Analysis

  • max time kernel
    142s
  • max time network
    146s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    08-09-2024 07:56

General

  • Target

    1b1e6eddce071e5e25bd939c6306872a24039596424bfe8afa691cc4e7078819.exe

  • Size

    1.8MB

  • MD5

    101cb4a0a5db225d2d0213861edc7658

  • SHA1

    2be2e9cca7743912c32bfb78c123eedd595e1cd9

  • SHA256

    1b1e6eddce071e5e25bd939c6306872a24039596424bfe8afa691cc4e7078819

  • SHA512

    579097c948170680d69386beff056f020b2c9c976d2fb3457b7bf471a88c6c6b8a90e4cb974d6001c54e0e4fa67e0c34171c818ab00e5e935897f0436d1e054f

  • SSDEEP

    49152:idE+WxwPQXxX58fmTM6xrBDuj2nkT4/aisPoXrvchIgFPMmDr:id7jPQXoqDB1n3/an9h50mP

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 8 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 4 IoCs
  • Identifies Wine through registry keys 2 TTPs 4 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3260
      • C:\Users\Admin\AppData\Local\Temp\1b1e6eddce071e5e25bd939c6306872a24039596424bfe8afa691cc4e7078819.exe
        "C:\Users\Admin\AppData\Local\Temp\1b1e6eddce071e5e25bd939c6306872a24039596424bfe8afa691cc4e7078819.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:132
        • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
          "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2940
          • C:\Users\Admin\AppData\Local\Temp\1000270001\RMS1.exe
            "C:\Users\Admin\AppData\Local\Temp\1000270001\RMS1.exe"
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3844
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" Start-Sleep -Seconds 5; Remove-Item -Path 'C:\Users\Admin\AppData\Local\Temp\1000270001\RMS1.exe' -Force
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1076
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
        2⤵
          PID:4236
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
          2⤵
            PID:3136
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
            2⤵
              PID:2476
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
              2⤵
                PID:4648
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
                2⤵
                  PID:4036
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
                  2⤵
                    PID:4792
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
                    2⤵
                      PID:3048
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
                      2⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2996
                  • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                    C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                    1⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1340
                  • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                    C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                    1⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1984

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\1000270001\RMS1.exe

                    Filesize

                    1.4MB

                    MD5

                    03b1ed4c105e5f473357dad1df17cf98

                    SHA1

                    faf5046ff19eafd3a59dcf85be30496f90b5b6b1

                    SHA256

                    6be5916900ffda93154db8c2c5dd28b9150f4c3aef74dbd4fd86390bc72845ba

                    SHA512

                    3f6f8a12d000b913dc8240542be6a64f991dc0802313782d038b971219308e7d381d4d96c25d98ee1b05bca127a9bbc69e3bd54f1722d8381f8060bb506a9765

                  • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe

                    Filesize

                    1.8MB

                    MD5

                    101cb4a0a5db225d2d0213861edc7658

                    SHA1

                    2be2e9cca7743912c32bfb78c123eedd595e1cd9

                    SHA256

                    1b1e6eddce071e5e25bd939c6306872a24039596424bfe8afa691cc4e7078819

                    SHA512

                    579097c948170680d69386beff056f020b2c9c976d2fb3457b7bf471a88c6c6b8a90e4cb974d6001c54e0e4fa67e0c34171c818ab00e5e935897f0436d1e054f

                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5fs3n45n.n4t.ps1

                    Filesize

                    60B

                    MD5

                    d17fe0a3f47be24a6453e9ef58c94641

                    SHA1

                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                    SHA256

                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                    SHA512

                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                  • memory/132-1-0x0000000077276000-0x0000000077278000-memory.dmp

                    Filesize

                    8KB

                  • memory/132-2-0x0000000000881000-0x00000000008AF000-memory.dmp

                    Filesize

                    184KB

                  • memory/132-3-0x0000000000880000-0x0000000000D4E000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/132-5-0x0000000000880000-0x0000000000D4E000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/132-17-0x0000000000880000-0x0000000000D4E000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/132-0-0x0000000000880000-0x0000000000D4E000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/1076-1138-0x00000239F0E10000-0x00000239F0E32000-memory.dmp

