Malware Analysis Report

2024-09-11 10:25

Sample ID 240613-3rce7azckp
Target a0fa87838fde50a60bd21b18c97ca403226887e454b853661d4736909767d679
SHA256 a0fa87838fde50a60bd21b18c97ca403226887e454b853661d4736909767d679
Tags
amadey b2c2c1 trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

a0fa87838fde50a60bd21b18c97ca403226887e454b853661d4736909767d679

Threat Level: Known bad

The file a0fa87838fde50a60bd21b18c97ca403226887e454b853661d4736909767d679 was found to be: Known bad.

Malicious Activity Summary

amadey b2c2c1 trojan

Amadey

Executes dropped EXE

Loads dropped DLL

Drops file in Windows directory

Program crash

Unsigned PE

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Suspicious use of FindShellTrayWindow

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-13 23:44

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 23:44

Reported

2024-06-13 23:49

Platform

win7-20240508-en

Max time kernel

297s

Max time network

297s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a0fa87838fde50a60bd21b18c97ca403226887e454b853661d4736909767d679.exe"

Signatures

Amadey

trojan amadey

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\Dctooux.job C:\Users\Admin\AppData\Local\Temp\a0fa87838fde50a60bd21b18c97ca403226887e454b853661d4736909767d679.exe N/A

Enumerates physical storage devices

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\a0fa87838fde50a60bd21b18c97ca403226887e454b853661d4736909767d679.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a0fa87838fde50a60bd21b18c97ca403226887e454b853661d4736909767d679.exe

"C:\Users\Admin\AppData\Local\Temp\a0fa87838fde50a60bd21b18c97ca403226887e454b853661d4736909767d679.exe"

C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe

"C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 osdhs.in.ne udp
US 8.8.8.8:53 jkshb.su udp
US 8.8.8.8:53 greendag.ru udp
US 8.8.8.8:53 jkshb.su udp
US 8.8.8.8:53 greendag.ru udp
US 8.8.8.8:53 osdhs.in.ne udp
US 8.8.8.8:53 greendag.ru udp
US 8.8.8.8:53 jkshb.su udp
US 8.8.8.8:53 osdhs.in.ne udp
US 8.8.8.8:53 osdhs.in.ne udp
US 8.8.8.8:53 greendag.ru udp
US 8.8.8.8:53 osdhs.in.ne udp
US 8.8.8.8:53 jkshb.su udp
US 8.8.8.8:53 greendag.ru udp
US 8.8.8.8:53 jkshb.su udp
US 8.8.8.8:53 jkshb.su udp
US 8.8.8.8:53 greendag.ru udp
US 8.8.8.8:53 osdhs.in.ne udp

Files

memory/2968-1-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2968-2-0x0000000002F50000-0x0000000002FBB000-memory.dmp

memory/2968-3-0x0000000000400000-0x0000000000470000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe

MD5 429ec04ec327386f12a14c292feca39e
SHA1 ece9fe5a41a7c02e075a11388feb68019eb43dc9
SHA256 a0fa87838fde50a60bd21b18c97ca403226887e454b853661d4736909767d679
SHA512 e97abb23b979485a53e502ee539624ee06a6c66149e4c7d59abdd2cda5b7bd7d1187c4aa7a9da0b0d7befdd9ecbc6aa01d7bf25821972d68471c11111bfb8638

memory/2968-18-0x0000000000400000-0x0000000000470000-memory.dmp

memory/2968-17-0x0000000002F50000-0x0000000002FBB000-memory.dmp

memory/2968-16-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2968-21-0x0000000000400000-0x0000000001828000-memory.dmp

memory/2968-15-0x0000000000400000-0x0000000001828000-memory.dmp

memory/1956-27-0x0000000000400000-0x0000000001828000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\680803933149

MD5 af3cb72b2b273e8aee453a85a151a340
SHA1 9478f53f32da9c1c0588582b2004bb700fac7129
SHA256 ba6670fe067908806dda7658b31967ad4da173cf80fed29a14d8419178b8faed
SHA512 0d1f923d34659d9c171555e469f2bc0b9ccab9985f2b0bdcf220dd287a2fb850a6d6517178c3de5a312fe122da897adfe41905a010a01d65401ac7428a35ecfe

memory/1956-32-0x0000000000400000-0x0000000001828000-memory.dmp

memory/2968-33-0x0000000000400000-0x0000000001828000-memory.dmp

memory/1956-40-0x0000000000400000-0x0000000001828000-memory.dmp

memory/1956-44-0x0000000000400000-0x0000000001828000-memory.dmp

memory/1956-66-0x0000000000400000-0x0000000001828000-memory.dmp

memory/1956-73-0x0000000000400000-0x0000000001828000-memory.dmp

memory/1956-79-0x0000000000400000-0x0000000001828000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 23:44

Reported

2024-06-13 23:49

Platform

win10-20240404-en

Max time kernel

292s

Max time network

302s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a0fa87838fde50a60bd21b18c97ca403226887e454b853661d4736909767d679.exe"

Signatures

Amadey

trojan amadey

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\Dctooux.job C:\Users\Admin\AppData\Local\Temp\a0fa87838fde50a60bd21b18c97ca403226887e454b853661d4736909767d679.exe N/A

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\a0fa87838fde50a60bd21b18c97ca403226887e454b853661d4736909767d679.exe

"C:\Users\Admin\AppData\Local\Temp\a0fa87838fde50a60bd21b18c97ca403226887e454b853661d4736909767d679.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 684

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 736

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 804

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 816

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 856

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 836

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 1060

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 1088

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 1008

Network

Country Destination Domain Proto
US 8.8.8.8:53 50.251.17.2.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 88.16.208.104.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
NL 52.142.223.178:80 tcp
US 8.8.8.8:53 76.234.34.23.in-addr.arpa udp

Files

memory/5044-3-0x0000000000400000-0x0000000000470000-memory.dmp

memory/5044-2-0x0000000003500000-0x000000000356B000-memory.dmp

memory/5044-1-0x0000000001A00000-0x0000000001B00000-memory.dmp

memory/5044-5-0x0000000000400000-0x0000000001828000-memory.dmp

memory/5044-6-0x0000000003500000-0x000000000356B000-memory.dmp

memory/5044-8-0x0000000001A00000-0x0000000001B00000-memory.dmp

memory/5044-9-0x0000000000400000-0x0000000000470000-memory.dmp