Malware Analysis Report

2024-09-11 13:42

Sample ID 240614-abgqrazgqr
Target e21ecf0b2055978ab8ef506f941581813c6e30e13222e2984ba45d2a59533e51
SHA256 e21ecf0b2055978ab8ef506f941581813c6e30e13222e2984ba45d2a59533e51
Tags
amadey 8fc809 trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

e21ecf0b2055978ab8ef506f941581813c6e30e13222e2984ba45d2a59533e51

Threat Level: Known bad

The file e21ecf0b2055978ab8ef506f941581813c6e30e13222e2984ba45d2a59533e51 was found to be: Known bad.

Malicious Activity Summary

amadey 8fc809 trojan

Amadey

Executes dropped EXE

Loads dropped DLL

Drops file in Windows directory

Unsigned PE

Enumerates physical storage devices

Program crash

Suspicious use of FindShellTrayWindow

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-14 00:02

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-14 00:02

Reported

2024-06-14 00:07

Platform

win7-20240508-en

Max time kernel

122s

Max time network

129s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e21ecf0b2055978ab8ef506f941581813c6e30e13222e2984ba45d2a59533e51.exe"

Signatures

Amadey

trojan amadey

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\Dctooux.job C:\Users\Admin\AppData\Local\Temp\e21ecf0b2055978ab8ef506f941581813c6e30e13222e2984ba45d2a59533e51.exe N/A

Enumerates physical storage devices

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\e21ecf0b2055978ab8ef506f941581813c6e30e13222e2984ba45d2a59533e51.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e21ecf0b2055978ab8ef506f941581813c6e30e13222e2984ba45d2a59533e51.exe

"C:\Users\Admin\AppData\Local\Temp\e21ecf0b2055978ab8ef506f941581813c6e30e13222e2984ba45d2a59533e51.exe"

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

"C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"

Network

N/A

Files

memory/2204-1-0x00000000019A0000-0x0000000001AA0000-memory.dmp

memory/2204-2-0x0000000000220000-0x000000000028F000-memory.dmp

memory/2204-3-0x0000000000400000-0x0000000000472000-memory.dmp

\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

MD5 61bf7a6d26b4f5bba20359de716c562b
SHA1 d3da99272f07b5b92d4a8d592b153da80f9b46cf
SHA256 e21ecf0b2055978ab8ef506f941581813c6e30e13222e2984ba45d2a59533e51
SHA512 ebaeb89288604757fe3134b723af7a9789f256fad97855f8f951d39dfdfc89dc4dd943d99a2dc95d800dc231d2e97bf4743b1a01e4d0eb96bec2d0a77a185e24

memory/2204-20-0x0000000000220000-0x000000000028F000-memory.dmp

memory/2204-19-0x00000000019A0000-0x0000000001AA0000-memory.dmp

memory/2204-18-0x0000000000400000-0x0000000001826000-memory.dmp

memory/2204-21-0x0000000000400000-0x0000000000472000-memory.dmp

memory/2204-17-0x0000000000400000-0x0000000001826000-memory.dmp

memory/2892-22-0x0000000000400000-0x0000000001826000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-14 00:02

Reported

2024-06-14 00:07

Platform

win10-20240404-en

Max time kernel

291s

Max time network

256s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e21ecf0b2055978ab8ef506f941581813c6e30e13222e2984ba45d2a59533e51.exe"

Signatures

Amadey

trojan amadey

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\Dctooux.job C:\Users\Admin\AppData\Local\Temp\e21ecf0b2055978ab8ef506f941581813c6e30e13222e2984ba45d2a59533e51.exe N/A

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\e21ecf0b2055978ab8ef506f941581813c6e30e13222e2984ba45d2a59533e51.exe

"C:\Users\Admin\AppData\Local\Temp\e21ecf0b2055978ab8ef506f941581813c6e30e13222e2984ba45d2a59533e51.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 688

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 740

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 812

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 832

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 896

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 788

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 1060

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 1096

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 1036

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 0.0.0.0.0.0.0.0.d.1.a.1.a.6.8.f.0.0.0.0.0.0.0.0.8.0.8.0.8.0.8.0.ip6.arpa udp
US 8.8.8.8:53 64.43.201.23.in-addr.arpa udp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 13.173.189.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp

Files

memory/2752-1-0x0000000001A40000-0x0000000001B40000-memory.dmp

memory/2752-2-0x0000000003420000-0x000000000348F000-memory.dmp

memory/2752-3-0x0000000000400000-0x0000000000472000-memory.dmp

memory/2752-5-0x0000000000400000-0x0000000001826000-memory.dmp

memory/2752-6-0x0000000001A40000-0x0000000001B40000-memory.dmp

memory/2752-8-0x0000000003420000-0x000000000348F000-memory.dmp

memory/2752-9-0x0000000000400000-0x0000000000472000-memory.dmp