Analysis
-
max time kernel
120s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 07:34
Behavioral task
behavioral1
Sample
172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe
Resource
win10v2004-20241007-en
General
-
Target
172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe
-
Size
720KB
-
MD5
0b2f70657111edc438cedbf6f329b750
-
SHA1
5b003bc40778186bbe298ddc51fe39648ec27068
-
SHA256
172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6
-
SHA512
03dc71e0811c0cafb07be20382e0f5f2fefa145ce8a426bda5f2fc76b6097605cd03ba1ef4aba4a43dddeb2b04fafc4f69b38f38b71f8876748a2f876901c5c6
-
SSDEEP
12288:tYdNctvsfu2LVBfKf057C9lRt3i5olGJsxhzag:edNikfu2hBfK8ilRty5olGJsxN
Malware Config
Signatures
-
Ammyy Admin
Remote admin tool with various capabilities.
-
AmmyyAdmin payload 4 IoCs
resource yara_rule behavioral2/memory/1692-0-0x0000000000400000-0x00000000004C4000-memory.dmp family_ammyyadmin behavioral2/memory/2260-4-0x0000000000400000-0x00000000004C4000-memory.dmp family_ammyyadmin behavioral2/memory/1692-6-0x0000000000400000-0x00000000004C4000-memory.dmp family_ammyyadmin behavioral2/memory/2668-11-0x0000000000400000-0x00000000004C4000-memory.dmp family_ammyyadmin -
Ammyyadmin family
-
FlawedAmmyy RAT
Remote-access trojan based on leaked code for the Ammyy remote admin software.
-
Flawedammyy family
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe -
Modifies data under HKEY_USERS 9 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Ammyy 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin\hr3 = c896e824a7781441d279d51f4b6ed5f628cf04c440f0498c052c5ab43fbbe4c3dedfca1f057cb2d099361968c2e03c353dfa7830a2a2b170f7b9249dfed8f7c64f10764106ad80b4bab1db 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy\Admin 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe Key created \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin\hr = 537d567366087c6658524c17525352aedefa4534b36b 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2668 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2668 2260 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe 84 PID 2260 wrote to memory of 2668 2260 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe 84 PID 2260 wrote to memory of 2668 2260 172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe"C:\Users\Admin\AppData\Local\Temp\172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe"1⤵
- System Location Discovery: System Language Discovery
PID:1692
-
C:\Users\Admin\AppData\Local\Temp\172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe"C:\Users\Admin\AppData\Local\Temp\172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe" -service -lunch1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe"C:\Users\Admin\AppData\Local\Temp\172ccd7a05670e06f4dfe6573418b4e1377cf3a7cd1e02a6f69030c9e37f17a6N.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22B
MD5e7b7c71ed5c6cc4ab1ce8af3e6344164
SHA11744bd91037b980d55a0b03ee7d5c74fbf2fb3f7
SHA2567ec157c248a94f5274cbb3ba9c434b60da131602c60264a66cd8be6fceacdb7b
SHA512a64cbe519b9c32db8be526194cf0ed64ab4c8c8c919d4f3c63a070d48617c3f7de9f38ddf39dde9fb0f9bd1ce7c4c63c38c91c842d7c95638e7d49b213bcde6c
-
Filesize
75B
MD53c4f2a19be33ba577db1f9e5b7129250
SHA11a6ee791175e3e3020baa264ebd0976b401de6dd
SHA25682ddcdad2b9523052f3eb970079064733bf6205e1f0ac8364d4b160176cd98ee
SHA512349d36e7d0665d1c5a34e0e6bc194075241df4270d37139393f335c86dc6b99015f303fb06a80bca15185fc39874fe6248c03d098810c7744a66e1a1a03eb9ab
-
Filesize
271B
MD54cb889e527b0d0781a17f6c2dd968129
SHA16a6a55cd5604370660f1c1ad1025195169be8978
SHA2562658cd46dd49335e739cafa31ff2ec63f3315b65ecc171a0f7612713d3ac702b
SHA512297d2c05d2ac950faeb519d3e7bc56ea9d9fcab65b5dfdbba2720be8eddc8b2d5ead3dc7c122b82d6937be6c2d7bb88872dd7b80961138571245fba381daac3f