Analysis

  • max time kernel
    147s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    13-12-2024 01:33

General

  • Target

    ced8891ea8d87005de989f25f0f94634d1fc70ebb37302cf21aa0c0b0e13350f.exe

  • Size

    1.3MB

  • MD5

    db04aa6e158c5d52c20fc855f5285905

  • SHA1

    822416dfa3f094aa6776ed0cad77fb9083db29a3

  • SHA256

    ced8891ea8d87005de989f25f0f94634d1fc70ebb37302cf21aa0c0b0e13350f

  • SHA512

    cdc0ff46ac48178da0a68d4e2601a46a960c3aa998edd66a7bb6a39d1caa7dbbe53f1aa463307a9932996d2993386addc7c54cee73811897b075dd75fbc904ff

  • SSDEEP

    24576:wbsh2BfGSklE31Sa1jnzi+k24VR5SLRUyvQAqBYcTHykVbFv4pOdfEPkXsvHo/s/:wbsQf6lEFti+kZRSUJAqB/VRsO/oo/sJ

Malware Config

Extracted

Family

amadey

Version

4.18

Botnet

1cc3fe

C2

http://vitantgroup.com

Attributes
  • install_dir

    431a343abc

  • install_file

    Dctooux.exe

  • strings_key

    5a2387e2bfef84adb686c856b4155237

  • url_paths

    /xmlrpc.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 17 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ced8891ea8d87005de989f25f0f94634d1fc70ebb37302cf21aa0c0b0e13350f.exe
    "C:\Users\Admin\AppData\Local\Temp\ced8891ea8d87005de989f25f0f94634d1fc70ebb37302cf21aa0c0b0e13350f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exe
      "C:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exe

    Filesize

    1.3MB

    MD5

    db04aa6e158c5d52c20fc855f5285905

    SHA1

    822416dfa3f094aa6776ed0cad77fb9083db29a3

    SHA256

    ced8891ea8d87005de989f25f0f94634d1fc70ebb37302cf21aa0c0b0e13350f

    SHA512

    cdc0ff46ac48178da0a68d4e2601a46a960c3aa998edd66a7bb6a39d1caa7dbbe53f1aa463307a9932996d2993386addc7c54cee73811897b075dd75fbc904ff

  • C:\Users\Admin\AppData\Local\Temp\692679935401

    Filesize

    70KB

    MD5

    05d0842b7c67ef69cbca303a1d201682

    SHA1

    957eef938420a0b7e9aad24778e5ceb23cf10412

    SHA256

    e140274de7da6119ec774f5349ed139d88769ffd8a97f818464982ed2df8cf1a

    SHA512

    76176b209a4f0fc72da55468a9656996840ba05f69b0e7afc8b4320078d0a06691ec6a6d8061dcd5bf90af9b9fdce1a62a7aa5acf27ce379acd7fa3a423b0524

  • C:\Users\Admin\AppData\Roaming\bfbcc7a80c10a7\cred64.dll

    Filesize

    4KB

    MD5

    a1738487cde906eb910140b6bc384458

    SHA1

    385d200f44d5b989460e05ba13f30757b2801fd9

    SHA256

    4a53b6526319caac621f398348fc4c6597cc64d721e599e08b092ec312b0a858

    SHA512

    6484f3756bc0072099e7ec345cbbd89cb6248d548b96803a5895717bb5895202d6a99d40d5c50c9aff8d8f895e72fa5c565de46b114fe9b2310d89055f9e6693

  • memory/2212-18-0x00000000008E0000-0x0000000000CB9000-memory.dmp

    Filesize

    3.8MB

  • memory/2212-49-0x00000000008E0000-0x0000000000CB9000-memory.dmp

    Filesize

    3.8MB

  • memory/2212-78-0x00000000008E0000-0x0000000000CB9000-memory.dmp

    Filesize

    3.8MB

  • memory/2212-19-0x0000000000BD1000-0x0000000000CB9000-memory.dmp

    Filesize

    928KB

  • memory/2212-77-0x00000000008E0000-0x0000000000CB9000-memory.dmp

    Filesize

    3.8MB

  • memory/2212-67-0x00000000008E0000-0x0000000000CB9000-memory.dmp

    Filesize

    3.8MB

  • memory/2212-66-0x00000000008E0000-0x0000000000CB9000-memory.dmp

    Filesize

    3.8MB

  • memory/2212-17-0x00000000008E0000-0x0000000000CB9000-memory.dmp

    Filesize

    3.8MB

  • memory/2212-65-0x00000000008E0000-0x0000000000CB9000-memory.dmp

    Filesize

    3.8MB

  • memory/2212-32-0x00000000008E0000-0x0000000000CB9000-memory.dmp

    Filesize

    3.8MB

  • memory/2212-33-0x00000000008E0000-0x0000000000CB9000-memory.dmp

    Filesize

    3.8MB

  • memory/2212-64-0x00000000008E0000-0x0000000000CB9000-memory.dmp

    Filesize

    3.8MB

  • memory/2212-41-0x00000000008E0000-0x0000000000CB9000-memory.dmp

    Filesize

    3.8MB

  • memory/2212-63-0x00000000008E0000-0x0000000000CB9000-memory.dmp

    Filesize

    3.8MB

  • memory/2212-50-0x00000000008E0000-0x0000000000CB9000-memory.dmp

    Filesize

    3.8MB

  • memory/2212-51-0x00000000008E0000-0x0000000000CB9000-memory.dmp

    Filesize

    3.8MB

  • memory/2212-52-0x00000000008E0000-0x0000000000CB9000-memory.dmp

    Filesize

    3.8MB

  • memory/2212-62-0x00000000008E0000-0x0000000000CB9000-memory.dmp

    Filesize

    3.8MB

  • memory/2256-4-0x0000000000E00000-0x00000000011D9000-memory.dmp

    Filesize

    3.8MB

  • memory/2256-1-0x0000000000E00000-0x00000000011D9000-memory.dmp

    Filesize

    3.8MB

  • memory/2256-2-0x00000000010F1000-0x00000000011D9000-memory.dmp

    Filesize

    928KB

  • memory/2256-13-0x0000000000E00000-0x00000000011D9000-memory.dmp

    Filesize

    3.8MB

  • memory/2256-14-0x00000000010F1000-0x00000000011D9000-memory.dmp

    Filesize

    928KB

  • memory/2256-0-0x0000000000E00000-0x00000000011D9000-memory.dmp

    Filesize

    3.8MB

  • memory/2256-15-0x0000000004A70000-0x0000000004E49000-memory.dmp

    Filesize

    3.8MB