Analysis

  • max time kernel
    189s
  • max time network
    291s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    02-09-2024 05:06

General

  • Target

    9e06eed4e1237ffdc84f0ff666fbe4b39e1bd2c60bd542870f7e1bfb10555951.exe

  • Size

    425KB

  • MD5

    ced97d60021d4a0bfa03ee14ec384c12

  • SHA1

    7af327df2a2d1e0e09034c2bdf6a47f788cec4e4

  • SHA256

    9e06eed4e1237ffdc84f0ff666fbe4b39e1bd2c60bd542870f7e1bfb10555951

  • SHA512

    af0a02daa759010a1edfc78f14c5fe321c10802d0b9df55b515fe501114af0835a05bbd5dd5e2167b4b1f39bb6da787343bf9141d5f811113f71749741b47811

  • SSDEEP

    6144:31YnIct+B6NxMYE4+Sx9SY5pkUM7LOM/9HtlcyKZrr02e7wufA5oVt1ZuWu1KBF/:0IGxJECSYCLTxKZn1e7C5oVnZuWu3p

Malware Config

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects ZharkBot payload 1 IoCs

    ZharkBot is a botnet written C++.

  • ZharkBot

    ZharkBot is a botnet written C++.

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e06eed4e1237ffdc84f0ff666fbe4b39e1bd2c60bd542870f7e1bfb10555951.exe
    "C:\Users\Admin\AppData\Local\Temp\9e06eed4e1237ffdc84f0ff666fbe4b39e1bd2c60bd542870f7e1bfb10555951.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2692
    • C:\Users\Admin\AppData\Local\Temp\1000268001\kitty.exe
      "C:\Users\Admin\AppData\Local\Temp\1000268001\kitty.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2576
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 188
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2684
    • C:\Users\Admin\AppData\Local\Temp\1000279001\ovrflw.exe
      "C:\Users\Admin\AppData\Local\Temp\1000279001\ovrflw.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:864
      • C:\Users\Admin\AppData\Roaming\Microsoft Network Agent\mswabnet.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft Network Agent\mswabnet.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1000268001\kitty.exe

    Filesize

    319KB

    MD5

    0ec1f7cc17b6402cd2df150e0e5e92ca

    SHA1

    8405b9bf28accb6f1907fbe28d2536da4fba9fc9

    SHA256

    4c5ca5701285337a96298ebf994f8ba013d290c63afa65b5c2b05771fbbb9ed4

    SHA512

    7caa2416bc7878493b62a184ddc844d201a9ab5282abfa77a616316af39ff65309e37bb566b3e29d9e764e08f4eda43a06464acaf9962f911b33e6dbc60c1861

  • C:\Users\Admin\AppData\Local\Temp\1000279001\ovrflw.exe

    Filesize

    1.4MB

    MD5

    3adfc7cf1e296c6fb703991c5233721d

    SHA1

    fddd2877ce7952b91c3f841ca353235d6d8eea67

    SHA256

    6bc23179d079d220337ede270113d4a474b549f5f0c7fd57f3d33d318f7ae471

    SHA512

    5136525626c3021baf8d35be0d76473cc03bfe2433682d613650b8e4bb444f767d2d14ac0070ce46c4c220e0a71a8f2e789e4e684e2042bd78b60f68f35a652b

  • C:\Users\Admin\AppData\Local\Temp\502430532246

    Filesize

    70KB

    MD5

    a8ada718b776c90b49b973936b4d8393

    SHA1

    517935230de1f89759741d20d4558f9de23e1c90

    SHA256

    12ece7eaae9f1f898beb577b3c2f97fea86e759423dfa35ca6cccdf18b20ae50

    SHA512

    56e518df011f328f2522123d6e143321cd5deac8317acc75b0b62b48ede896ad1dfa9dfc021a9494bc75a604c11f8d5da5712ba89709db4caaf0615e38dd5d74

  • C:\Users\Admin\AppData\Local\Temp\Cab409B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar40AD.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/864-37-0x000007FEF5F63000-0x000007FEF5F64000-memory.dmp

    Filesize

    4KB

  • memory/864-38-0x0000000001290000-0x00000000013F2000-memory.dmp

    Filesize

    1.4MB

  • memory/1672-44-0x0000000000DB0000-0x0000000000F12000-memory.dmp

    Filesize

    1.4MB