                    Filesize

                    136KB

                  • memory/1340-1146-0x0000000000660000-0x0000000000B2E000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/1340-1148-0x0000000000660000-0x0000000000B2E000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/1984-1160-0x0000000000660000-0x0000000000B2E000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/1984-1158-0x0000000000660000-0x0000000000B2E000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2940-20-0x0000000000660000-0x0000000000B2E000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2940-1126-0x0000000000660000-0x0000000000B2E000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2940-1125-0x0000000000660000-0x0000000000B2E000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2940-1124-0x0000000000660000-0x0000000000B2E000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2940-22-0x0000000000660000-0x0000000000B2E000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2940-21-0x0000000000660000-0x0000000000B2E000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2940-19-0x0000000000660000-0x0000000000B2E000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2940-18-0x0000000000660000-0x0000000000B2E000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2996-1132-0x0000029B126B0000-0x0000029B1276C000-memory.dmp

                    Filesize

                    752KB

                  • memory/3844-85-0x00000202F4C40000-0x00000202F4D65000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/3844-59-0x00000202F4C40000-0x00000202F4D65000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/3844-97-0x00000202F4C40000-0x00000202F4D65000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/3844-95-0x00000202F4C40000-0x00000202F4D65000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/3844-93-0x00000202F4C40000-0x00000202F4D65000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/3844-89-0x00000202F4C40000-0x00000202F4D65000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/3844-87-0x00000202F4C40000-0x00000202F4D65000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/3844-101-0x00000202F4C40000-0x00000202F4D65000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/3844-83-0x00000202F4C40000-0x00000202F4D65000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/3844-91-0x00000202F4C40000-0x00000202F4D65000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/3844-81-0x00000202F4C40000-0x00000202F4D65000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/3844-79-0x00000202F4C40000-0x00000202F4D65000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/3844-77-0x00000202F4C40000-0x00000202F4D65000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/3844-75-0x00000202F4C40000-0x00000202F4D65000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/3844-73-0x00000202F4C40000-0x00000202F4D65000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/3844-71-0x00000202F4C40000-0x00000202F4D65000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/3844-69-0x00000202F4C40000-0x00000202F4D65000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/3844-67-0x00000202F4C40000-0x00000202F4D65000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/3844-65-0x00000202F4C40000-0x00000202F4D65000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/3844-99-0x00000202F4C40000-0x00000202F4D65000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/3844-57-0x00000202F4C40000-0x00000202F4D65000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/3844-55-0x00000202F4C40000-0x00000202F4D65000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/3844-53-0x00000202F4C40000-0x00000202F4D65000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/3844-51-0x00000202F4C40000-0x00000202F4D65000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/3844-49-0x00000202F4C40000-0x00000202F4D65000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/3844-45-0x00000202F4C40000-0x00000202F4D65000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/3844-63-0x00000202F4C40000-0x00000202F4D65000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/3844-44-0x00000202F4C40000-0x00000202F4D65000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/3844-1118-0x00000202F4230000-0x00000202F42D4000-memory.dmp

                    Filesize

                    656KB

                  • memory/3844-1119-0x00000202F4D70000-0x00000202F4DBC000-memory.dmp

                    Filesize

                    304KB

                  • memory/3844-1128-0x00000202F5670000-0x00000202F56C4000-memory.dmp

                    Filesize

                    336KB

                  • memory/3844-105-0x00000202F4C40000-0x00000202F4D65000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/3844-103-0x00000202F4C40000-0x00000202F4D65000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/3844-61-0x00000202F4C40000-0x00000202F4D65000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/3844-47-0x00000202F4C40000-0x00000202F4D65000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/3844-43-0x00000202F4C40000-0x00000202F4D6C000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/3844-42-0x00000202F4B10000-0x00000202F4C3A000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/3844-41-0x00000202F2330000-0x00000202F2490000-memory.dmp

                    Filesize

                    1.4MB