Analysis
-
max time kernel
94s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2025, 07:44
Static task
static1
Behavioral task
behavioral1
Sample
ab733235a722c734fb8f19160825cef1.ps1
Resource
win7-20240903-en
General
-
Target
ab733235a722c734fb8f19160825cef1.ps1
-
Size
681KB
-
MD5
ab733235a722c734fb8f19160825cef1
-
SHA1
162b73031c52d7356337479488d60c333f404fdd
-
SHA256
32e6d8538c6b1d47942918cef259a80e70f06feb0145d6e41d44ec5917435391
-
SHA512
64a26e92c00a7a61acf71fdf819874ef6ce976117ddcaa0bea5ea3d57e2c631ff5569fdea081c6a39c73aa3ae40b0c08a049d7233c2a7e94232543cb1c4e67f6
-
SSDEEP
12288:yfytehPmbJEW2WkiUHJcWzMkVjkMAkZZ7wyzDFBagP:5yWKV5jkUZUyzSgP
Malware Config
Extracted
amadey
5.10
26467e
http://176.113.115.131
-
install_dir
adf0485ca6
-
install_file
Gxtuum.exe
-
strings_key
a60c430246a6b5eabfeff991901daa75
-
url_paths
/8Fvu5jh4DbS/index.php
Signatures
-
Amadey family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3304 set thread context of 3448 3304 powershell.exe 84 -
pid Process 3304 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wermgr.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU wermgr.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 3688 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3304 powershell.exe 3304 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3304 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3304 wrote to memory of 3688 3304 powershell.exe 83 PID 3304 wrote to memory of 3688 3304 powershell.exe 83 PID 3304 wrote to memory of 3448 3304 powershell.exe 84 PID 3304 wrote to memory of 3448 3304 powershell.exe 84 PID 3304 wrote to memory of 3448 3304 powershell.exe 84 PID 3304 wrote to memory of 3448 3304 powershell.exe 84 PID 3304 wrote to memory of 3448 3304 powershell.exe 84 PID 3304 wrote to memory of 3448 3304 powershell.exe 84 PID 3304 wrote to memory of 3448 3304 powershell.exe 84 PID 3304 wrote to memory of 3448 3304 powershell.exe 84 PID 3304 wrote to memory of 3448 3304 powershell.exe 84 PID 3304 wrote to memory of 3448 3304 powershell.exe 84 PID 3304 wrote to memory of 1168 3304 powershell.exe 85 PID 3304 wrote to memory of 1168 3304 powershell.exe 85
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\ab733235a722c734fb8f19160825cef1.ps11⤵
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Windows\system32\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /flushdns2⤵
- Gathers network information
PID:3688
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3448
-
-
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "0" "3304" "2212" "2128" "2216" "0" "0" "2220" "0" "0" "0" "0" "0"2⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:1168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82