Analysis
-
max time kernel
133s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 17:40
Static task
static1
Behavioral task
behavioral1
Sample
nnas.ps1
Resource
win7-20240903-en
General
-
Target
nnas.ps1
-
Size
583KB
-
MD5
123cdee8a31e52577191351fae7b53ef
-
SHA1
e8e645d8844b9a19012238be6ab2c4149d62f1cf
-
SHA256
d7e528b55b2eeb6786509664a70f641f14d0c13ceec539737eef26857355536e
-
SHA512
3ff792ced5090f68b7d6004213a9e6c653b42bcf5f10416b3b0cccf1a31516d5e737705d9826d21c8c84f240fc34726c76c60ec5fc8994f30a8e81839bee913a
-
SSDEEP
12288:kl6RA0zJb58097MFZ0sjlTONreknQV8Xie/0+4NW:kYRASw90sjtONrQV984NW
Malware Config
Extracted
amadey
4.18
1cc3fe
http://vitantgroup.com
-
install_dir
431a343abc
-
install_file
Dctooux.exe
-
strings_key
5a2387e2bfef84adb686c856b4155237
-
url_paths
/xmlrpc.php
Signatures
-
Amadey family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation av.exe -
Executes dropped EXE 4 IoCs
pid Process 1784 av.exe 4132 Dctooux.exe 1896 Dctooux.exe 4200 Dctooux.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Dctooux.job av.exe -
pid Process 5036 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language av.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dctooux.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5036 powershell.exe 5036 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5036 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1784 av.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5036 wrote to memory of 1784 5036 powershell.exe 84 PID 5036 wrote to memory of 1784 5036 powershell.exe 84 PID 5036 wrote to memory of 1784 5036 powershell.exe 84 PID 1784 wrote to memory of 4132 1784 av.exe 85 PID 1784 wrote to memory of 4132 1784 av.exe 85 PID 1784 wrote to memory of 4132 1784 av.exe 85
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\nnas.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\av.exe"C:\Users\Admin\AppData\Local\Temp\av.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exe"C:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4132
-
-
-
C:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exe1⤵
- Executes dropped EXE
PID:1896
-
C:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exe1⤵
- Executes dropped EXE
PID:4200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD5415864d05cb24f81a42d2cea01a8057f
SHA1ae9a2aaa3ae86e3224da2c3afc3eefa5299776bd
SHA256c45f980eb3613ef709b71c1b3f2050c432e504b0718efe94a2cdf0e45a6cbd22
SHA5127ce1dbf238f497062077e46f337a15980a6c2472054bc2c3e3e6f62dfc77bdcfc71b76f5e7ea46953a3396fb3aec8fb33cd85fdbfe99e2645cf1d747200e000a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
437KB
MD5d317ee086ebeccf5e01e002ca6b0ead9
SHA148e8c5846d9c67649b3c2fb8d76aa951828dd84e
SHA256dfdc0318f3dc5ba3f960b1f338b638cd9645856d2a2af8aa33ea0f9979a9ca4c
SHA5125fc335758f587e9f9f35309b101c16a4e2faa840013f8024f45eb33b9aa402a2877cbc07f76f389d25e2cf20607486997218de52c46364e2c89a5fa28a785032
-
Filesize
4KB
MD56afcbc2939801ac3ffc09b238cffa22b
SHA18e2398d78a86a67c0f2a52e485f8c24497a2ff38
SHA256cbde24827e318e9cc62d1473c6f1efe35380d7743ae27cc6ebcf23a636802c36
SHA5122ae911ee214e4404634f36460ae4d56d885c70808cd180f19411a0ab8bfacdf5e42a527f32d7df05a9509931b935916a1093b8da360fb84c16b7051c945dccea