Analysis

  • max time kernel
    140s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/09/2024, 07:53

General

  • Target

    fe16a136c5f2c6dbfdc19e5aece87361_JaffaCakes118.exe

  • Size

    712KB

  • MD5

    fe16a136c5f2c6dbfdc19e5aece87361

  • SHA1

    c960ae548ae499d0b9df3279095984c64c3e4111

  • SHA256

    42ba4a13429b26693044eded719292f50e50e9749cc8e1cfb268c6d0b9fd9e1c

  • SHA512

    33de335eeec2e67616a2466adadefe5f7d1ece12f511a0c4fc479a1a194a05393975b25fd3662d7033d9418845cfdd6f111e2f002dfd4f2d3949d57372aef78f

  • SSDEEP

    12288:W6qx+GgJOpEheBWpJ0NjYZZRKFdCFqPryQ32E9i/4B:8QlmWpJGYZZ4FsFEpn

Malware Config

Extracted

Family

amadey

Version

1.99

C2

217.8.117.41/nbDcw2d/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Executes dropped EXE 1 IoCs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NTFS ADS 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe16a136c5f2c6dbfdc19e5aece87361_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fe16a136c5f2c6dbfdc19e5aece87361_JaffaCakes118.exe"
    1⤵
    • Subvert Trust Controls: Mark-of-the-Web Bypass
    • System Location Discovery: System Language Discovery
    • NTFS ADS
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5004
    • \??\c:\programdata\44def37582\bdif.exe
      c:\programdata\44def37582\bdif.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4984
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /C SCHTASKS /Create /SC HOURLY /MO 1 /TN 83bb50ad72ec066ba3b2332b06c6d86c /TR c:\programdata\44def37582\bdif.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:116
        • C:\Windows\SysWOW64\schtasks.exe
          SCHTASKS /Create /SC HOURLY /MO 1 /TN 83bb50ad72ec066ba3b2332b06c6d86c /TR c:\programdata\44def37582\bdif.exe
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:1308
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /C SCHTASKS /Create /SC HOURLY /MO 1 /TN 83bb50ad72ec066ba3b2332b06c6d86c /TR c:\programdata\44def37582\bdif.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3576
        • C:\Windows\SysWOW64\schtasks.exe
          SCHTASKS /Create /SC HOURLY /MO 1 /TN 83bb50ad72ec066ba3b2332b06c6d86c /TR c:\programdata\44def37582\bdif.exe
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:3640
      • C:\Windows\SysWOW64\REG.exe
        REG ADD "HKCU\Software\Microsoft\Wc:\programdata\44def37582
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4460
      • C:\Windows\SysWOW64\REG.exe
        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d c:\programdata\44def37582
        3⤵
        • System Location Discovery: System Language Discovery
        PID:5112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\44def37582\bdif.exe

    Filesize

    712KB

    MD5

    fe16a136c5f2c6dbfdc19e5aece87361

    SHA1

    c960ae548ae499d0b9df3279095984c64c3e4111

    SHA256

    42ba4a13429b26693044eded719292f50e50e9749cc8e1cfb268c6d0b9fd9e1c

    SHA512

    33de335eeec2e67616a2466adadefe5f7d1ece12f511a0c4fc479a1a194a05393975b25fd3662d7033d9418845cfdd6f111e2f002dfd4f2d3949d57372aef78f

  • memory/4984-22-0x00000000006E0000-0x00000000006F0000-memory.dmp

    Filesize

    64KB

  • memory/4984-26-0x00000000021A0000-0x00000000021C5000-memory.dmp

    Filesize

    148KB

  • memory/4984-45-0x0000000000630000-0x0000000000638000-memory.dmp

    Filesize

    32KB

  • memory/5004-4-0x0000000000690000-0x000000000069D000-memory.dmp

    Filesize

    52KB

  • memory/5004-0-0x00000000006A0000-0x00000000006B0000-memory.dmp

    Filesize

    64KB

  • memory/5004-5-0x00000000022E0000-0x0000000002305000-memory.dmp

    Filesize

    148KB

  • memory/5004-21-0x0000000000680000-0x0000000000688000-memory.dmp

    Filesize

    32KB