Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 14:49
Static task
static1
Behavioral task
behavioral1
Sample
5ec04966ef8901ac13aa603645b3197d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5ec04966ef8901ac13aa603645b3197d.exe
Resource
win10v2004-20241007-en
General
-
Target
5ec04966ef8901ac13aa603645b3197d.exe
-
Size
5.1MB
-
MD5
5ec04966ef8901ac13aa603645b3197d
-
SHA1
e5263e87abb62c10a7224b598ae905858c6000de
-
SHA256
49e58e5dd3be1cb7249207a329c465ae65fa3099148b4e4e279afd88bc4b1fe0
-
SHA512
0fb6c5fa4110a2abcc02d1f405b1cd7236778223b2865991baef05eeaf2314d7b57104fbd0bc0a5c263561e144434a654937b4c620c5960f83064fcf279b3d4d
-
SSDEEP
98304:8L1T/X3Xn/odDFr3urN2mPR1iGV1PxMNmXV7v:+vJrNNJgGV1Px+W9
Malware Config
Extracted
amadey
5.04
9c88c6
-
install_dir
c0461fd49a
-
install_file
Gxtuum.exe
-
strings_key
1b8c0142f1804d4531696e70270c2eee
-
url_paths
/pLQvfD4d5/index.php
Signatures
-
Amadey family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ArmourySwAgent.lnk netsh.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2608 set thread context of 3656 2608 5ec04966ef8901ac13aa603645b3197d.exe 83 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\wbem service.job netsh.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ec04966ef8901ac13aa603645b3197d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2608 5ec04966ef8901ac13aa603645b3197d.exe 2608 5ec04966ef8901ac13aa603645b3197d.exe 2608 5ec04966ef8901ac13aa603645b3197d.exe 2608 5ec04966ef8901ac13aa603645b3197d.exe 3656 netsh.exe 3656 netsh.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2608 5ec04966ef8901ac13aa603645b3197d.exe 3656 netsh.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2608 wrote to memory of 3656 2608 5ec04966ef8901ac13aa603645b3197d.exe 83 PID 2608 wrote to memory of 3656 2608 5ec04966ef8901ac13aa603645b3197d.exe 83 PID 2608 wrote to memory of 3656 2608 5ec04966ef8901ac13aa603645b3197d.exe 83 PID 2608 wrote to memory of 3656 2608 5ec04966ef8901ac13aa603645b3197d.exe 83 PID 3656 wrote to memory of 2116 3656 netsh.exe 101 PID 3656 wrote to memory of 2116 3656 netsh.exe 101 PID 3656 wrote to memory of 2116 3656 netsh.exe 101 PID 3656 wrote to memory of 2116 3656 netsh.exe 101 PID 3656 wrote to memory of 2116 3656 netsh.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ec04966ef8901ac13aa603645b3197d.exe"C:\Users\Admin\AppData\Local\Temp\5ec04966ef8901ac13aa603645b3197d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\SysWOW64\netsh.exe2⤵
- Drops startup file
- Drops file in Windows directory
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:2116
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5b3727466ec07a63846376921058eb8c2
SHA19d5bb92eb483453386ca6584156b1779b81d517a
SHA2567288b5649ac5a71591da2e3e2dc8b6297160ba662f81d343cd59f271baee743e
SHA512e49bc7f234bd9c3a9cf07a5b55c20b8a6297bec3882962ea7e314968f75dd5d0091398cedf2065eea8451d2ae4bfb554c7d32afc00e32475c62fe652c39c9227
-
Filesize
1.1MB
MD556a5399fc2b0a749c91d0816904744e3
SHA194b34a8751f613ecacf99c5c522a1ae5286e7fc0
SHA256f61f8b28238029113290edc22429ab746cde66e0319fd0bad172d9ea36f9aa5d
SHA51282c775173de1d07ebf8ee7593f1720414c977cefda4ba21e6be0f3a8cb89638e59701b4a23aef8401e980e566ec6964d35ef5de6ebe5eff311c44421bbf26244
-
Filesize
5.1MB
MD55ec04966ef8901ac13aa603645b3197d
SHA1e5263e87abb62c10a7224b598ae905858c6000de
SHA25649e58e5dd3be1cb7249207a329c465ae65fa3099148b4e4e279afd88bc4b1fe0
SHA5120fb6c5fa4110a2abcc02d1f405b1cd7236778223b2865991baef05eeaf2314d7b57104fbd0bc0a5c263561e144434a654937b4c620c5960f83064fcf279b3d4d