Malware Analysis Report

2024-09-11 13:42

Sample ID 240614-aey47s1amn
Target ea7f2dd7c8390bef3b0676e9ba9faf34e1a0905b8f9dac75e677def1b4b7113a
SHA256 ea7f2dd7c8390bef3b0676e9ba9faf34e1a0905b8f9dac75e677def1b4b7113a
Tags
amadey 8fc809 trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

ea7f2dd7c8390bef3b0676e9ba9faf34e1a0905b8f9dac75e677def1b4b7113a

Threat Level: Known bad

The file ea7f2dd7c8390bef3b0676e9ba9faf34e1a0905b8f9dac75e677def1b4b7113a was found to be: Known bad.

Malicious Activity Summary

amadey 8fc809 trojan

Amadey

Loads dropped DLL

Executes dropped EXE

Drops file in Windows directory

Enumerates physical storage devices

Unsigned PE

Program crash

Suspicious use of FindShellTrayWindow

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-14 00:08

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-14 00:08

Reported

2024-06-14 00:13

Platform

win7-20240508-en

Max time kernel

297s

Max time network

302s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ea7f2dd7c8390bef3b0676e9ba9faf34e1a0905b8f9dac75e677def1b4b7113a.exe"

Signatures

Amadey

trojan amadey

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\Dctooux.job C:\Users\Admin\AppData\Local\Temp\ea7f2dd7c8390bef3b0676e9ba9faf34e1a0905b8f9dac75e677def1b4b7113a.exe N/A

Enumerates physical storage devices

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\ea7f2dd7c8390bef3b0676e9ba9faf34e1a0905b8f9dac75e677def1b4b7113a.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\ea7f2dd7c8390bef3b0676e9ba9faf34e1a0905b8f9dac75e677def1b4b7113a.exe

"C:\Users\Admin\AppData\Local\Temp\ea7f2dd7c8390bef3b0676e9ba9faf34e1a0905b8f9dac75e677def1b4b7113a.exe"

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

"C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 selltix.org udp
US 8.8.8.8:53 nudump.com udp
US 8.8.8.8:53 otyt.ru udp
US 8.8.8.8:53 selltix.org udp
US 8.8.8.8:53 otyt.ru udp
US 8.8.8.8:53 nudump.com udp
US 8.8.8.8:53 selltix.org udp
US 8.8.8.8:53 otyt.ru udp
US 8.8.8.8:53 selltix.org udp
US 8.8.8.8:53 nudump.com udp
US 8.8.8.8:53 selltix.org udp
US 8.8.8.8:53 selltix.org udp
US 8.8.8.8:53 otyt.ru udp
US 8.8.8.8:53 otyt.ru udp
US 8.8.8.8:53 otyt.ru udp
US 8.8.8.8:53 nudump.com udp
US 8.8.8.8:53 nudump.com udp
US 8.8.8.8:53 nudump.com udp
US 8.8.8.8:53 otyt.ru udp
US 8.8.8.8:53 nudump.com udp
US 8.8.8.8:53 otyt.ru udp
US 8.8.8.8:53 nudump.com udp
US 8.8.8.8:53 selltix.org udp
US 8.8.8.8:53 selltix.org udp
US 8.8.8.8:53 selltix.org udp
US 8.8.8.8:53 otyt.ru udp
US 8.8.8.8:53 selltix.org udp
US 8.8.8.8:53 nudump.com udp

Files

memory/1796-1-0x0000000000660000-0x0000000000760000-memory.dmp

memory/1796-3-0x0000000000400000-0x0000000000472000-memory.dmp

memory/1796-2-0x0000000000220000-0x000000000028F000-memory.dmp

memory/1796-5-0x0000000000400000-0x0000000000482000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

MD5 4b8cad4e596920ace7137ed2515c8e0d
SHA1 a174a7254b0b3a104519ce73cfdd32cc49d23169
SHA256 ea7f2dd7c8390bef3b0676e9ba9faf34e1a0905b8f9dac75e677def1b4b7113a
SHA512 5911d532d777c2a80bf16d4719f0e5fcddd9eb53f4ec34cf6c1fde27c2da56e682c22be0b768ac73166edd712f189f7ee1ff7bdba2d53d997483c8b96eb520c4

memory/1796-20-0x0000000000400000-0x0000000000482000-memory.dmp

memory/1796-19-0x0000000000660000-0x0000000000760000-memory.dmp

memory/1796-18-0x0000000000400000-0x0000000000472000-memory.dmp

memory/2288-22-0x0000000000400000-0x0000000000482000-memory.dmp

memory/2288-23-0x0000000000400000-0x0000000000482000-memory.dmp

memory/2288-24-0x0000000000400000-0x0000000000482000-memory.dmp

memory/2288-30-0x0000000000400000-0x0000000000482000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\737914667933

