Analysis

  • max time kernel
    292s
  • max time network
    302s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    27-06-2024 22:55

General

  • Target

    67772e72ea6536254aef5687a6eec2ac0337c81698239e8fbc109b953790be76.exe

  • Size

    1.8MB

  • MD5

    b140d0e0a9bfb0c0be35c9c605d046c1

  • SHA1

    f82a8c33fa2dbf8fc327be0dfd764660252d1d74

  • SHA256

    67772e72ea6536254aef5687a6eec2ac0337c81698239e8fbc109b953790be76

  • SHA512

    f2f25b3fbe54ee18f89e825dd34ce7728873d4847e2882886a7d6f8c6dd0e0c7887263900b954abdd853935b01ecaad94a04dffad61940b402d94d859c96bf1f

  • SSDEEP

    49152:6pu/+DBuLQmTEPEpEw+Lyak4YUjd0hmEQY0eBJ:3/+MsmBpEw+k+WmED

Malware Config

Extracted

Family

amadey

Version

8254624243

Botnet

e76b71

C2

http://77.91.77.81

Attributes
  • install_dir

    8254624243

  • install_file

    axplong.exe

  • strings_key

    90049e51fabf09df0d6748e0b271922e

  • url_paths

    /Kiru9gu/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 4 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 5 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67772e72ea6536254aef5687a6eec2ac0337c81698239e8fbc109b953790be76.exe
    "C:\Users\Admin\AppData\Local\Temp\67772e72ea6536254aef5687a6eec2ac0337c81698239e8fbc109b953790be76.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe
      "C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2692
      • C:\Users\Admin\AppData\Local\Temp\1000064001\NewLatest.exe
        "C:\Users\Admin\AppData\Local\Temp\1000064001\NewLatest.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1424
        • C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exe
          "C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Modifies system certificate store
          • Suspicious use of WriteProcessMemory
          PID:1584
          • C:\Users\Admin\AppData\Local\Temp\1000020001\1.exe
            "C:\Users\Admin\AppData\Local\Temp\1000020001\1.exe"
            5⤵
            • Executes dropped EXE
            PID:2380

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    806d7dd25d7a4f43689a7afc8402f7d4

    SHA1

    ea2a0b5efc25d0624bc88c2e44b495169e83a509

    SHA256

    0ffd0e166a38133e5ed6c2e340a405101e7230b97863cd8eae190ad9a23b603a

    SHA512

    08c754175449916bd8b2e4dffe85f062d79a90ce084081be71e4c5e7a33626adf309c16f795e0cd9b6236364b609f555ac8fd498707416fdceef91571d5a698b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    32ef524378acba63fc5e7fc669cbee94

    SHA1

    6a854ec85ce5969be6ac8f55224d8d5ab2722a48

    SHA256

    ce8d4bfa22a60d2e64b0596c9aee7a0a3ae2f295917eb50ecf057587c94e82dd

    SHA512

    a7c45edae245dda8a55acd1dc012ac02a28eaaf47834725f85dd9ffab66e9d22597257fbaadda151d54e6370eb933bfea59bb92a1662005211ffaa9224b6cce4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
    Filesize

    242B

    MD5

    5944ccd42d46dbea2059a12883890f2d

    SHA1

    0081e56db4c8585c062871b4c03571fbc6c39a7a

    SHA256

    b5540eef1bc8dc90c73c4ad48351535acae3d0e8d54f712460a67b33d5db47dc

    SHA512

    89e739f104f6a75b91566f506df28c25849285ce4079df6ba6806a005509bd7643809a71ea1d5c3a2c0bfd6565a18f033872f1e62db858eb8a613c064e080721

  • C:\Users\Admin\AppData\Local\Temp\1000020001\1.exe
    Filesize

    317KB

    MD5

    e1b59d2805b38262b9967bce3e719dbf

    SHA1

    4081416cfaa76941981c34518d45b60e8d4b2013

    SHA256

    d5bba713d11ebbb7a91be59dae0f2d4b818897fe756b854dfe40babe7664c173

    SHA512

    bcea30a8f2a10aed0e2c97133734a34a850c18ee9447966ed8cdae8bbf72b98ebd2703a7cadf53b8991ef5eb3047d871242e990a4b7baf00eda8ca5f5f7dda35

