Analysis Overview
SHA256
ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a
Threat Level: Known bad
The file rh111.exe was found to be: Known bad.
Malicious Activity Summary
AmmyyAdmin payload
Ammyyadmin family
FlawedAmmyy RAT
Writes to the Master Boot Record (MBR)
System Location Discovery: System Language Discovery
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-08-06 08:12
Signatures
AmmyyAdmin payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Ammyyadmin family
Analysis: behavioral1
Detonation Overview
Submitted
2024-08-06 08:12
Reported
2024-08-06 08:14
Platform
win7-20240705-en
Max time kernel
117s
Max time network
119s
Command Line
Signatures
FlawedAmmyy RAT
Writes to the Master Boot Record (MBR)
| Description | Indicator | Process | Target |
| File opened for modification | \??\PhysicalDrive0 | C:\Users\Admin\AppData\Local\Temp\rh111.exe | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\rh111.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\rh111.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\rh111.exe | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\rh111.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2148 wrote to memory of 2676 | N/A | C:\Users\Admin\AppData\Local\Temp\rh111.exe | C:\Users\Admin\AppData\Local\Temp\rh111.exe |
| PID 2148 wrote to memory of 2676 | N/A | C:\Users\Admin\AppData\Local\Temp\rh111.exe | C:\Users\Admin\AppData\Local\Temp\rh111.exe |
| PID 2148 wrote to memory of 2676 | N/A | C:\Users\Admin\AppData\Local\Temp\rh111.exe | C:\Users\Admin\AppData\Local\Temp\rh111.exe |
| PID 2148 wrote to memory of 2676 | N/A | C:\Users\Admin\AppData\Local\Temp\rh111.exe | C:\Users\Admin\AppData\Local\Temp\rh111.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\rh111.exe
"C:\Users\Admin\AppData\Local\Temp\rh111.exe"
C:\Users\Admin\AppData\Local\Temp\rh111.exe
"C:\Users\Admin\AppData\Local\Temp\rh111.exe" -service -lunch
C:\Users\Admin\AppData\Local\Temp\rh111.exe
"C:\Users\Admin\AppData\Local\Temp\rh111.exe"
Network
Files
C:\ProgramData\AMMYY\settings3.bin
| MD5 | 6f2ce133a9e78c4e0a5c29b363eb4d3b |
| SHA1 | 0443fb7e247ffe9319a51c7240ff610d8b7073cd |
| SHA256 | 19a0d54f5542b7cca6e4f644d8d5a9fe999d6cec3dc6874841d736eca9dbea3d |
| SHA512 | 400103badae05f297596ff235b852e2ea24bf3b71f3bb316dcd4e1cd4a5e613e605e550b86fa4374d589184a914f0a7dbcbcb8ac189154df3038251538a387b0 |
Analysis: behavioral2
Detonation Overview
Submitted
2024-08-06 08:12
Reported
2024-08-06 08:14
Platform
win10v2004-20240802-en
Max time kernel
92s
Max time network
154s
Command Line
Signatures
FlawedAmmyy RAT
Writes to the Master Boot Record (MBR)
| Description | Indicator | Process | Target |
| File opened for modification | \??\PhysicalDrive0 | C:\Users\Admin\AppData\Local\Temp\rh111.exe | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\rh111.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\rh111.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\rh111.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1504 wrote to memory of 2936 | N/A | C:\Users\Admin\AppData\Local\Temp\rh111.exe | C:\Users\Admin\AppData\Local\Temp\rh111.exe |
| PID 1504 wrote to memory of 2936 | N/A | C:\Users\Admin\AppData\Local\Temp\rh111.exe | C:\Users\Admin\AppData\Local\Temp\rh111.exe |
| PID 1504 wrote to memory of 2936 | N/A | C:\Users\Admin\AppData\Local\Temp\rh111.exe | C:\Users\Admin\AppData\Local\Temp\rh111.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\rh111.exe
"C:\Users\Admin\AppData\Local\Temp\rh111.exe"
C:\Users\Admin\AppData\Local\Temp\rh111.exe
"C:\Users\Admin\AppData\Local\Temp\rh111.exe" -service -lunch
C:\Users\Admin\AppData\Local\Temp\rh111.exe
"C:\Users\Admin\AppData\Local\Temp\rh111.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 81.144.22.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.165.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 92.12.20.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
Files
C:\ProgramData\AMMYY\settings3.bin
| MD5 | cd729f2fe267badbc9b8ed79b03da8be |
| SHA1 | 9ddc27d2660535d1f801c8281542d5ac398b2f6b |
| SHA256 | f123881e6f80c32a0742ec4aca63a3cfcf2e22e30bf59ef24bf0b0315b3ccec4 |
| SHA512 | 9d50b5713aa3ea852926891576b624a74535b18af5d90f1aad627916b14e72d7c798db7bea13b72a6cd1babca56a5220d9f7b27aa116994602d3c25a579ded90 |