Malware Analysis Report

2024-09-11 13:42

Sample ID 240613-3cw62svene
Target 71e1afb6f88aa428c22e0c6259afb2c7ba432d030ed1b08085093397c931feec
SHA256 71e1afb6f88aa428c22e0c6259afb2c7ba432d030ed1b08085093397c931feec
Tags
amadey 8fc809 trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

71e1afb6f88aa428c22e0c6259afb2c7ba432d030ed1b08085093397c931feec

Threat Level: Known bad

The file 71e1afb6f88aa428c22e0c6259afb2c7ba432d030ed1b08085093397c931feec was found to be: Known bad.

Malicious Activity Summary

amadey 8fc809 trojan

Amadey

Executes dropped EXE

Loads dropped DLL

Drops file in Windows directory

Program crash

Enumerates physical storage devices

Unsigned PE

Suspicious use of WriteProcessMemory

Suspicious use of FindShellTrayWindow

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-13 23:22

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 23:22

Reported

2024-06-13 23:27

Platform

win7-20240221-en

Max time kernel

292s

Max time network

241s

Command Line

"C:\Users\Admin\AppData\Local\Temp\71e1afb6f88aa428c22e0c6259afb2c7ba432d030ed1b08085093397c931feec.exe"

Signatures

Amadey

trojan amadey

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\Dctooux.job C:\Users\Admin\AppData\Local\Temp\71e1afb6f88aa428c22e0c6259afb2c7ba432d030ed1b08085093397c931feec.exe N/A

Enumerates physical storage devices

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\71e1afb6f88aa428c22e0c6259afb2c7ba432d030ed1b08085093397c931feec.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\71e1afb6f88aa428c22e0c6259afb2c7ba432d030ed1b08085093397c931feec.exe

"C:\Users\Admin\AppData\Local\Temp\71e1afb6f88aa428c22e0c6259afb2c7ba432d030ed1b08085093397c931feec.exe"

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

"C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 selltix.org udp
US 8.8.8.8:53 nudump.com udp
US 8.8.8.8:53 otyt.ru udp
RU 91.189.114.21:80 otyt.ru tcp
US 8.8.8.8:53 nudump.com udp
CO 190.146.112.188:80 selltix.org tcp
CO 190.146.112.188:80 selltix.org tcp
CO 190.146.112.188:80 selltix.org tcp
CO 190.146.112.188:80 selltix.org tcp
US 8.8.8.8:53 nudump.com udp
CO 190.146.112.188:80 selltix.org tcp
CO 190.146.112.188:80 selltix.org tcp
RU 91.189.114.21:80 otyt.ru tcp
CO 190.146.112.188:80 selltix.org tcp
CO 190.146.112.188:80 selltix.org tcp
CO 190.146.112.188:80 selltix.org tcp
RU 91.189.114.21:80 otyt.ru tcp
RU 91.189.114.21:80 otyt.ru tcp
US 8.8.8.8:53 nudump.com udp
CO 190.146.112.188:80 selltix.org tcp
US 8.8.8.8:53 nudump.com udp
CO 190.146.112.188:80 selltix.org tcp
CO 190.146.112.188:80 selltix.org tcp
US 8.8.8.8:53 nudump.com udp

Files

memory/2156-1-0x0000000001D00000-0x0000000001E00000-memory.dmp

memory/2156-2-0x0000000000220000-0x000000000028F000-memory.dmp

memory/2156-3-0x0000000000400000-0x0000000000472000-memory.dmp

memory/2156-15-0x0000000000400000-0x0000000001BFC000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

MD5 161a20556aff7aed5e8c157fc2340285
SHA1 4dbba29a089eaadf2fe6abafe0923b09fa49ee5a
SHA256 71e1afb6f88aa428c22e0c6259afb2c7ba432d030ed1b08085093397c931feec
SHA512 8670ce979d282e06de16d208d99b5b68ff8a3bd85313a1a6d1cf61084e10df464d52f9377a178ea3b68e956832ca331dd321aecf7055daaf0763c7fd755ba2c1

memory/2156-17-0x0000000000400000-0x0000000001BFC000-memory.dmp

memory/2156-16-0x0000000000400000-0x0000000000472000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\298544033322

MD5 700401d90c5cc433d63559347b47ae44
SHA1 5e4f9a8cd841c50bd6b239792b0e06c3b1957369
SHA256 85ad34fa3acd85d4fd3f7c536b453d824c0a076b83c3579ec75ae4bbe762c446
SHA512 752e134925a54a5e9cf3a59862f60f5bc935e005ec0f457300b8a307c8a63e6cdeb3c17ba90030ce1e62a055f31a1eb79fdd8f3edafc6b8ce57b6052cc5e0dba

memory/2280-29-0x0000000000400000-0x0000000001BFC000-memory.dmp

memory/2280-37-0x0000000000400000-0x0000000001BFC000-memory.dmp

memory/2156-38-0x0000000000400000-0x0000000001BFC000-memory.dmp

C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll

MD5 d47b646093dd84d34885a714ce4bd74e
SHA1 c4df23671b6440e29159093dc52cb8c4aa184597
SHA256 6807c84bf35d67496e020c1528303b87d4759933c09817e514a7159ac689d352
SHA512 906fb89d5ec9dc4338f9d5e26fdc9ccc041225157a8f114465449106128d69e9fbc7723b2bcdd56a17c74c29983f7126a1d970b24e3902a3c4e817834f21f338

memory/2280-48-0x0000000000400000-0x0000000001BFC000-memory.dmp

memory/2280-54-0x0000000000400000-0x0000000001BFC000-memory.dmp

memory/2280-64-0x0000000000400000-0x0000000001BFC000-memory.dmp

memory/2280-70-0x0000000000400000-0x0000000001BFC000-memory.dmp

memory/2280-88-0x0000000000400000-0x0000000001BFC000-memory.dmp

memory/2280-96-0x0000000000400000-0x0000000001BFC000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 23:22

Reported

2024-06-13 23:27

Platform

win10-20240404-en

Max time kernel

290s

Max time network

298s

Command Line

"C:\Users\Admin\AppData\Local\Temp\71e1afb6f88aa428c22e0c6259afb2c7ba432d030ed1b08085093397c931feec.exe"

Signatures

Amadey

trojan amadey

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\Dctooux.job C:\Users\Admin\AppData\Local\Temp\71e1afb6f88aa428c22e0c6259afb2c7ba432d030ed1b08085093397c931feec.exe N/A

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\71e1afb6f88aa428c22e0c6259afb2c7ba432d030ed1b08085093397c931feec.exe

"C:\Users\Admin\AppData\Local\Temp\71e1afb6f88aa428c22e0c6259afb2c7ba432d030ed1b08085093397c931feec.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3484 -s 692

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3484 -s 740

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3484 -s 812

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3484 -s 852

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3484 -s 876

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3484 -s 856

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3484 -s 1060

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3484 -s 1096

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3484 -s 1080

Network

Country Destination Domain Proto
US 8.8.8.8:53 25.251.17.2.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 10.73.50.20.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp

Files

memory/3484-1-0x0000000001D70000-0x0000000001E70000-memory.dmp

memory/3484-2-0x0000000003810000-0x000000000387F000-memory.dmp

memory/3484-3-0x0000000000400000-0x0000000000472000-memory.dmp

memory/3484-5-0x0000000000400000-0x0000000001BFC000-memory.dmp

memory/3484-7-0x0000000001D70000-0x0000000001E70000-memory.dmp

memory/3484-8-0x0000000003810000-0x000000000387F000-memory.dmp

memory/3484-9-0x0000000000400000-0x0000000000472000-memory.dmp