Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 14:35
Static task
static1
Behavioral task
behavioral1
Sample
34156c23ded10df5fbb61511b968e6cd.exe
Resource
win7-20240903-en
General
-
Target
34156c23ded10df5fbb61511b968e6cd.exe
-
Size
12.1MB
-
MD5
34156c23ded10df5fbb61511b968e6cd
-
SHA1
17271001393b53ff7d605a8925086d68101a0f15
-
SHA256
ac4345332d24b048fc1b99301435e7dc5c78d5561ac9bd0c512cad1cc47080b1
-
SHA512
160b10205c5e0bc888ec337e700c928a3880c897775e7278ec84e9b9279e058394661f9cdbfc42947b36e84c37910b98dcc54ec5d84cebad33914b8909bccf9f
-
SSDEEP
393216:lvQ5wyLqi68Ko/AhbRu074MQIEZjBv2ZbC+p:lo5PLBAh40kJjUZbCS
Malware Config
Extracted
amadey
5.03
3b4498
http://gardenhub-fitlife.com
http://gardenhub-fitlife2.com
http://gardenhub-fitlife3.com
-
strings_key
8ebb4a20053589d32f9b9ccd6234230f
-
url_paths
/g9jvjfd73/index.php
/g9jvjfd74/index.php
/8bkjdSdfjCe/index.php
Signatures
-
Amadey family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Control Panel\International\Geo\Nation 34156c23ded10df5fbb61511b968e6cd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 540 set thread context of 2284 540 34156c23ded10df5fbb61511b968e6cd.exe 31 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\MB Led SDK.job more.com -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 34156c23ded10df5fbb61511b968e6cd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 540 34156c23ded10df5fbb61511b968e6cd.exe 540 34156c23ded10df5fbb61511b968e6cd.exe 2284 more.com 2284 more.com -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 540 34156c23ded10df5fbb61511b968e6cd.exe 2284 more.com -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 540 wrote to memory of 2284 540 34156c23ded10df5fbb61511b968e6cd.exe 31 PID 540 wrote to memory of 2284 540 34156c23ded10df5fbb61511b968e6cd.exe 31 PID 540 wrote to memory of 2284 540 34156c23ded10df5fbb61511b968e6cd.exe 31 PID 540 wrote to memory of 2284 540 34156c23ded10df5fbb61511b968e6cd.exe 31 PID 540 wrote to memory of 2284 540 34156c23ded10df5fbb61511b968e6cd.exe 31 PID 2284 wrote to memory of 2628 2284 more.com 33 PID 2284 wrote to memory of 2628 2284 more.com 33 PID 2284 wrote to memory of 2628 2284 more.com 33 PID 2284 wrote to memory of 2628 2284 more.com 33 PID 2284 wrote to memory of 2628 2284 more.com 33 PID 2284 wrote to memory of 2628 2284 more.com 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\34156c23ded10df5fbb61511b968e6cd.exe"C:\Users\Admin\AppData\Local\Temp\34156c23ded10df5fbb61511b968e6cd.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:2628
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD50fda52f9ceb734b4ceb0a3819e6d336f
SHA152edd376fc0c4fb226a7a58829305d0248b43380
SHA25606736dcf382a751afc48510e882f921708b0ca5d13bd4ad5aef02d82eb2fc2e4
SHA512696729d5049b5cb4dd500b5d2099a9870a9e317408010fde6774a71528ef0801bf71ee421a71eb0b11a343d69ef3dd36f9e6a4e3158e9f2c5a15899826a41dc8
-
Filesize
1.2MB
MD557697a79a19e26bd054544a15ccea89d
SHA1f902c7433f2c7c17f989c0c87e46551dc6c032e7
SHA25606fa5f1e5c3646b2b8106c0c3cb777c4986a4685e552afffa283f35bc4c42ca8
SHA512ed5a2b87d417f0479de4a45687f9e941e7f0e69d7ed08c2438079c614f57ed4b783666025c72a79e38407ca0392c9441f43d0be02878df6ff44af60e225537fd