Analysis
-
max time kernel
120s -
max time network
112s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 10:17
Behavioral task
behavioral1
Sample
a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe
Resource
win10v2004-20241007-en
General
-
Target
a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe
-
Size
720KB
-
MD5
6bc5c1e1e9b7647b14ee5ffd0f53abd0
-
SHA1
3c9d020fab99d225a5b269901e226cb3d3c18bb8
-
SHA256
a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9c
-
SHA512
6cd0464098b45b6444985e9902070b7dfc3f4228a7d6445ac1e3a949f2b4fa3f9b8045a1d165309406605fec55eb93e248797ef9a076959defdad532626e97de
-
SSDEEP
12288:PYdNctvsfu2LVBfKf057C9lRt3i5olGJsxhzVEg4:wdNikfu2hBfK8ilRty5olGJsxd4
Malware Config
Signatures
-
FlawedAmmyy RAT
Remote-access trojan based on leaked code for the Ammyy remote admin software.
-
Flawedammyy family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Control Panel\International\Geo\Nation a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy\Admin\hr3 = 05cc305e26cadd17c83478288d1409f5fff8cd32dae94c5d82d820ff7bf1a2b1c1b5278dacb4adfe5178a858fd8baddfff546159705854104bcad75c003a231f4cc8c732 a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy\Admin a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy\Admin\hr = 537d567366087c695f594c16545347349b49fe3eb36b a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2364 a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2364 3052 a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe 31 PID 3052 wrote to memory of 2364 3052 a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe 31 PID 3052 wrote to memory of 2364 3052 a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe 31 PID 3052 wrote to memory of 2364 3052 a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe"C:\Users\Admin\AppData\Local\Temp\a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2992
-
C:\Users\Admin\AppData\Local\Temp\a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe"C:\Users\Admin\AppData\Local\Temp\a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe" -service -lunch1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe"C:\Users\Admin\AppData\Local\Temp\a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22B
MD52db1d0256d3ef3b6a1ee38cdf19d0338
SHA140d77c3ccaec9f5d70f9b25ab24f8e169257fbc4
SHA2563af09088817c43764759dc7d9c39fc86680f39c42ed24ee872fcebac320eb074
SHA51211f7db07810bb9ef98f1f26a8f646a1346ba1acc314dfda671dc09ecc60dcd0e8eed1191ca855bf9acc3b805b5dcf0958940e19ac81d13ab93d29f51a6907799
-
Filesize
68B
MD5ef53767655be05cdc243c5c546e6fa11
SHA12245eb4a8feed2b4f2a0970537e2193675b23e8d
SHA25601a96af0d34630ba73fac22453b65bc2e8bc75b864667ada392aaff35ada075e
SHA512f3124e08c050a213eda741dd4573accdd0cf2dccd71600f206dac21a8a6ba63d8c3ea9cf17803b9c0f6341fd0e003c53e1fd57c9d1180b7e5e04e77d8d3beb8e
-
Filesize
307B
MD56d41ae530d5f0c5531a343fb58a856ba
SHA1c15b36f055c1cb7b5f743c7123e6a79ebfbb1eb1
SHA256301fc095cca3f5f1f2449f39871b548cca14f795a556e8c63d319b91df90221f
SHA512d2b32bdbbe3371db7bcd45d7e0ced6388bab6af5cc065e927de362ed2828c4aa82d1af28c4fedcbdf8b82beedfe0b8666b9bdec970cefe2a7133b0b7797adfda