Malware Analysis Report

2024-09-11 13:42

Sample ID 240614-aadmpszgkr
Target d634c4fed339d34c41d2ac500ad4e6633245299e3a7c31d6dbf5ec075747e635
SHA256 d634c4fed339d34c41d2ac500ad4e6633245299e3a7c31d6dbf5ec075747e635
Tags
amadey 8fc809 trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

d634c4fed339d34c41d2ac500ad4e6633245299e3a7c31d6dbf5ec075747e635

Threat Level: Known bad

The file d634c4fed339d34c41d2ac500ad4e6633245299e3a7c31d6dbf5ec075747e635 was found to be: Known bad.

Malicious Activity Summary

amadey 8fc809 trojan

Amadey

Executes dropped EXE

Loads dropped DLL

Drops file in Windows directory

Enumerates physical storage devices

Program crash

Unsigned PE

Suspicious use of FindShellTrayWindow

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-14 00:00

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-14 00:00

Reported

2024-06-14 00:05

Platform

win7-20240220-en

Max time kernel

292s

Max time network

234s

Command Line

"C:\Users\Admin\AppData\Local\Temp\d634c4fed339d34c41d2ac500ad4e6633245299e3a7c31d6dbf5ec075747e635.exe"

Signatures

Amadey

trojan amadey

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\Dctooux.job C:\Users\Admin\AppData\Local\Temp\d634c4fed339d34c41d2ac500ad4e6633245299e3a7c31d6dbf5ec075747e635.exe N/A

Enumerates physical storage devices

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\d634c4fed339d34c41d2ac500ad4e6633245299e3a7c31d6dbf5ec075747e635.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\d634c4fed339d34c41d2ac500ad4e6633245299e3a7c31d6dbf5ec075747e635.exe

"C:\Users\Admin\AppData\Local\Temp\d634c4fed339d34c41d2ac500ad4e6633245299e3a7c31d6dbf5ec075747e635.exe"

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

"C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 nudump.com udp
US 8.8.8.8:53 selltix.org udp
US 8.8.8.8:53 otyt.ru udp
RU 91.189.114.21:80 otyt.ru tcp
CO 190.146.112.188:80 selltix.org tcp
CO 190.146.112.188:80 selltix.org tcp
US 8.8.8.8:53 nudump.com udp
CO 190.146.112.188:80 selltix.org tcp
CO 190.146.112.188:80 selltix.org tcp
US 8.8.8.8:53 nudump.com udp
CO 190.146.112.188:80 selltix.org tcp
CO 190.146.112.188:80 selltix.org tcp
RU 91.189.114.21:80 otyt.ru tcp
CO 190.146.112.188:80 selltix.org tcp
CO 190.146.112.188:80 selltix.org tcp
CO 190.146.112.188:80 selltix.org tcp
RU 91.189.114.21:80 otyt.ru tcp
RU 91.189.114.21:80 otyt.ru tcp
CO 190.146.112.188:80 selltix.org tcp
CO 190.146.112.188:80 selltix.org tcp
US 8.8.8.8:53 nudump.com udp
US 8.8.8.8:53 nudump.com udp
CO 190.146.112.188:80 selltix.org tcp
US 8.8.8.8:53 nudump.com udp

Files

memory/2908-1-0x0000000000570000-0x0000000000670000-memory.dmp

memory/2908-3-0x0000000000400000-0x0000000000472000-memory.dmp

memory/2908-2-0x0000000000320000-0x000000000038F000-memory.dmp

memory/2908-5-0x0000000000400000-0x0000000000480000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

MD5 25cf0ccfac3cc8ddd065b43ba1527684
SHA1 53505bb1c8eeb5b2ffd035e3a99ff8304e7534e2
SHA256 d634c4fed339d34c41d2ac500ad4e6633245299e3a7c31d6dbf5ec075747e635
SHA512 438fa6708ae94665b3822795da761560023e6a764a4a4c3a003ebd0e53e36e7202fa8fb9729dabd1403d1096c7b96f89272c3654c7889744c20b95bb058302dc

memory/2908-19-0x0000000000400000-0x0000000000480000-memory.dmp

memory/2908-18-0x0000000000400000-0x0000000000472000-memory.dmp

memory/2976-21-0x0000000000400000-0x0000000000480000-memory.dmp

memory/2976-22-0x0000000000400000-0x0000000000480000-memory.dmp

memory/2976-23-0x0000000000400000-0x0000000000480000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\721934792624

