Analysis

  • max time kernel
    283s
  • max time network
    175s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-09-2024 05:05

General

  • Target

    d5526528363ceeb718d30bc669038759c4cd80a1d3e9c8c661b12b261dcc9e29.exe

  • Size

    1.3MB

  • MD5

    2b01c9b0c69f13da5ee7889a4b17c45e

  • SHA1

    27f0c1ae0ddeddc9efac38bc473476b103fef043

  • SHA256

    d5526528363ceeb718d30bc669038759c4cd80a1d3e9c8c661b12b261dcc9e29

  • SHA512

    23d4a0fc82b70cd2454a1be3d9b84b8ce7dd00ad7c3e8ad2b771b1b7cbca752c53feec5a3ac5a81d8384a9fc6583f63cc39f1ebe7de04d3d9b08be53641ec455

  • SSDEEP

    24576:b9yEBs1ZKaxv6rRVO9VdLCjJehm4v2TeLUzguXpdQhgRQ7SoYafkW:bxqZK66rb4V0cxtQzv5dQhgRQ7SxID

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

1176f2

C2

http://185.215.113.19

Attributes
  • install_dir

    417fd29867

  • install_file

    ednfoki.exe

  • strings_key

    183201dc3defc4394182b4bff63c4065

  • url_paths

    /CoreOPT/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1212
      • C:\Users\Admin\AppData\Local\Temp\d5526528363ceeb718d30bc669038759c4cd80a1d3e9c8c661b12b261dcc9e29.exe
        "C:\Users\Admin\AppData\Local\Temp\d5526528363ceeb718d30bc669038759c4cd80a1d3e9c8c661b12b261dcc9e29.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1688
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c move Emotions Emotions.bat & Emotions.bat
          3⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2920
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2820
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "wrsa opssvc"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2824
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2692
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2572
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c md 607698
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2548
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V "MaskBathroomCompositionInjection" Participants
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2580
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b ..\Navy + ..\Temperature + ..\Streaming + ..\Ashley + ..\Ensures + ..\Language + ..\Viruses + ..\Bet + ..\Fla + ..\Asbestos + ..\Width Q
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2996
          • C:\Users\Admin\AppData\Local\Temp\607698\Waters.pif
            Waters.pif Q
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:2776
          • C:\Windows\SysWOW64\choice.exe
            choice /d y /t 5
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2028
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c schtasks.exe /create /tn "Tuition" /tr "wscript //B 'C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js'" /sc minute /mo 5 /F
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1816
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /create /tn "Tuition" /tr "wscript //B 'C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js'" /sc minute /mo 5 /F
          3⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:552
      • C:\Windows\SysWOW64\cmd.exe
        cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url" & echo URL="C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url" & exit
        2⤵
        • Drops startup file
        • System Location Discovery: System Language Discovery
        PID:2340
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c schtasks.exe /create /tn "Tuition" /tr "wscript //B 'C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js'" /sc minute /mo 5 /F
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2640
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /create /tn "Tuition" /tr "wscript //B 'C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js'" /sc minute /mo 5 /F
          3⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:2584
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {14DC1AC4-0BEB-4BB3-A74D-BEDCFFB407F6} S-1-5-21-312935884-697965778-3955649944-1000:MXQFNXLT\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Windows\system32\wscript.EXE
        C:\Windows\system32\wscript.EXE //B "C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2064
        • C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.scr
          "C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.scr" "C:\Users\Admin\AppData\Local\QuantumDynamics Lab\W"
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:2112

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js

      Filesize

      178B

      MD5

      d7279a49b341dad92ebeb082555f74ea

      SHA1

      6e095d0b29fad590f07abd43a9e0bbbe7f52a409

      SHA256

      6d480ed7d55d386049f17d91480fb3eee3b88535eef17370b87c515011e452c0

      SHA512

      b0798a35320cd4309e7e04279fae2da929e75a6edc3265f4e0739bca1164864cca6074f01a0a2fca5c14952e17f90ac0d3c5433c2d50ecf512d5ff5611f0d326

    • C:\Users\Admin\AppData\Local\Temp\1000369001\sxvtijm.exe

      Filesize

      6KB

      MD5

      307dca9c775906b8de45869cabe98fcd

      SHA1

      2b80c3a2fd4a235b2cc9f89315a554d0721c0dd1

      SHA256

      8437bd0ef46a19c9a7c294c53e0429b40e76ebbd5fe9fd73a9025752495ddb1c

      SHA512

      80c03f7add3a33a5df7b1f1665253283550dac484d26339ecd85672fb506dce44bd0bf96275d5c41a2e7369c3b604de377b7f5985d7d0d76c7ac663d60a67a1c

    • C:\Users\Admin\AppData\Local\Temp\607698\Q

      Filesize

      794KB

      MD5

      7b5632dcd418bcbae2a9009dbaf85f37

      SHA1

      32aaf06166854718f0bcbb2f7173c2732cfb4d33

      SHA256

      361e9c3b62719b79bc280420b5f710e160fd55f2250bf605911ded7162483db4

      SHA512

      c834e90ccf2d35529c294319b8e9a49db7a7d67d0567e0739131d5af51170db32076d68147dc101f8047a75cb5b2275b25a9c8346a99a146a6798b9764316838

