Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-07-2024 02:09

General

  • Target

    e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0.exe

  • Size

    1.9MB

  • MD5

    5ad5e4f1f3126c5d6cfdbfbbe5597c84

  • SHA1

    47b46cbe987e0e33c9d23f4c6cc304d116e5e80f

  • SHA256

    e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0

  • SHA512

    8c58379f3107cc67944d003df964f123848c9e7b55edbda3d256915cbbf666fa62e8878bb0c091c84e0057fe5097fef8e3eb49f2382519dc4a06f31a4c37b163

  • SSDEEP

    49152:izPvPgeS5GaqaHrxCTZtEsO/kLMUunFvGA0WyUAD:YfgbNHrxCTkRWunZRyUA

Malware Config

Extracted

Family

amadey

Version

8254624243

Botnet

e76b71

C2

http://77.91.77.81

Attributes
  • install_dir

    8254624243

  • install_file

    axplong.exe

  • strings_key

    90049e51fabf09df0d6748e0b271922e

  • url_paths

    /Kiru9gu/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Identifies Wine through registry keys 2 TTPs 4 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0.exe
    "C:\Users\Admin\AppData\Local\Temp\e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:568
    • C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe
      "C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3004
      • C:\Users\Admin\AppData\Local\Temp\1000149001\ZharkBOT.exe
        "C:\Users\Admin\AppData\Local\Temp\1000149001\ZharkBOT.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4948
        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath $env:UserProfile
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4056
        • C:\Program Files (x86)\Windows Mail\wab.exe
          "C:\Program Files (x86)\Windows Mail\wab.exe"
          4⤵
            PID:3704
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4048 --field-trial-handle=3060,i,1774866140584649235,8085848018931772189,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:2144
      • C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe
        C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe
        1⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:3864
      • C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe
        C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe
        1⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:4976

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Execution

      Command and Scripting Interpreter

      1
      T1059

      PowerShell

      1
      T1059.001

      Defense Evasion

      Virtualization/Sandbox Evasion

      2
      T1497

      Discovery

      Query Registry

      4
      T1012

      Virtualization/Sandbox Evasion

      2
      T1497

      System Information Discovery

      3
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\1000149001\ZharkBOT.exe
        Filesize

        2.9MB

        MD5

        80958a4b85453f4df82ec131554a5412

        SHA1

        44cefe96467895934ec9d1c2461036704c971458

        SHA256

        70afebe71346475e1f6d4a1c591f920f7ed1d055261eb5d6a4276831aef77783

        SHA512

        cab01e1d63b4ff9a8d35c48fddd18b0959068510b1ca0e66997ed2d59a34b8903f23d3b3736180b52130a325eda3665f9babe2dcad91308f16526e8812fee1c8

      • C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe
        Filesize

        1.9MB

        MD5

        5ad5e4f1f3126c5d6cfdbfbbe5597c84

        SHA1

        47b46cbe987e0e33c9d23f4c6cc304d116e5e80f

        SHA256

        e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0

        SHA512

        8c58379f3107cc67944d003df964f123848c9e7b55edbda3d256915cbbf666fa62e8878bb0c091c84e0057fe5097fef8e3eb49f2382519dc4a06f31a4c37b163

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wmvd3sdw.ii2.ps1
        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • memory/568-1-0x0000000077834000-0x0000000077836000-memory.dmp
        Filesize

        8KB

      • memory/568-2-0x0000000000F71000-0x0000000000F9F000-memory.dmp
        Filesize

        184KB

      • memory/568-3-0x0000000000F70000-0x0000000001448000-memory.dmp
        Filesize

        4.8MB

      • memory/568-4-0x0000000000F70000-0x0000000001448000-memory.dmp
        Filesize

        4.8MB

      • memory/568-15-0x0000000000F70000-0x0000000001448000-memory.dmp
        Filesize

        4.8MB

      • memory/568-0-0x0000000000F70000-0x0000000001448000-memory.dmp
        Filesize

        4.8MB

      • memory/3004-72-0x0000000000E90000-0x0000000001368000-memory.dmp
        Filesize

        4.8MB

      • memory/3004-77-0x0000000000E90000-0x0000000001368000-memory.dmp
        Filesize

        4.8MB

      • memory/3004-20-0x0000000000E90000-0x0000000001368000-memory.dmp
        Filesize

        4.8MB

      • memory/3004-19-0x0000000000E90000-0x0000000001368000-memory.dmp
        Filesize

        4.8MB

      • memory/3004-91-0x0000000000E90000-0x0000000001368000-memory.dmp
        Filesize

        4.8MB

      • memory/3004-90-0x0000000000E90000-0x0000000001368000-memory.dmp
        Filesize

        4.8MB

      • memory/3004-89-0x0000000000E90000-0x0000000001368000-memory.dmp
        Filesize

        4.8MB

      • memory/3004-62-0x0000000000E90000-0x0000000001368000-memory.dmp
        Filesize

        4.8MB

      • memory/3004-71-0x0000000000E90000-0x0000000001368000-memory.dmp
        Filesize

        4.8MB

      • memory/3004-18-0x0000000000E90000-0x0000000001368000-memory.dmp
        Filesize

        4.8MB

      • memory/3004-73-0x0000000000E90000-0x0000000001368000-memory.dmp
        Filesize

        4.8MB

      • memory/3004-74-0x0000000000E90000-0x0000000001368000-memory.dmp
        Filesize

        4.8MB

      • memory/3004-75-0x0000000000E90000-0x0000000001368000-memory.dmp
        Filesize

        4.8MB

      • memory/3004-21-0x0000000000E90000-0x0000000001368000-memory.dmp
        Filesize

        4.8MB

      • memory/3004-85-0x0000000000E90000-0x0000000001368000-memory.dmp
        Filesize

        4.8MB

      • memory/3004-84-0x0000000000E90000-0x0000000001368000-memory.dmp
        Filesize

        4.8MB

      • memory/3004-80-0x0000000000E90000-0x0000000001368000-memory.dmp
        Filesize

        4.8MB

      • memory/3004-81-0x0000000000E90000-0x0000000001368000-memory.dmp
        Filesize

        4.8MB

      • memory/3004-82-0x0000000000E90000-0x0000000001368000-memory.dmp
        Filesize

        4.8MB

      • memory/3004-83-0x0000000000E90000-0x0000000001368000-memory.dmp
        Filesize

        4.8MB

      • memory/3704-61-0x0000000000400000-0x00000000004D6000-memory.dmp
        Filesize

        856KB

      • memory/3704-60-0x0000000000400000-0x00000000004D6000-memory.dmp
        Filesize

        856KB

      • memory/3864-79-0x0000000000E90000-0x0000000001368000-memory.dmp
        Filesize

        4.8MB

      • memory/3864-78-0x0000000000E90000-0x0000000001368000-memory.dmp
        Filesize

        4.8MB

      • memory/4056-55-0x0000013E4C530000-0x0000013E4C552000-memory.dmp
        Filesize

        136KB

      • memory/4976-87-0x0000000000E90000-0x0000000001368000-memory.dmp
        Filesize

        4.8MB

      • memory/4976-88-0x0000000000E90000-0x0000000001368000-memory.dmp
        Filesize

        4.8MB