Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 14:25
Static task
static1
Behavioral task
behavioral1
Sample
7c23cca92ddabc20911e0c51e19b002b.exe
Resource
win7-20240708-en
General
-
Target
7c23cca92ddabc20911e0c51e19b002b.exe
-
Size
13.4MB
-
MD5
7c23cca92ddabc20911e0c51e19b002b
-
SHA1
f0e07a68ca36681ece42c23d75351d51a9b52a8c
-
SHA256
471f22db8436b846bcc1b8d9691adb74d02cee7b49e4a58772f486ece4ca19db
-
SHA512
981afbb497ffde188e5134c181f85870ee1da5b9eb4dfda17e33f1b469a5bf76051071c1f37507c3a9bf1c2abe5c15379f1d2bb457d0953242aaba201fe5c3e1
-
SSDEEP
196608:cbQLsmUzjxbODbedh49KRAg+89tvjXV9nHTDN0JgCDt0IEM:cbAUsWdlRT+wtrXzzwgCh0Ir
Malware Config
Extracted
amadey
5.10
8a680c
http://62.60.226.15
-
install_dir
f39a3c5206
-
install_file
Gxtuum.exe
-
strings_key
a1bf8674ebe6a09a1462faf683ebc122
-
url_paths
/8fj482jd9/index.php
Signatures
-
Amadey family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5052 set thread context of 3732 5052 7c23cca92ddabc20911e0c51e19b002b.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c23cca92ddabc20911e0c51e19b002b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5052 7c23cca92ddabc20911e0c51e19b002b.exe 5052 7c23cca92ddabc20911e0c51e19b002b.exe 3732 more.com 3732 more.com -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 5052 7c23cca92ddabc20911e0c51e19b002b.exe 3732 more.com -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5052 wrote to memory of 3732 5052 7c23cca92ddabc20911e0c51e19b002b.exe 83 PID 5052 wrote to memory of 3732 5052 7c23cca92ddabc20911e0c51e19b002b.exe 83 PID 5052 wrote to memory of 3732 5052 7c23cca92ddabc20911e0c51e19b002b.exe 83 PID 5052 wrote to memory of 3732 5052 7c23cca92ddabc20911e0c51e19b002b.exe 83 PID 3732 wrote to memory of 2848 3732 more.com 92 PID 3732 wrote to memory of 2848 3732 more.com 92 PID 3732 wrote to memory of 2848 3732 more.com 92 PID 3732 wrote to memory of 2848 3732 more.com 92 PID 3732 wrote to memory of 2848 3732 more.com 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c23cca92ddabc20911e0c51e19b002b.exe"C:\Users\Admin\AppData\Local\Temp\7c23cca92ddabc20911e0c51e19b002b.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:2848
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5d2ac740e7f02d1857d23cc613d2a3015
SHA1333427371d9ff322e761d306a42ab0d6a863e6f9
SHA256b820ec17cfc9eec57cabaa1b6e79173a5e6ef6bc0fdf0b456ec943e02bca4d5f
SHA5128a91b783255e60bf95f7653f2e5ecb693a009babb580e37130721d845ddfc73ece82a669e9ebf01faec7a10598c3603ece8d82f130bc567f8747a7a72bb29933
-
Filesize
1.1MB
MD527a0dd706419aa20a10929e345221eba
SHA1dce5ca4d6cc84bef580050c44ce2be059041338b
SHA256b3266a2d5be211a25af6e0bb2a640b8c55090b6206813da5f0cd2fbace5ffc61
SHA5121e954752c281efc0752f8502467e5a05c08a0f40c0efc1867eff51c3377264323b8cd85db476dff28b45790cd106cfc7db65015e2c2961e15f0e82a90d94cf08