    • C:\Users\Admin\AppData\Local\Temp\Asbestos

      Filesize

      60KB

      MD5

      19121d99734080f4fdd9ca3008168360

      SHA1

      b00acbdd3fa952df781ca9ad5c86ded9f2d51ec6

      SHA256

      37576e4b3a1e0004b4cf7da625b865a62d895411ed157c538f5f4cd3aa6fab7a

      SHA512

      e2e863d19e2f560c1deb018c3c2748be170b11fcb520ed7e7ea20727646bcacb0b5c3ed04e856943c67e51f5083c90aa3dd1f8794a83901a203c8bac4fa51c92

    • C:\Users\Admin\AppData\Local\Temp\Ashley

      Filesize

      52KB

      MD5

      e522956891659c41bd8550b8d5e16231

      SHA1

      4380c8a0c30db1532728cdb72707f9f1847cc87d

      SHA256

      ddb7f60ab5f8957955dd20f2dc270e3ef833d3727f374a8c4c444634bd05609d

      SHA512

      35c81ef1a2c040dbd52cad9f38fda43d8836d955b62e478ae941a4ba67d297dc1c4b40d6b30959c5d2f784d5cb0d19c795307906d52ad0e7eb72bd0e4235172f

    • C:\Users\Admin\AppData\Local\Temp\Bet

      Filesize

      55KB

      MD5

      0f3f07b667e947c4da38813d6d651e2a

      SHA1

      692622d5e5705f8f65db96f70d8c7c2f7fd5a640

      SHA256

      32b3d9d5bc58659ea524aa2cabd9cfc81b73e679e3d2cc899dfb00439612f5ff

      SHA512

      449ab13dd860b08570c589dc24e468dd880434c3be774ba4f078d8f116d710326fc546de621dce8a27e134f70f651d44642ec0ece37375332a7d7725e9ddcf9c

    • C:\Users\Admin\AppData\Local\Temp\Emotions

      Filesize

      19KB

      MD5

      b98d78c3abe777a5474a60e970a674ad

      SHA1

      079e438485e46aff758e2dff4356fdd2c7575d78

      SHA256

      2bc28afb291ece550a7cd2d0c5c060730eb1981d1cf122558d6971526c637eb4

      SHA512

      6218413866237bc1f6eada6554658a00c9fc55402e104576b33a2e8d4adf0fd952d8cc8d1ae3a02ebcfa030115fc388fc1a6f23b9d372f808e11e1b551064e5d

    • C:\Users\Admin\AppData\Local\Temp\Ensures

      Filesize

      75KB

      MD5

      c6fa82d60cfbf9e83b4cf3cbd1f01552

      SHA1

      a310c3577c5e439aa306a0a5dae2c75ea39c126e

      SHA256

      2686b284d1c21d06ab10829c16657334e13428210ccda89f68bfb8acbfc72b42

      SHA512

      e35a67a63fac7db37431bc0ab910a9c33a41e5a910ae79181a74aaf13ed23d65ef500a9e5a482e749cd9666c146d8403f83c6be2d9aa013d6d7c6bc0f07fac9c

    • C:\Users\Admin\AppData\Local\Temp\Fla

      Filesize

      82KB

      MD5

      e139e52f93ae3e19ab47f437cbe8b3de

      SHA1

      2d5b56c3c0a454fefbf7c7a466ad000c05258bd6

      SHA256

      e0c1c46fa4582a3826f7aed2f7fb454d3ee42a425f214321910c25cc1d8879d5

      SHA512

      4feba8bf6916c979fa45e16a368f22a165985e1dfd75697fd7a7534f5e64afe438206074b2f8aa884d5666e80c55544c62d5cc48f8429e7c843c01d1af060878

    • C:\Users\Admin\AppData\Local\Temp\Language

      Filesize

      72KB

      MD5

      5de7106df85e2f96f46f642d98433ad1

      SHA1

      f77a8182904a897a8d41858c6f5b87c3e8b21195

      SHA256

      9201319c9c07e4312717845e59c9fe3a987f70575cd63e4c042db778ebe4d5e9

      SHA512

      7c4b04d513e80873ea3030162702e5eff8ea17b44844ba2809805f92c6a7d6ed396ef660b78e274334448f31c447f26212c6779e801f330611d6a01f04449047

    • C:\Users\Admin\AppData\Local\Temp\Navy

      Filesize

      56KB

      MD5

      d4eb107cfd9fc38ed7e7b253562e155a

      SHA1

      7fc17c27c9f4739c19211600398bf1ee9df84dc5

      SHA256

      68e9a8d57ba2a484dd28a1afed5262a86aff4d81467b93b4072f329fab984f4c

      SHA512

      3a95c48e7a61239cbaa857459a6a106536dfd8190205275e2549a9939116833141276dd5b6c81ff337d2340eedba633d9ca01a03fb490eb27184becc97626e0f

