Analysis
-
max time kernel
137s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 14:37
Static task
static1
Behavioral task
behavioral1
Sample
f880c05fa8059b3f68e29922d370ec0c.exe
Resource
win7-20240903-en
General
-
Target
f880c05fa8059b3f68e29922d370ec0c.exe
-
Size
1.2MB
-
MD5
f880c05fa8059b3f68e29922d370ec0c
-
SHA1
19e3afc0856bad554ccb248085355ada23cc37ab
-
SHA256
f93f39819b5443b4e83783445eefd4e1c075d69a7f6c2379ccca08b17a4f70b6
-
SHA512
7c3a8b887a83735e33290d49b58d1b5c55177c2455a546b1ad8c31b0b0cb3d14d06e1bc2101a3f93361080390760a1871c098b7f3825ed973ab8f3268e0a45b7
-
SSDEEP
24576:iEFH0r5fK09vmJcTGln3AJ7aOg4ZbJgELn4nrQgLiz4sQ4/hxNnZbYFOONc4RUYm:iEFM9vHg6y4h7arQz4slxZZbhOW4qGWF
Malware Config
Extracted
amadey
5.04
b44aeb
-
install_dir
7725ce688f
-
install_file
Gxtuum.exe
-
strings_key
8bf9b3f72bb53c678e0173edf42df1ae
-
url_paths
/3ofn3jf3e2ljk/index.php
Signatures
-
Amadey family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
description pid Process procid_target PID 4988 created 3352 4988 f880c05fa8059b3f68e29922d370ec0c.exe 55 PID 808 created 3352 808 Gxtuum.exe 55 PID 4920 created 3352 4920 Gxtuum.exe 55 PID 2560 created 3352 2560 Gxtuum.exe 55 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation f880c05fa8059b3f68e29922d370ec0c.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lbroker.vbs f880c05fa8059b3f68e29922d370ec0c.exe -
Executes dropped EXE 6 IoCs
pid Process 808 Gxtuum.exe 4496 Gxtuum.exe 4920 Gxtuum.exe 5008 Gxtuum.exe 2560 Gxtuum.exe 4968 Gxtuum.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4988 set thread context of 2136 4988 f880c05fa8059b3f68e29922d370ec0c.exe 89 PID 808 set thread context of 4496 808 Gxtuum.exe 93 PID 4920 set thread context of 5008 4920 Gxtuum.exe 95 PID 2560 set thread context of 4968 2560 Gxtuum.exe 97 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Gxtuum.job f880c05fa8059b3f68e29922d370ec0c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f880c05fa8059b3f68e29922d370ec0c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f880c05fa8059b3f68e29922d370ec0c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4988 f880c05fa8059b3f68e29922d370ec0c.exe 808 Gxtuum.exe 4920 Gxtuum.exe 2560 Gxtuum.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 4988 f880c05fa8059b3f68e29922d370ec0c.exe Token: SeDebugPrivilege 4988 f880c05fa8059b3f68e29922d370ec0c.exe Token: SeDebugPrivilege 808 Gxtuum.exe Token: SeDebugPrivilege 808 Gxtuum.exe Token: SeDebugPrivilege 4920 Gxtuum.exe Token: SeDebugPrivilege 4920 Gxtuum.exe Token: SeDebugPrivilege 2560 Gxtuum.exe Token: SeDebugPrivilege 2560 Gxtuum.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 4988 wrote to memory of 2136 4988 f880c05fa8059b3f68e29922d370ec0c.exe 89 PID 4988 wrote to memory of 2136 4988 f880c05fa8059b3f68e29922d370ec0c.exe 89 PID 4988 wrote to memory of 2136 4988 f880c05fa8059b3f68e29922d370ec0c.exe 89 PID 4988 wrote to memory of 2136 4988 f880c05fa8059b3f68e29922d370ec0c.exe 89 PID 4988 wrote to memory of 2136 4988 f880c05fa8059b3f68e29922d370ec0c.exe 89 PID 4988 wrote to memory of 2136 4988 f880c05fa8059b3f68e29922d370ec0c.exe 89 PID 4988 wrote