Analysis
-
max time kernel
133s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2024 02:17
Static task
static1
Behavioral task
behavioral1
Sample
1dc6af93e4c02db3d98e4fdbe10e638d4a88685ef79345d12c1424aaeadf0482.exe
Resource
win7-20240903-en
General
-
Target
1dc6af93e4c02db3d98e4fdbe10e638d4a88685ef79345d12c1424aaeadf0482.exe
-
Size
1.2MB
-
MD5
a6410cca2ceacc80095a22fdc0f936ba
-
SHA1
d680defe60f055c02ec48f83a76a826969d50e0e
-
SHA256
1dc6af93e4c02db3d98e4fdbe10e638d4a88685ef79345d12c1424aaeadf0482
-
SHA512
0ed1237e80aba1321503de746aff9e6672376f85461ccee463a5454ab3e8b2a2092e098002a761c1ca1f12c91e23baed90deb3d8071be48fd46cfdd784567797
-
SSDEEP
24576:X5GJSGdYXqbG7BRwqGHYj7yeqCLi9/Ir6U1cMTOx4fu40gxUm:X5GhdUNDmYj7nqM0/IHj24r0gxU
Malware Config
Extracted
amadey
5.04
b44aeb
-
install_dir
7725ce688f
-
install_file
Gxtuum.exe
-
strings_key
8bf9b3f72bb53c678e0173edf42df1ae
-
url_paths
/3ofn3jf3e2ljk/index.php
Signatures
-
Amadey family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
description pid Process procid_target PID 3412 created 3404 3412 1dc6af93e4c02db3d98e4fdbe10e638d4a88685ef79345d12c1424aaeadf0482.exe 56 PID 2872 created 3404 2872 Gxtuum.exe 56 PID 1572 created 3404 1572 Gxtuum.exe 56 PID 536 created 3404 536 Gxtuum.exe 56 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 1dc6af93e4c02db3d98e4fdbe10e638d4a88685ef79345d12c1424aaeadf0482.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vminfo.vbs 1dc6af93e4c02db3d98e4fdbe10e638d4a88685ef79345d12c1424aaeadf0482.exe -
Executes dropped EXE 6 IoCs
pid Process 2872 Gxtuum.exe 2636 Gxtuum.exe 1572 Gxtuum.exe 2272 Gxtuum.exe 536 Gxtuum.exe 1740 Gxtuum.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3412 set thread context of 532 3412 1dc6af93e4c02db3d98e4fdbe10e638d4a88685ef79345d12c1424aaeadf0482.exe 89 PID 2872 set thread context of 2636 2872 Gxtuum.exe 93 PID 1572 set thread context of 2272 1572 Gxtuum.exe 95 PID 536 set thread context of 1740 536 Gxtuum.exe 97 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Gxtuum.job 1dc6af93e4c02db3d98e4fdbe10e638d4a88685ef79345d12c1424aaeadf0482.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1dc6af93e4c02db3d98e4fdbe10e638d4a88685ef79345d12c1424aaeadf0482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1dc6af93e4c02db3d98e4fdbe10e638d4a88685ef79345d12c1424aaeadf0482.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3412 1dc6af93e4c02db3d98e4fdbe10e638d4a88685ef79345d12c1424aaeadf0482.exe 2872 Gxtuum.exe 1572 Gxtuum.exe 536 Gxtuum.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 3412 1dc6af93e4c02db3d98e4fdbe10e638d4a88685ef79345d12c1424aaeadf0482.exe Token: SeDebugPrivilege 3412 1dc6af93e4c02db3d98e4fdbe10e638d4a88685ef79345d12c1424aaeadf0482.exe Token: SeDebugPrivilege 2872 Gxtuum.exe Token: SeDebugPrivilege 2872 Gxtuum.exe Token: SeDebugPrivilege 1572 Gxtuum.exe Token: SeDebugPrivilege 1572 Gxtuum.exe Token: SeDebugPrivilege 536 Gxtuum.exe Token: SeDebugPrivilege 536 Gxtuum.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 3412 wrote to memory of 532 3412 1dc6af93e4c02db3d98e4fdbe10e638d4a88685ef79345d12c1424aaeadf0482.exe 89 PID 3412 wrote to memory of 532 3412 1dc6af93e4c02db3d98e4fdbe10e638d4a88685ef79345d12c1424aaeadf0482.exe 89 PID 3412 wrote to memory of 532 3412 1dc6af93e4c02db3d98e4fdbe10e638d4a88685ef79345d12c1424aaeadf0482.exe 89 PID 3412 wrote to memory of 532 3412 1dc6af93e4c02db3d98e4fdbe10e638d4a88685ef79345d12c1424aaeadf0482.exe 89 PID 3412 wrote to memory of 532 3412 1dc6af93e4c02db3d98e4fdbe10e638d4a88685ef79345d12c1424aaeadf0482.exe 89 PID 3412 wrote to