  • C:\Users\Admin\AppData\Local\Temp\1000023001\FirstZ.exe
    Filesize

    2.3MB

    MD5

    d32184f37d747e0422b5afde5e530ef0

    SHA1

    6ca4539d15cfb4af43d5dbd52a65ef50b0aa4dc2

    SHA256

    95e7a62779c57e46a5ec968dc9612c3ca1c58b98742418c39c8525ae8644d36f

    SHA512

    d9205bca35f6b3a68febdaaa0c03b1309c0131b6b13c2957ccb98c809bd3551264b2cf0784aca2a728093cffd13af98959f57978cafc432efbdd394d7f61d784

  • C:\Users\Admin\AppData\Local\Temp\1000064001\NewLatest.exe
    Filesize

    415KB

    MD5

    07101cac5b9477ba636cd8ca7b9932cb

    SHA1

    59ea7fd9ae6ded8c1b7240a4bf9399b4eb3849f1

    SHA256

    488385cd54d14790b03fa7c7dc997ebea3f7b2a8499e5927eb437a3791102a77

    SHA512

    02240ff51a74966bc31cfcc901105096eb871f588efaa9be1a829b4ee6f245bd9dca37be7e2946ba6315feea75c3dce5f490847250e62081445cd25b0f406887

  • C:\Users\Admin\AppData\Local\Temp\1000110001\123.exe
    Filesize

    128KB

    MD5

    fe3417de54d944903bf539b09f2821be

    SHA1

    e173b089317a29313c3f2df1fcbcf2acc42ed3c7

    SHA256

    645f9f07b7754a2cf7e3245aea942c8a2084f50d765a177604839d6d55567463

    SHA512

    2d4dcac4a35933a95bc6381927a1b7e250a697f8ae59e0bde82b18849e5fc3c24411991bfd507525562e104a8951ae011f8791dcf2c321be03b4593e54e639b3

  • C:\Users\Admin\AppData\Local\Temp\1000111001\streamer.exe
    Filesize

    2.5MB

    MD5

    50c426f26e157d9b3b9ae3716239aa27

    SHA1

    b5033f2f676e070aa874582cf4715480a9bc71f4

    SHA256

    ddc952ef4e9725d11b2d40dc9e3a8413eb74958c22d9a70ec2d15b653e2c3225

    SHA512

    dee61dae15b193d2b39019521ef098deb586a7d4e12689cb2b69c5ade7fc243daae6c093c6dc9273e8e1ef8ad87ad601a693dd6dff2bd591e281288bc279fd8b

  • C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe
    Filesize

    1.8MB

    MD5

    b140d0e0a9bfb0c0be35c9c605d046c1

    SHA1

    f82a8c33fa2dbf8fc327be0dfd764660252d1d74

    SHA256

    67772e72ea6536254aef5687a6eec2ac0337c81698239e8fbc109b953790be76

    SHA512

    f2f25b3fbe54ee18f89e825dd34ce7728873d4847e2882886a7d6f8c6dd0e0c7887263900b954abdd853935b01ecaad94a04dffad61940b402d94d859c96bf1f

  • C:\Users\Admin\AppData\Local\Temp\Tar8BB3.tmp
    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2240-5-0x0000000000930000-0x0000000000E02000-memory.dmp
    Filesize

