Malware Analysis Report

2024-09-11 10:33

Sample ID 240620-3pkzjsserh
Target eb74efaf4832a80809815051fc97704819fbc4b1d57f07faf39746a02ed1dd10
SHA256 eb74efaf4832a80809815051fc97704819fbc4b1d57f07faf39746a02ed1dd10
Tags
amadey b2c2c1 trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

eb74efaf4832a80809815051fc97704819fbc4b1d57f07faf39746a02ed1dd10

Threat Level: Known bad

The file eb74efaf4832a80809815051fc97704819fbc4b1d57f07faf39746a02ed1dd10 was found to be: Known bad.

Malicious Activity Summary

amadey b2c2c1 trojan

Amadey

Loads dropped DLL

Executes dropped EXE

Drops file in Windows directory

Unsigned PE

Program crash

Enumerates physical storage devices

Suspicious use of FindShellTrayWindow

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-20 23:41

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-20 23:41

Reported

2024-06-20 23:46

Platform

win7-20240419-en

Max time kernel

291s

Max time network

231s

Command Line

"C:\Users\Admin\AppData\Local\Temp\eb74efaf4832a80809815051fc97704819fbc4b1d57f07faf39746a02ed1dd10.exe"

Signatures

Amadey

trojan amadey

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\Dctooux.job C:\Users\Admin\AppData\Local\Temp\eb74efaf4832a80809815051fc97704819fbc4b1d57f07faf39746a02ed1dd10.exe N/A

Enumerates physical storage devices

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb74efaf4832a80809815051fc97704819fbc4b1d57f07faf39746a02ed1dd10.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\eb74efaf4832a80809815051fc97704819fbc4b1d57f07faf39746a02ed1dd10.exe

"C:\Users\Admin\AppData\Local\Temp\eb74efaf4832a80809815051fc97704819fbc4b1d57f07faf39746a02ed1dd10.exe"

C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe

"C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 jkshb.su udp
US 8.8.8.8:53 greendag.ru udp
US 8.8.8.8:53 osdhs.in.ne udp
CO 181.52.122.51:80 jkshb.su tcp
CO 181.52.122.51:80 jkshb.su tcp
CO 181.52.122.51:80 jkshb.su tcp
US 8.8.8.8:53 greendag.ru udp
US 8.8.8.8:53 greendag.ru udp
CO 181.52.122.51:80 jkshb.su tcp
CO 181.52.122.51:80 jkshb.su tcp
CO 181.52.122.51:80 jkshb.su tcp
US 8.8.8.8:53 greendag.ru udp
US 8.8.8.8:53 greendag.ru udp
US 8.8.8.8:53 greendag.ru udp

Files

memory/1700-1-0x00000000008D0000-0x00000000009D0000-memory.dmp

memory/1700-3-0x0000000000400000-0x0000000000470000-memory.dmp

memory/1700-2-0x0000000000260000-0x00000000002CB000-memory.dmp

memory/1700-5-0x0000000000400000-0x0000000000481000-memory.dmp

\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe

MD5 f8ec725e4b969f157fd70166e73a56a3
SHA1 8bc092817245f2727154454e0011a8d6704e2eb7
SHA256 eb74efaf4832a80809815051fc97704819fbc4b1d57f07faf39746a02ed1dd10
SHA512 7dc3acb485263fd616ea84999a897f0e298f21485a34457697c523a095083d7de599b3cfc4bc3d45a5d36bc374a3a5e8778646dfa97c447d4be710021678e040

memory/1700-20-0x0000000000400000-0x0000000000481000-memory.dmp

memory/1700-19-0x00000000008D0000-0x00000000009D0000-memory.dmp

memory/1700-18-0x0000000000400000-0x0000000000470000-memory.dmp

memory/2156-22-0x0000000000400000-0x0000000000481000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\816782303773

MD5 920f7dc10767580c12c419567fc9ded9
SHA1 82edea1aa82368c1c1b81cb83021dc60eecb876b
SHA256 9692932496973f96d7f32561a3f02edaf1e54420516c07a41fa96700335a8ed8
SHA512 0d329b8468cd4e944e1598800647a61c9572b0b6a3d8663f94ca65fdd6bb3298d76857019ffbcde714ff6dff4a982fa0f32dff012335c46654db96d079c75eeb

memory/2156-32-0x0000000000400000-0x0000000000481000-memory.dmp

memory/2156-37-0x0000000000400000-0x0000000000481000-memory.dmp

memory/2156-41-0x0000000000400000-0x0000000000481000-memory.dmp

memory/2156-74-0x0000000000400000-0x0000000000481000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-20 23:41

Reported

2024-06-20 23:46

Platform

win10-20240404-en

Max time kernel

291s

Max time network

255s

Command Line

"C:\Users\Admin\AppData\Local\Temp\eb74efaf4832a80809815051fc97704819fbc4b1d57f07faf39746a02ed1dd10.exe"

Signatures

Amadey

trojan amadey

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\Dctooux.job C:\Users\Admin\AppData\Local\Temp\eb74efaf4832a80809815051fc97704819fbc4b1d57f07faf39746a02ed1dd10.exe N/A

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\eb74efaf4832a80809815051fc97704819fbc4b1d57f07faf39746a02ed1dd10.exe

"C:\Users\Admin\AppData\Local\Temp\eb74efaf4832a80809815051fc97704819fbc4b1d57f07faf39746a02ed1dd10.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 684

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 736

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 808

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 816

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 844

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 796

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 1056

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 1092

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 1016

Network

Country Destination Domain Proto
US 8.8.8.8:53 157.252.19.2.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 12.173.189.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp

Files

memory/2912-1-0x00000000004E0000-0x00000000005E0000-memory.dmp

memory/2912-3-0x0000000000400000-0x0000000000470000-memory.dmp

memory/2912-2-0x00000000020C0000-0x000000000212B000-memory.dmp

memory/2912-5-0x0000000000400000-0x0000000000481000-memory.dmp

memory/2912-7-0x00000000004E0000-0x00000000005E0000-memory.dmp

memory/2912-8-0x0000000000400000-0x0000000000470000-memory.dmp