Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    31-10-2024 16:39

General

  • Target

    AA_v31.exe

  • Size

    776KB

  • MD5

    4d4c220362f24e0ba72797572e447795

  • SHA1

    9f902124218892aa5d61594fe7a9d524a7e7cc08

  • SHA256

    bc483e6acdf276b57bb87317962c0091bb1421e61fa3306490b5858eabc61320

  • SHA512

    b4eb3a17efc6626c92446387fc41a1f0c616832a8ea9fe5532fb9869590b8b188c97404de6aba566fd25f126238fe6d45f874659bcc003d2092436142008b9ee

  • SSDEEP

    24576:B3YRddOnSok4fx2j2z5kMNbsRtrxc130jvs:+RenlHx2j2zxlkpj0

Malware Config

Signatures

  • FlawedAmmyy RAT

    Remote-access trojan based on leaked code for the Ammyy remote admin software.

  • Flawedammyy family
  • Blocklisted process makes network request 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AA_v31.exe
    "C:\Users\Admin\AppData\Local\Temp\AA_v31.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2848
  • C:\Users\Admin\AppData\Local\Temp\AA_v31.exe
    "C:\Users\Admin\AppData\Local\Temp\AA_v31.exe" -service -lunch
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3060
    • C:\Users\Admin\AppData\Local\Temp\AA_v31.exe
      "C:\Users\Admin\AppData\Local\Temp\AA_v31.exe"
      2⤵
      • Checks computer location settings
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Modifies system certificate store
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2636
      • C:\Windows\system32\rundll32.exe
        rundll32.exe "C:\ProgramData\AMMYY\aa_nts.dll",run
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\AMMYY\aa_nts.dll

    Filesize

    902KB

    MD5

    480a66902e6e7cdafaa6711e8697ff8c

    SHA1

    6ac730962e7c1dba9e2ecc5733a506544f3c8d11

    SHA256

    7eaaaa6010bbcd6bb8c9ad08d4b0966c7aedc9b2ac24758f170012ac36e508b5

    SHA512

    7d010cd47b7d1adf66f9c97afc6c3805997aa5c7cc6ff13eddee81f24cf2b95a3fe375ec5b3d6185c0bc8840b4ad91ae143c73a39af26391cc182ab6a1793ba5

  • C:\ProgramData\AMMYY\aa_nts.log

    Filesize

    4KB

    MD5

    6111315525aed943657e955b1904f506

    SHA1

    605dc02adfe8eaa13623f289aedb344d26d5681a

    SHA256

    7c53e14100c2eb6020dec257db26a2371b4ace42520946047484482233117343

    SHA512

    a01e20f929bdbbe52579020add2023fa2a98258e477a0f7c6aa5dd8f662cd3f7f639bcc79dfd3d228dd9a9497553309a38bdb6719512bc3acb6982e1e10a3f82

  • C:\ProgramData\AMMYY\aa_nts.msg

    Filesize

    45B

    MD5

    8e9f5e53ed616f9a6b0e9cd63ddf213b

    SHA1

    d6a4591cc6ba8e7825cc8e46fc084d59871c72f3

    SHA256

    bf832bfa5968ca3ffde3343f5f665d031761fad828e72f5e774e0d50cfd52cbc

    SHA512

    91d834b30719902987ae060e700db0ded85ea6a84c26b57ba81660c7b262771b664f7ef227782f57a9d0fb23f41a832a9a66f4291db197239e34b2d3217a78cc

  • C:\ProgramData\AMMYY\settings3.bin

    Filesize

    318B

    MD5

    2b78fbedf64da79335b653dbaff8e0cc

    SHA1

    88452575315a3124204974bc2b814b675cf8aed9

    SHA256

    9e5ee2a16ea006220f675a2c3aa215296a1ed6a044dbd6839b20a81f7e915311

    SHA512

    311bd30acc883e0898fa4c26a5c22e9a9ce0ca1c15d03a97f4b82c04671ec36cc2d8fda7e86aecb3080abda064e9749d5af58ed8926237ba2ee74c7e7170dab3

  • memory/2520-59-0x0000000064200000-0x00000000642EE000-memory.dmp

    Filesize

    952KB

  • memory/2520-42-0x0000000064200000-0x00000000642EE000-memory.dmp

    Filesize

    952KB

  • memory/2520-27-0x0000000064200000-0x00000000642EE000-memory.dmp

    Filesize

    952KB

  • memory/2520-21-0x0000000064200000-0x00000000642EE000-memory.dmp

    Filesize

    952KB

  • memory/2520-76-0x0000000064200000-0x00000000642EE000-memory.dmp

    Filesize

    952KB

  • memory/2520-93-0x0000000064200000-0x00000000642EE000-memory.dmp

    Filesize

    952KB

  • memory/2520-110-0x0000000064200000-0x00000000642EE000-memory.dmp

    Filesize

    952KB

  • memory/2520-127-0x0000000064200000-0x00000000642EE000-memory.dmp

    Filesize

    952KB

  • memory/2520-143-0x0000000064200000-0x00000000642EE000-memory.dmp

    Filesize

    952KB