.247:80 selltix.org tcp
AR 200.122.37.247:80 selltix.org tcp
AR 200.122.37.247:80 selltix.org tcp
RU 91.189.114.21:80 otyt.ru tcp
RU 91.189.114.21:80 otyt.ru tcp
US 8.8.8.8:53 nudump.com udp
US 8.8.8.8:53 nudump.com udp
AR 200.122.37.247:80 selltix.org tcp
AR 200.122.37.247:80 selltix.org tcp
AR 200.122.37.247:80 selltix.org tcp
RU 91.189.114.21:80 otyt.ru tcp
US 8.8.8.8:53 nudump.com udp

Files

memory/2832-1-0x0000000000860000-0x0000000000960000-memory.dmp

memory/2832-2-0x0000000000280000-0x00000000002EF000-memory.dmp

memory/2832-3-0x0000000000400000-0x0000000000472000-memory.dmp

memory/2832-7-0x0000000000400000-0x00000000006A5000-memory.dmp

\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

MD5 80fdf5bd18018751ddd2bb6debff0e45
SHA1 008d7746e4b0e89733b7381931f82bea7c9f66f2
SHA256 d22271e91a3b4665dfba4ff809ae90b464bb4faf3e5d2ca4752ca0b50dead4b4
SHA512 017ca97c7c95e9571363c0e12b082ed08b5fa94137d17b4ef8d105b0cedf0c62e9596553ad602e5fde8882ae591710b09f20e5b7142c064dc6fabdfa2704f5a6

memory/2832-19-0x0000000000280000-0x00000000002EF000-memory.dmp

memory/2832-18-0x0000000000400000-0x0000000000472000-memory.dmp

memory/2832-20-0x0000000000400000-0x00000000006A5000-memory.dmp

memory/2660-22-0x0000000000400000-0x00000000006A5000-memory.dmp

memory/2660-28-0x0000000000400000-0x00000000006A5000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\340930862140

MD5 9401f81c92e793130f0cd056fb43360f
SHA1 0014690b3b2d02499e6d48e60edfb0a80cb8469f
SHA256 c8ea1f01930f2beeaacb7dabbbb38938b0c73d3282e0848f088445570c652d6a
SHA512 9bdc46cfaa9eb06845abd559262ae6e03cc596303e4e1f8a128741ec65880d9029c76792c4df33967acd775a2d3a805413dfad93671ea4a8a0dbf842e95d972f

memory/2660-42-0x0000000000400000-0x00000000006A5000-memory.dmp

C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll

MD5 d47b646093dd84d34885a714ce4bd74e
SHA1 c4df23671b6440e29159093dc52cb8c4aa184597
SHA256 6807c84bf35d67496e020c1528303b87d4759933c09817e514a7159ac689d352
SHA512 906fb89d5ec9dc4338f9d5e26fdc9ccc041225157a8f114465449106128d69e9fbc7723b2bcdd56a17c74c29983f7126a1d970b24e3902a3c4e817834f21f338

memory/2660-51-0x0000000000400000-0x00000000006A5000-memory.dmp

memory/2660-57-0x0000000000400000-0x00000000006A5000-memory.dmp

memory/2660-68-0x0000000000400000-0x00000000006A5000-memory.dmp

memory/2660-74-0x0000000000400000-0x00000000006A5000-memory.dmp

memory/2660-92-0x0000000000400000-0x00000000006A5000-memory.dmp

memory/2660-100-0x0000000000400000-0x00000000006A5000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 23:59

Reported

2024-06-14 00:04

Platform

win10-20240404-en

Max time kernel

291s

Max time network

298s

Command Line

"C:\Users\Admin\AppData\Local\Temp\d22271e91a3b4665dfba4ff809ae90b464bb4faf3e5d2ca4752ca0b50dead4b4.exe"

Signatures

Amadey

trojan amadey

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\Dctooux.job C:\Users\Admin\AppData\Local\Temp\d22271e91a3b4665dfba4ff809ae90b464bb4faf3e5d2ca4752ca0b50dead4b4.exe N/A

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\d22271e91a3b4665dfba4ff809ae90b464bb4faf3e5d2ca4752ca0b50dead4b4.exe

"C:\Users\Admin\AppData\Local\Temp\d22271e91a3b4665dfba4ff809ae90b464bb4faf3e5d2ca4752ca0b50dead4b4.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 700

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 740

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 808

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 820

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 864

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 560

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 1064

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 1100

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 1128

Network

Country Destination Domain Proto
US 8.8.8.8:53 66.43.201.23.in-addr.arpa udp
US 8.8.8.8:53 18.173.189.20.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp

Files

memory/4932-1-0x00000000006B0000-0x00000000007B0000-memory.dmp

memory/4932-2-0x00000000022B0000-0x000000000231F000-memory.dmp

memory/4932-3-0x0000000000400000-0x0000000000472000-memory.dmp

memory/4932-5-0x0000000000400000-0x00000000006A5000-memory.dmp

memory/4932-7-0x00000000006B0000-0x00000000007B0000-memory.dmp

memory/4932-8-0x00000000022B0000-0x000000000231F000-memory.dmp

memory/4932-9-0x0000000000400000-0x0000000000472000-memory.dmp