Analysis
-
max time kernel
120s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 10:17
Behavioral task
behavioral1
Sample
a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe
Resource
win10v2004-20241007-en
General
-
Target
a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe
-
Size
720KB
-
MD5
6bc5c1e1e9b7647b14ee5ffd0f53abd0
-
SHA1
3c9d020fab99d225a5b269901e226cb3d3c18bb8
-
SHA256
a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9c
-
SHA512
6cd0464098b45b6444985e9902070b7dfc3f4228a7d6445ac1e3a949f2b4fa3f9b8045a1d165309406605fec55eb93e248797ef9a076959defdad532626e97de
-
SSDEEP
12288:PYdNctvsfu2LVBfKf057C9lRt3i5olGJsxhzVEg4:wdNikfu2hBfK8ilRty5olGJsxd4
Malware Config
Signatures
-
FlawedAmmyy RAT
Remote-access trojan based on leaked code for the Ammyy remote admin software.
-
Flawedammyy family
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe -
Modifies data under HKEY_USERS 9 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin\hr = 537d567366087c6658524c175253a2df6b48fe3eb36b a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy\Admin a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe Key created \REGISTRY\USER\.DEFAULT\Software\Ammyy a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe Key created \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin\hr3 = daa81341ae6be7bd6807cda43e8c7d3d10b72df069c4babbb3fdbc0409b154c6c5dada15925c9fbd32fc58dfd4b8090df3872d1b418e84e086f82c1419dfb5b27ca9ea92d71c2529af887a a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1752 a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1752 a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4848 wrote to memory of 1752 4848 a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe 83 PID 4848 wrote to memory of 1752 4848 a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe 83 PID 4848 wrote to memory of 1752 4848 a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe"C:\Users\Admin\AppData\Local\Temp\a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2876
-
C:\Users\Admin\AppData\Local\Temp\a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe"C:\Users\Admin\AppData\Local\Temp\a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe" -service -lunch1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe"C:\Users\Admin\AppData\Local\Temp\a6f814b525fbedec982f569c29d67cb11fb232ae5951eba4ecb6f62a2eeefb9cN.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22B
MD5865baa4cde7ca006fff00161cb14095c
SHA123ce42eedcce0d5f966a1577bca4732bf09644e8
SHA2568c3f15b069942fc022ba0b80c7916de5080a14f83b83a8ec1e8f484ea7b56aa4
SHA5121df15fb5beb52429b4fd45356b986163c664362699cec04b29a3f0fddece5db7bf918fcc3502ca9d7281f2032a939e02c35f27b2ef1d042c2baebc5576e7fa17
-
Filesize
75B
MD5b7ef88c7130181bd8e56eb760ec0ed91
SHA1bf4a0d170dd5b226458933cfcbdf23e48542116d
SHA256ebc54ac516f54450f93212bc93c75ef065ae74a0a07b40396e378204b2ec41f3
SHA5123c3ed5c7e1a9098667f4125d20b42a101519f6b1cbfa79f9719b526a8b80d1e10c393f28ff17f328c5cdbab79988d250aeb05e1aa6a4bf59132770422a241fed
-
Filesize
307B
MD56d41ae530d5f0c5531a343fb58a856ba
SHA1c15b36f055c1cb7b5f743c7123e6a79ebfbb1eb1
SHA256301fc095cca3f5f1f2449f39871b548cca14f795a556e8c63d319b91df90221f
SHA512d2b32bdbbe3371db7bcd45d7e0ced6388bab6af5cc065e927de362ed2828c4aa82d1af28c4fedcbdf8b82beedfe0b8666b9bdec970cefe2a7133b0b7797adfda