    4.8MB

  • memory/2240-0-0x0000000000930000-0x0000000000E02000-memory.dmp
    Filesize

    4.8MB

  • memory/2240-15-0x0000000000930000-0x0000000000E02000-memory.dmp
    Filesize

    4.8MB

  • memory/2240-3-0x0000000000930000-0x0000000000E02000-memory.dmp
    Filesize

    4.8MB

  • memory/2240-2-0x0000000000931000-0x000000000095F000-memory.dmp
    Filesize

    184KB

  • memory/2240-1-0x0000000077810000-0x0000000077812000-memory.dmp
    Filesize

    8KB

  • memory/2380-264-0x0000000000400000-0x000000000236B000-memory.dmp
    Filesize

    31.4MB

  • memory/2692-29-0x0000000000940000-0x0000000000E12000-memory.dmp
    Filesize

    4.8MB

  • memory/2692-509-0x0000000000940000-0x0000000000E12000-memory.dmp
    Filesize

    4.8MB

  • memory/2692-229-0x0000000000940000-0x0000000000E12000-memory.dmp
    Filesize

    4.8MB

  • memory/2692-203-0x0000000000940000-0x0000000000E12000-memory.dmp
    Filesize

    4.8MB

  • memory/2692-244-0x0000000000940000-0x0000000000E12000-memory.dmp
    Filesize

    4.8MB

  • memory/2692-245-0x0000000000940000-0x0000000000E12000-memory.dmp
    Filesize

    4.8MB

  • memory/2692-246-0x0000000000940000-0x0000000000E12000-memory.dmp
    Filesize

    4.8MB

  • memory/2692-142-0x0000000000940000-0x0000000000E12000-memory.dmp
    Filesize

    4.8MB

  • memory/2692-81-0x0000000000940000-0x0000000000E12000-memory.dmp
    Filesize

    4.8MB

  • memory/2692-265-0x0000000000940000-0x0000000000E12000-memory.dmp
    Filesize

    4.8MB

  • memory/2692-266-0x0000000000940000-0x0000000000E12000-memory.dmp
    Filesize

    4.8MB

  • memory/2692-30-0x0000000000940000-0x0000000000E12000-memory.dmp
    Filesize

    4.8MB

  • memory/2692-21-0x0000000000940000-0x0000000000E12000-memory.dmp
    Filesize

    4.8MB

  • memory/2692-287-0x0000000000940000-0x0000000000E12000-memory.dmp
    Filesize

    4.8MB

  • memory/2692-20-0x0000000000940000-0x0000000000E12000-memory.dmp
    Filesize

    4.8MB

  • memory/2692-18-0x0000000000940000-0x0000000000E12000-memory.dmp
    Filesize

    4.8MB

  • memory/2692-496-0x0000000000940000-0x0000000000E12000-memory.dmp
    Filesize

    4.8MB

  • memory/2692-204-0x0000000000940000-0x0000000000E12000-memory.dmp
    Filesize

    4.8MB

  • memory/2692-510-0x0000000000940000-0x0000000000E12000-memory.dmp
    Filesize

    4.8MB

  • memory/2692-511-0x0000000000940000-0x0000000000E12000-memory.dmp
    Filesize

    4.8MB

  • memory/2692-512-0x0000000000940000-0x0000000000E12000-memory.dmp
    Filesize

    4.8MB

  • memory/2692-17-0x0000000000941000-0x000000000096F000-memory.dmp
    Filesize

    184KB

  • memory/2692-523-0x0000000000940000-0x0000000000E12000-memory.dmp
    Filesize

    4.8MB

  • memory/2692-524-0x0000000000940000-0x0000000000E12000-memory.dmp
    Filesize

    4.8MB

  • memory/2692-525-0x0000000000940000-0x0000000000E12000-memory.dmp
    Filesize

    4.8MB

  • memory/2692-526-0x0000000000940000-0x0000000000E12000-memory.dmp
    Filesize

    4.8MB

  • memory/2692-527-0x0000000000940000-0x0000000000E12000-memory.dmp
    Filesize

    4.8MB

  • memory/2692-528-0x0000000000940000-0x0000000000E12000-memory.dmp
    Filesize

    4.8MB

  • memory/2692-529-0x0000000000940000-0x0000000000E12000-memory.dmp
    Filesize

    4.8MB

  • memory/2692-530-0x0000000000940000-0x0000000000E12000-memory.dmp
    Filesize

    4.8MB

  • memory/2692-16-0x0000000000940000-0x0000000000E12000-memory.dmp
    Filesize

    4.8MB

  • memory/2692-542-0x0000000000940000-0x0000000000E12000-memory.dmp
    Filesize

    4.8MB

  • memory/2692-543-0x0000000000940000-0x0000000000E12000-memory.dmp
    Filesize

    4.8MB

  • memory/2692-544-0x0000000000940000-0x0000000000E12000-memory.dmp
    Filesize

    4.8MB

  • memory/2692-545-0x0000000000940000-0x0000000000E12000-memory.dmp
    Filesize

    4.8MB