Analysis
-
max time kernel
120s -
max time network
111s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 07:34
Behavioral task
behavioral1
Sample
172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe
Resource
win10v2004-20241007-en
General
-
Target
172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe
-
Size
720KB
-
MD5
0b2f70657111edc438cedbf6f329b750
-
SHA1
5b003bc40778186bbe298ddc51fe39648ec27068
-
SHA256
172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6
-
SHA512
03dc71e0811c0cafb07be20382e0f5f2fefa145ce8a426bda5f2fc76b6097605cd03ba1ef4aba4a43dddeb2b04fafc4f69b38f38b71f8876748a2f876901c5c6
-
SSDEEP
12288:tYdNctvsfu2LVBfKf057C9lRt3i5olGJsxhzag:edNikfu2hBfK8ilRty5olGJsxN
Malware Config
Signatures
-
Ammyy Admin
Remote admin tool with various capabilities.
-
AmmyyAdmin payload 5 IoCs
resource yara_rule behavioral1/memory/2372-0-0x0000000000400000-0x00000000004C4000-memory.dmp family_ammyyadmin behavioral1/memory/2504-5-0x0000000000400000-0x00000000004C4000-memory.dmp family_ammyyadmin behavioral1/memory/2372-8-0x0000000000400000-0x00000000004C4000-memory.dmp family_ammyyadmin behavioral1/memory/2488-7-0x0000000000400000-0x00000000004C4000-memory.dmp family_ammyyadmin behavioral1/memory/2504-14-0x0000000000400000-0x00000000004C4000-memory.dmp family_ammyyadmin -
Ammyyadmin family
-
FlawedAmmyy RAT
Remote-access trojan based on leaked code for the Ammyy remote admin software.
-
Flawedammyy family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\International\Geo\Nation 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy\Admin 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy\Admin\hr = 537d567366087c6658524c175253578727f04534b36b 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy\Admin\hr3 = a3461fbe5b67b90dfa21e8e6f10e1a86275dfbe40c589821ceea92c395ec901b957fc38e3b8a02a618feb9afa1ac15698fa20cc802bf49ba69281a0698f2ccab60f8fcbf98b690b81f6ad3 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2504 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2504 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2504 2488 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe 31 PID 2488 wrote to memory of 2504 2488 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe 31 PID 2488 wrote to memory of 2504 2488 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe 31 PID 2488 wrote to memory of 2504 2488 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe"C:\Users\Admin\AppData\Local\Temp\172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2372
-
C:\Users\Admin\AppData\Local\Temp\172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe"C:\Users\Admin\AppData\Local\Temp\172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe" -service -lunch1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe"C:\Users\Admin\AppData\Local\Temp\172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22B
MD52149030a9f75cb23b91d4d7f837e644f
SHA198dfb4ec9a8c481c64b781e565fa31876420a646
SHA25648f23bd5804be3b4bf8bf64aa81865a9876bc7cca88e186e2e06e8fe8c33f57b
SHA512a58271d59d494cc2d4fe8b3fbea89df3087d59486041334b1daca33eeed85cddf6fbf80655fd76ba71227712449bdb8b848cc647e1294ed0645cb46f70e2dc0a
-
Filesize
75B
MD58be5036c46e3a0d42bb3c34dfb68e99b
SHA113e5fd75cfc4291977121764cd74e4b0c7e7ac26
SHA25692791b433d079a276fa96b7430e28e7043af24576ea2409f34609c3957548647
SHA51222b9fa40cdb1089692e0b7989de1f087a50f94bde1804a96de639ab403617d465b7eac74424826278716023426d5acbd085150338c2853f6ac32e2f65bf85131
-
Filesize
271B
MD54cb889e527b0d0781a17f6c2dd968129
SHA16a6a55cd5604370660f1c1ad1025195169be8978
SHA2562658cd46dd49335e739cafa31ff2ec63f3315b65ecc171a0f7612713d3ac702b
SHA512297d2c05d2ac950faeb519d3e7bc56ea9d9fcab65b5dfdbba2720be8eddc8b2d5ead3dc7c122b82d6937be6c2d7bb88872dd7b80961138571245fba381daac3f