MD5 c1237f4d6418907a742a35a91549fdf6
SHA1 caccb02954b47f8e75bceb8ef4873d19afcaf218
SHA256 7c5f5c4bbbb0dae73ef6794e31bae9ef1410d47b03cec74b09076ba8f3d15ffe
SHA512 7c36f2cf2ff84445a44680e8d595e165132cc27835234ae0ab8d3a853c5c4a3ae4f353f0c55934711b278dca24e8c486a16f6eedfc2cecf3103df51c964476b8

memory/2976-33-0x0000000000400000-0x0000000000480000-memory.dmp

memory/2976-38-0x0000000000400000-0x0000000000480000-memory.dmp

memory/2976-42-0x0000000000400000-0x0000000000480000-memory.dmp

C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll

MD5 d47b646093dd84d34885a714ce4bd74e
SHA1 c4df23671b6440e29159093dc52cb8c4aa184597
SHA256 6807c84bf35d67496e020c1528303b87d4759933c09817e514a7159ac689d352
SHA512 906fb89d5ec9dc4338f9d5e26fdc9ccc041225157a8f114465449106128d69e9fbc7723b2bcdd56a17c74c29983f7126a1d970b24e3902a3c4e817834f21f338

memory/2976-53-0x0000000000400000-0x0000000000480000-memory.dmp

memory/2976-59-0x0000000000400000-0x0000000000480000-memory.dmp

memory/2976-70-0x0000000000400000-0x0000000000480000-memory.dmp

memory/2976-76-0x0000000000400000-0x0000000000480000-memory.dmp

memory/2976-96-0x0000000000400000-0x0000000000480000-memory.dmp

memory/2976-100-0x0000000000400000-0x0000000000480000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-14 00:00

Reported

2024-06-14 00:05

Platform

win10-20240404-en

Max time kernel

292s

Max time network

255s

Command Line

"C:\Users\Admin\AppData\Local\Temp\d634c4fed339d34c41d2ac500ad4e6633245299e3a7c31d6dbf5ec075747e635.exe"

Signatures

Amadey

trojan amadey

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\Dctooux.job C:\Users\Admin\AppData\Local\Temp\d634c4fed339d34c41d2ac500ad4e6633245299e3a7c31d6dbf5ec075747e635.exe N/A

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\d634c4fed339d34c41d2ac500ad4e6633245299e3a7c31d6dbf5ec075747e635.exe

"C:\Users\Admin\AppData\Local\Temp\d634c4fed339d34c41d2ac500ad4e6633245299e3a7c31d6dbf5ec075747e635.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 600 -s 688

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 600 -s 736

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 600 -s 816

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 600 -s 796

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 600 -s 880

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 600 -s 836

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 600 -s 1056

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 600 -s 1084

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 600 -s 1048

Network

Country Destination Domain Proto
US 8.8.8.8:53 64.43.201.23.in-addr.arpa udp
US 8.8.8.8:53 76.234.34.23.in-addr.arpa udp
US 20.231.121.79:80 tcp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 15.173.189.20.in-addr.arpa udp

Files

memory/600-1-0x00000000006B0000-0x00000000007B0000-memory.dmp

memory/600-2-0x00000000020D0000-0x000000000213F000-memory.dmp

memory/600-3-0x0000000000400000-0x0000000000472000-memory.dmp

memory/600-5-0x0000000000400000-0x0000000000480000-memory.dmp

memory/600-7-0x00000000006B0000-0x00000000007B0000-memory.dmp

memory/600-8-0x00000000020D0000-0x000000000213F000-memory.dmp

memory/600-9-0x0000000000400000-0x0000000000472000-memory.dmp