to memory of 2136 4988 f880c05fa8059b3f68e29922d370ec0c.exe 89 PID 4988 wrote to memory of 2136 4988 f880c05fa8059b3f68e29922d370ec0c.exe 89 PID 4988 wrote to memory of 2136 4988 f880c05fa8059b3f68e29922d370ec0c.exe 89 PID 4988 wrote to memory of 2136 4988 f880c05fa8059b3f68e29922d370ec0c.exe 89 PID 2136 wrote to memory of 808 2136 f880c05fa8059b3f68e29922d370ec0c.exe 90 PID 2136 wrote to memory of 808 2136 f880c05fa8059b3f68e29922d370ec0c.exe 90 PID 2136 wrote to memory of 808 2136 f880c05fa8059b3f68e29922d370ec0c.exe 90 PID 808 wrote to memory of 4496 808 Gxtuum.exe 93 PID 808 wrote to memory of 4496 808 Gxtuum.exe 93 PID 808 wrote to memory of 4496 808 Gxtuum.exe 93 PID 808 wrote to memory of 4496 808 Gxtuum.exe 93 PID 808 wrote to memory of 4496 808 Gxtuum.exe 93 PID 808 wrote to memory of 4496 808 Gxtuum.exe 93 PID 808 wrote to memory of 4496 808 Gxtuum.exe 93 PID 808 wrote to memory of 4496 808 Gxtuum.exe 93 PID 808 wrote to memory of 4496 808 Gxtuum.exe 93 PID 808 wrote to memory of 4496 808 Gxtuum.exe 93 PID 4920 wrote to memory of 5008 4920 Gxtuum.exe 95 PID 4920 wrote to memory of 5008 4920 Gxtuum.exe 95 PID 4920 wrote to memory of 5008 4920 Gxtuum.exe 95 PID 4920 wrote to memory of 5008 4920 Gxtuum.exe 95 PID 4920 wrote to memory of 5008 4920 Gxtuum.exe 95 PID 4920 wrote to memory of 5008 4920 Gxtuum.exe 95 PID 4920 wrote to memory of 5008 4920 Gxtuum.exe 95 PID 4920 wrote to memory of 5008 4920 Gxtuum.exe 95 PID 4920 wrote to memory of 5008 4920 Gxtuum.exe 95 PID 4920 wrote to memory of 5008 4920 Gxtuum.exe 95 PID 2560 wrote to memory of 4968 2560 Gxtuum.exe 97 PID 2560 wrote to memory of 4968 2560 Gxtuum.exe 97 PID 2560 wrote to memory of 4968 2560 Gxtuum.exe 97 PID 2560 wrote to memory of 4968 2560 Gxtuum.exe 97 PID 2560 wrote to memory of 4968 2560 Gxtuum.exe 97 PID 2560 wrote to memory of 4968 2560 Gxtuum.exe 97 PID 2560 wrote to memory of 4968 2560 Gxtuum.exe 97 PID 2560 wrote to memory of 4968 2560 Gxtuum.exe 97 PID 2560 wrote to memory of 4968 2560 Gxtuum.exe 97 PID 2560 wrote to memory of 4968 2560 Gxtuum.exe 97
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\f880c05fa8059b3f68e29922d370ec0c.exe"C:\Users\Admin\AppData\Local\Temp\f880c05fa8059b3f68e29922d370ec0c.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4988
-
-
C:\Users\Admin\AppData\Local\Temp\f880c05fa8059b3f68e29922d370ec0c.exe"C:\Users\Admin\AppData\Local\Temp\f880c05fa8059b3f68e29922d370ec0c.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:808
-
-
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4496
-
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"2⤵
- Executes dropped EXE
PID:5008
-
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"2⤵
- Executes dropped EXE
PID:4968
-
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4920
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5f880c05fa8059b3f68e29922d370ec0c
SHA119e3afc0856bad554ccb248085355ada23cc37ab
SHA256f93f39819b5443b4e83783445eefd4e1c075d69a7f6c2379ccca08b17a4f70b6
SHA5127c3a8b887a83735e33290d49b58d1b5c55177c2455a546b1ad8c31b0b0cb3d14d06e1bc2101a3f93361080390760a1871c098b7f3825ed973ab8f3268e0a45b7