Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-01-2025 10:32

General

  • Target

    dffb2a4f8f65c2792a4f9cd223e834321a3c95e005c234f1ff0de567340d3935.exe

  • Size

    720KB

  • MD5

    65b172782afd43866f06256a6f4085a8

  • SHA1

    2867ae70390c9ae7da0e61bf46aecd2955a5dd8f

  • SHA256

    dffb2a4f8f65c2792a4f9cd223e834321a3c95e005c234f1ff0de567340d3935

  • SHA512

    b0a8946f3d3d0bb913137ecb5e0353fabd0bbde4a66a7daf6e8a11f07ed41ed31f737d32e6ce688a0d58a56adb490f03b44b79d6e5c8293457a070dd8735b1ed

  • SSDEEP

    12288:KzJUxbtiiTHRJuEkQO7EwC2ZwFRtAdRXRryd+sq1zkgqPE:K9oNTHRz/O7rT6FRteRXR2IsqzqPE

Malware Config

Signatures

  • FlawedAmmyy RAT

    Remote-access trojan based on leaked code for the Ammyy remote admin software.

  • Flawedammyy family
  • Drops file in System32 directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 9 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dffb2a4f8f65c2792a4f9cd223e834321a3c95e005c234f1ff0de567340d3935.exe
    "C:\Users\Admin\AppData\Local\Temp\dffb2a4f8f65c2792a4f9cd223e834321a3c95e005c234f1ff0de567340d3935.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3168
  • C:\Users\Admin\AppData\Local\Temp\dffb2a4f8f65c2792a4f9cd223e834321a3c95e005c234f1ff0de567340d3935.exe
    "C:\Users\Admin\AppData\Local\Temp\dffb2a4f8f65c2792a4f9cd223e834321a3c95e005c234f1ff0de567340d3935.exe" -service -lunch
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1360
    • C:\Users\Admin\AppData\Local\Temp\dffb2a4f8f65c2792a4f9cd223e834321a3c95e005c234f1ff0de567340d3935.exe
      "C:\Users\Admin\AppData\Local\Temp\dffb2a4f8f65c2792a4f9cd223e834321a3c95e005c234f1ff0de567340d3935.exe"
      2⤵
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\AMMYY\hr

    Filesize

    22B

    MD5

    2a0a8100852961da2ea36cf35616e3f7

    SHA1

    5cd713d2fd5e56daf6059c4931824853dcb9e22a

    SHA256

    b9b9b1581fa8100d8cee15258628ce6d2d9ab64d8596ccbb8033b3d390b624d5

    SHA512

    6d43a5abe223285c8c75c1c0d44162d372981a7618d2191ac1e741253d17a5962848feeea57da2ed8800e03b76fd4ff3c0bd6681409ab03ff479f2a22c0464be

  • C:\ProgramData\AMMYY\hr3

    Filesize

    75B

    MD5

    e6c103b544750a0d1416c3e71ec09632

    SHA1

    edb8a51f2717281b846c07e99aaa25063edd2d3d

    SHA256

    669b49a4b6476a7e5bce2e0a4d762ab7e46e76fa663b9558ff2d85a0cd68238f

    SHA512

    92fb811aa79e682f46141963e0dddc5c39c4bc6817cab44a04e2baea2fb3e7b3df4e21f5b4abaf6750d615f52ab33627fa57da6b8aff9e8389edbde5649addbe

  • C:\ProgramData\AMMYY\settings3.bin

    Filesize

    283B

    MD5

    4da4bbef4087d4badfdb674a2e283b72

    SHA1

    0946e95f28d350f08a4339ba14ea3e2713a30221

    SHA256

    3ba4e1f2d16b7d9addf2dc6e44c97d29770846eb122fe42256a26ab6e2640f49

    SHA512

    cace21bbf08dd1985036a3307151a2c2be3729df4aae5e98eca1aa0acabfb7ac1bb323c47611e389400c7c45e8586bc9bdc854458db747bda681deb27e2184b4