MD5 4361c50780c796a3f36cbc1edc496ff0
SHA1 d52f40917606ae513c4ccfd291ca73a192dc514a
SHA256 9c20d099fbf8fb9b3ba3f5895eb9a38ae68136061def8a7572c641023d5f3c08
SHA512 02a2cde5cc89a0924bbc7d37120e0adcf1c6eee701cb090b82e53063f5218c591f3743deb0fac6b01bc8f77a6a24e44684ee66f3775b4c7f39e8d0bad7c70d4c

memory/2288-35-0x0000000000400000-0x0000000000482000-memory.dmp

memory/2288-43-0x0000000000400000-0x0000000000482000-memory.dmp

memory/2288-47-0x0000000000400000-0x0000000000482000-memory.dmp

memory/2288-69-0x0000000000400000-0x0000000000482000-memory.dmp

memory/2288-76-0x0000000000400000-0x0000000000482000-memory.dmp

memory/2288-82-0x0000000000400000-0x0000000000482000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-14 00:08

Reported

2024-06-14 00:13

Platform

win10-20240404-en

Max time kernel

293s

Max time network

298s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ea7f2dd7c8390bef3b0676e9ba9faf34e1a0905b8f9dac75e677def1b4b7113a.exe"

Signatures

Amadey

trojan amadey

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\Dctooux.job C:\Users\Admin\AppData\Local\Temp\ea7f2dd7c8390bef3b0676e9ba9faf34e1a0905b8f9dac75e677def1b4b7113a.exe N/A

Enumerates physical storage devices

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\ea7f2dd7c8390bef3b0676e9ba9faf34e1a0905b8f9dac75e677def1b4b7113a.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\ea7f2dd7c8390bef3b0676e9ba9faf34e1a0905b8f9dac75e677def1b4b7113a.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\ea7f2dd7c8390bef3b0676e9ba9faf34e1a0905b8f9dac75e677def1b4b7113a.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\ea7f2dd7c8390bef3b0676e9ba9faf34e1a0905b8f9dac75e677def1b4b7113a.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\ea7f2dd7c8390bef3b0676e9ba9faf34e1a0905b8f9dac75e677def1b4b7113a.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\ea7f2dd7c8390bef3b0676e9ba9faf34e1a0905b8f9dac75e677def1b4b7113a.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\ea7f2dd7c8390bef3b0676e9ba9faf34e1a0905b8f9dac75e677def1b4b7113a.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\ea7f2dd7c8390bef3b0676e9ba9faf34e1a0905b8f9dac75e677def1b4b7113a.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\ea7f2dd7c8390bef3b0676e9ba9faf34e1a0905b8f9dac75e677def1b4b7113a.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\ea7f2dd7c8390bef3b0676e9ba9faf34e1a0905b8f9dac75e677def1b4b7113a.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\ea7f2dd7c8390bef3b0676e9ba9faf34e1a0905b8f9dac75e677def1b4b7113a.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\ea7f2dd7c8390bef3b0676e9ba9faf34e1a0905b8f9dac75e677def1b4b7113a.exe

"C:\Users\Admin\AppData\Local\Temp\ea7f2dd7c8390bef3b0676e9ba9faf34e1a0905b8f9dac75e677def1b4b7113a.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3296 -s 684

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3296 -s 736

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3296 -s 808

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3296 -s 816

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3296 -s 844

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3296 -s 792

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3296 -s 1056

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3296 -s 1084

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3296 -s 1032

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

"C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3296 -s 1508

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3876 -s 632

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3876 -s 688

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3876 -s 712

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3876 -s 792

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3876 -s 800

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3876 -s 888

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 50.251.17.2.in-addr.arpa udp
US 8.8.8.8:53 88.65.42.20.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp

Files

memory/3296-1-0x0000000000530000-0x0000000000630000-memory.dmp

memory/3296-2-0x00000000020B0000-0x000000000211F000-memory.dmp

memory/3296-3-0x0000000000400000-0x0000000000472000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

MD5 4b8cad4e596920ace7137ed2515c8e0d
SHA1 a174a7254b0b3a104519ce73cfdd32cc49d23169
SHA256 ea7f2dd7c8390bef3b0676e9ba9faf34e1a0905b8f9dac75e677def1b4b7113a
SHA512 5911d532d777c2a80bf16d4719f0e5fcddd9eb53f4ec34cf6c1fde27c2da56e682c22be0b768ac73166edd712f189f7ee1ff7bdba2d53d997483c8b96eb520c4

memory/3296-15-0x0000000000400000-0x0000000000472000-memory.dmp

memory/3296-14-0x00000000020B0000-0x000000000211F000-memory.dmp

memory/3296-13-0x0000000000400000-0x0000000000482000-memory.dmp

memory/3876-16-0x0000000000400000-0x0000000000482000-memory.dmp

memory/3876-17-0x0000000000400000-0x0000000000482000-memory.dmp

memory/5004-23-0x0000000000400000-0x0000000000482000-memory.dmp

memory/5004-24-0x0000000000400000-0x0000000000482000-memory.dmp

memory/4852-33-0x0000000000400000-0x0000000000482000-memory.dmp

memory/2156-42-0x0000000000400000-0x0000000000482000-memory.dmp

memory/1420-51-0x0000000000400000-0x0000000000482000-memory.dmp

memory/1424-60-0x0000000000400000-0x0000000000482000-memory.dmp