memory of 532 3412 1dc6af93e4c02db3d98e4fdbe10e638d4a88685ef79345d12c1424aaeadf0482.exe 89 PID 3412 wrote to memory of 532 3412 1dc6af93e4c02db3d98e4fdbe10e638d4a88685ef79345d12c1424aaeadf0482.exe 89 PID 3412 wrote to memory of 532 3412 1dc6af93e4c02db3d98e4fdbe10e638d4a88685ef79345d12c1424aaeadf0482.exe 89 PID 3412 wrote to memory of 532 3412 1dc6af93e4c02db3d98e4fdbe10e638d4a88685ef79345d12c1424aaeadf0482.exe 89 PID 3412 wrote to memory of 532 3412 1dc6af93e4c02db3d98e4fdbe10e638d4a88685ef79345d12c1424aaeadf0482.exe 89 PID 532 wrote to memory of 2872 532 1dc6af93e4c02db3d98e4fdbe10e638d4a88685ef79345d12c1424aaeadf0482.exe 90 PID 532 wrote to memory of 2872 532 1dc6af93e4c02db3d98e4fdbe10e638d4a88685ef79345d12c1424aaeadf0482.exe 90 PID 532 wrote to memory of 2872 532 1dc6af93e4c02db3d98e4fdbe10e638d4a88685ef79345d12c1424aaeadf0482.exe 90 PID 2872 wrote to memory of 2636 2872 Gxtuum.exe 93 PID 2872 wrote to memory of 2636 2872 Gxtuum.exe 93 PID 2872 wrote to memory of 2636 2872 Gxtuum.exe 93 PID 2872 wrote to memory of 2636 2872 Gxtuum.exe 93 PID 2872 wrote to memory of 2636 2872 Gxtuum.exe 93 PID 2872 wrote to memory of 2636 2872 Gxtuum.exe 93 PID 2872 wrote to memory of 2636 2872 Gxtuum.exe 93 PID 2872 wrote to memory of 2636 2872 Gxtuum.exe 93 PID 2872 wrote to memory of 2636 2872 Gxtuum.exe 93 PID 2872 wrote to memory of 2636 2872 Gxtuum.exe 93 PID 1572 wrote to memory of 2272 1572 Gxtuum.exe 95 PID 1572 wrote to memory of 2272 1572 Gxtuum.exe 95 PID 1572 wrote to memory of 2272 1572 Gxtuum.exe 95 PID 1572 wrote to memory of 2272 1572 Gxtuum.exe 95 PID 1572 wrote to memory of 2272 1572 Gxtuum.exe 95 PID 1572 wrote to memory of 2272 1572 Gxtuum.exe 95 PID 1572 wrote to memory of 2272 1572 Gxtuum.exe 95 PID 1572 wrote to memory of 2272 1572 Gxtuum.exe 95 PID 1572 wrote to memory of 2272 1572 Gxtuum.exe 95 PID 1572 wrote to memory of 2272 1572 Gxtuum.exe 95 PID 536 wrote to memory of 1740 536 Gxtuum.exe 97 PID 536 wrote to memory of 1740 536 Gxtuum.exe 97 PID 536 wrote to memory of 1740 536 Gxtuum.exe 97 PID 536 wrote to memory of 1740 536 Gxtuum.exe 97 PID 536 wrote to memory of 1740 536 Gxtuum.exe 97 PID 536 wrote to memory of 1740 536 Gxtuum.exe 97 PID 536 wrote to memory of 1740 536 Gxtuum.exe 97 PID 536 wrote to memory of 1740 536 Gxtuum.exe 97 PID 536 wrote to memory of 1740 536 Gxtuum.exe 97 PID 536 wrote to memory of 1740 536 Gxtuum.exe 97
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\1dc6af93e4c02db3d98e4fdbe10e638d4a88685ef79345d12c1424aaeadf0482.exe"C:\Users\Admin\AppData\Local\Temp\1dc6af93e4c02db3d98e4fdbe10e638d4a88685ef79345d12c1424aaeadf0482.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3412
-
-
C:\Users\Admin\AppData\Local\Temp\1dc6af93e4c02db3d98e4fdbe10e638d4a88685ef79345d12c1424aaeadf0482.exe"C:\Users\Admin\AppData\Local\Temp\1dc6af93e4c02db3d98e4fdbe10e638d4a88685ef79345d12c1424aaeadf0482.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872
-
-
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2636
-
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"2⤵
- Executes dropped EXE
PID:2272
-
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"2⤵
- Executes dropped EXE
PID:1740
-
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1572
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5a6410cca2ceacc80095a22fdc0f936ba
SHA1d680defe60f055c02ec48f83a76a826969d50e0e
SHA2561dc6af93e4c02db3d98e4fdbe10e638d4a88685ef79345d12c1424aaeadf0482
SHA5120ed1237e80aba1321503de746aff9e6672376f85461ccee463a5454ab3e8b2a2092e098002a761c1ca1f12c91e23baed90deb3d8071be48fd46cfdd784567797