Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 14:29
Static task
static1
Behavioral task
behavioral1
Sample
22ef0ec1302427d5b197b30e545d0400.exe
Resource
win7-20240903-en
General
-
Target
22ef0ec1302427d5b197b30e545d0400.exe
-
Size
16.4MB
-
MD5
22ef0ec1302427d5b197b30e545d0400
-
SHA1
bc6b6278e436c56311bacc5e4476e5d4bab00692
-
SHA256
4ae196c51c70c762f9cbf250af00414f93e8ccea2337a7595d5307a474858812
-
SHA512
27e97250d50f8b31fcb5552826655bed92cc3a5f8334710fbb905b5a3f21dfc8e6c7e3202fa3982a21544247711fbc1f361224bb42fad28c91cf362df502c6d0
-
SSDEEP
393216:vMFPfYHcbXui8nRMeW3PBNEbdAgKvd5txx:vLLn5AgKvxX
Malware Config
Extracted
amadey
5.03
0b0f72
-
install_dir
6442e74d50
-
install_file
Gxtuum.exe
-
strings_key
d4bd0bf3214b416527b6ec31c7facca5
-
url_paths
/pLQvfD4d5/index.php
Signatures
-
Amadey family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1124 set thread context of 3560 1124 22ef0ec1302427d5b197b30e545d0400.exe 83 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\FmHttp.job more.com -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22ef0ec1302427d5b197b30e545d0400.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1124 22ef0ec1302427d5b197b30e545d0400.exe 1124 22ef0ec1302427d5b197b30e545d0400.exe 3560 more.com 3560 more.com -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1124 22ef0ec1302427d5b197b30e545d0400.exe 3560 more.com -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1124 22ef0ec1302427d5b197b30e545d0400.exe 1124 22ef0ec1302427d5b197b30e545d0400.exe 1124 22ef0ec1302427d5b197b30e545d0400.exe 1124 22ef0ec1302427d5b197b30e545d0400.exe 1124 22ef0ec1302427d5b197b30e545d0400.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1124 wrote to memory of 3560 1124 22ef0ec1302427d5b197b30e545d0400.exe 83 PID 1124 wrote to memory of 3560 1124 22ef0ec1302427d5b197b30e545d0400.exe 83 PID 1124 wrote to memory of 3560 1124 22ef0ec1302427d5b197b30e545d0400.exe 83 PID 1124 wrote to memory of 3560 1124 22ef0ec1302427d5b197b30e545d0400.exe 83 PID 3560 wrote to memory of 3444 3560 more.com 105 PID 3560 wrote to memory of 3444 3560 more.com 105 PID 3560 wrote to memory of 3444 3560 more.com 105 PID 3560 wrote to memory of 3444 3560 more.com 105 PID 3560 wrote to memory of 3444 3560 more.com 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\22ef0ec1302427d5b197b30e545d0400.exe"C:\Users\Admin\AppData\Local\Temp\22ef0ec1302427d5b197b30e545d0400.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:3444
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD54e240d276ef1a54d1b667d1f9eb88e21
SHA11e5b274fc533f472800c9277cba0790d93cda629
SHA256fa8f7069956f8077648e58f45c29acb1bd6ab3dc8717329a58fd27d61e4c8972
SHA512e91666bbd38c38b56269d95029aad986aee88172f65f7a41c24a6d11dc1ffc776cce84a51efbd52b61428f6bf1183e9ee9a09671c8cc499eb15cac2ec3ce0932
-
Filesize
1.2MB
MD519c224b487f2acdccfed536483588875
SHA18f3b5dbd2a9037c5fcff9ec7fc72aed336bb16b5
SHA25629d035529a67f4e7db41f1e5ca90df487e5fa017c4af23cee870ca54b2abf08d
SHA51277fab952a1fcce206e586fb91178affae8deb05f43533ae14c1c829a481c28e8bbf874b9f9c72484aa76fc6ae1defed8b361c4662f2b02f1fcb644ed1ec5876d