    • C:\Users\Admin\AppData\Local\Temp\Participants

      Filesize

      2KB

      MD5

      f0e725addf4ec15a56aa0bde5bd8b2a7

      SHA1

      1f54a49195d3f7fd93c5fec06cc5904c57995147

      SHA256

      7cbd6810cb4dd516eeb75df79d1db55f74471c11594333ac225f24bfc0fca7ca

      SHA512

      00f14e435e0f8396f6c94fd5ace3f3645e87511b9e41e8c7c7caadb751ed826f60362ac007c80e9c3bd16f8f31b3a9107cbb39bf5c26d20a0ab5129e695f5269

    • C:\Users\Admin\AppData\Local\Temp\Rick

      Filesize

      869KB

      MD5

      e0d37e7b879f4b4e0dde5006da5009bd

      SHA1

      33d19bdb8a0ae45a38ab6899381ca8bc1ea7c1a5

      SHA256

      27014daa44b8b92e1684970350c43bb1701d3a592572e650e1e00be1470e5f77

      SHA512

      68b2f357b3f02f3181df095ddc6fe8ff1810a150e832c245e428f973a096301b1d13fce00ad28af662c4aea371f872d56348fe7b5d2070ed3f1c49388efd3f60

    • C:\Users\Admin\AppData\Local\Temp\Streaming

      Filesize

      97KB

      MD5

      1501de696d22f872db44b548cba0e4fa

      SHA1

      ed8a2948aaf041bfd0196a180f5888bdddcb9879

      SHA256

      dcf4784ea71a3e1a42318c09183d4b5981009d296814d3679ca68eb0a7c9e2ef

      SHA512

      fa931ce9f6ab6928cec1c999f1aa6082bd7c5c74eff317fc6b1bd0d9f88de2753e157ebd4d6a2719c5861f7fdc12bcde5859945633c1a2b8e0967684771f84bc

    • C:\Users\Admin\AppData\Local\Temp\Temperature

      Filesize

      89KB

      MD5

      249d56cbe275c2258ccd964f0c6241d9

      SHA1

      8ac982fe39012b8812ed9dcf16e8e00c9a74b0bc

      SHA256

      7c16e21e29d442bf0b459d083198b22ee9c6d9926e3aa61f43dc3a1ee3ecb731

      SHA512

      440d7ff539e737e4e3b74549be7495d0f3b3230888355bc93eeca8084c80f255d988839ef455b4f6841fbaa64aabfdef9233130663aa3c24f711d01edb8e6be8

    • C:\Users\Admin\AppData\Local\Temp\Viruses

      Filesize

      89KB

      MD5

      7c9dd6f9fa719321b72805df762a82da

      SHA1

      64b135116d963e47848e29a002a3207bc01ab2c0

      SHA256

      98232a6528beb079d8fa9d77751722159d4974e6859df867efb3ba7a3eec4bec

      SHA512

      480d16e0d1e5021b9042378df235323324fc8341461e59d117471aa0da07fe8ef6367d0e14479b4bbb854f29d1f092ba3e9776fa2bf56b34ab73f5a858e6b3d0

    • C:\Users\Admin\AppData\Local\Temp\Width

      Filesize

      67KB

      MD5

      12d9ad507c856d833101c9e367466555

      SHA1

      b6398b345226279cfab1559bf3847e3d9526dcff

      SHA256

      8e7415ed2d0d5c6e69d6a02bc3928c9adf685a43932e4543084b917946361974

      SHA512

      0ba3913d4a3ca266f0812263245a25caa0bbd9b81766992c8dc05466d9cd86cb79843c53c29bb26c005ef15c0f90ab97978209038181501135a7b27fb5b34d62

    • \Users\Admin\AppData\Local\Temp\607698\Waters.pif

      Filesize

      872KB

      MD5

      18ce19b57f43ce0a5af149c96aecc685

      SHA1

      1bd5ca29fc35fc8ac346f23b155337c5b28bbc36

      SHA256

      d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd

      SHA512

      a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558

    • memory/2776-44-0x00000000036A0000-0x0000000003711000-memory.dmp

      Filesize

      452KB

    • memory/2776-47-0x00000000036A0000-0x0000000003711000-memory.dmp

      Filesize

      452KB

    • memory/2776-48-0x00000000036A0000-0x0000000003711000-memory.dmp

      Filesize

      452KB

    • memory/2776-46-0x00000000036A0000-0x0000000003711000-memory.dmp

      Filesize

      452KB

    • memory/2776-49-0x00000000036A0000-0x0000000003711000-memory.dmp

      Filesize

      452KB

    • memory/2776-45-0x00000000036A0000-0x0000000003711000-memory.dmp

      Filesize

      452KB

    • memory/2776-79-0x00000000036A0000-0x0000000003711000-memory.dmp

      Filesize

      452KB

    • memory/2776-43-0x00000000036A0000-0x0000000003711000-memory.dmp

      Filesize

      452KB