Threat name:
Amadey, Fabookie, ManusCrypt, Nymaim, Pr
Alert
Classification:
phis.troj.spyw.evad
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to detect sleep reduction / modifications
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Creates an undocumented autostart registry key
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Detected VMProtect packer
Disable Windows Defender real time protection (registry)
Drops PE files to the document folder of the user
Found C&C like URL pattern
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
PE file has a writeable .text section
Performs DNS queries to domains with low reputation
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Uses an obfuscated file name to hide its real file extension (double extension)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected PrivateLoader
Yara detected Raccoon Stealer v2
Yara detected RedLine Stealer
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
789380
Sample:
sotema_5.txt.exe
Startdate:
23/01/2023
Architecture:
WINDOWS
Score:
100
164
Snort IDS alert for
network traffic
2->164
166
Malicious sample detected
(through community Yara
rule)
2->166
168
Antivirus detection
for URL or domain
2->168
170
21 other signatures
2->170
9
sotema_5.txt.exe
4
39
2->9
started
14
svchost.exe
2->14
started
16
svchost.exe
2->16
started
18
9 other processes
2->18
process3
dnsIp4
158
212.193.30.115, 49702, 49750, 80
SPD-NETTR
Russian Federation
9->158
160
136.144.41.133, 80
WORLDSTREAMNL
Netherlands
9->160
162
14 other IPs or domains
9->162
128
C:\Users\...\x3wY10xhfUiWPNHFDet4k4Ed.exe, PE32
9->128
dropped
130
C:\Users\...\rGWZEVSJUkCwMuiOLxOMwkPm.exe, PE32
9->130
dropped
132
C:\Users\...\qBSsJOyApayVlIeefVLnn2nG.exe, PE32
9->132
dropped
134
13 other malicious files
9->134
dropped
210
Drops PE files to the
document folder of the
user
9->210
212
May check the online
IP address of the machine
9->212
214
Creates HTML files with
.exe extension (expired
dropper behavior)
9->214
228
2 other signatures
9->228
20
W0BGIsF0dejfAEXIWsNr76sH.exe
9->20
started
24
rGWZEVSJUkCwMuiOLxOMwkPm.exe
9->24
started
26
l_piLmH8LZYScCQbSXs3eh4G.exe
9->26
started
32
7 other processes
9->32
216
Contains functionality
to inject threads in
other processes
14->216
218
Contains functionality
to inject code into
remote processes
14->218
220
Contains functionality
to compare user and
computer (likely to
detect sandboxes)
14->220
222
Contains functionality
to detect sleep reduction
/ modifications
14->222
224
Changes security center
settings (notifications,
updates, antivirus,
firewall)
16->224
28
MpCmdRun.exe
16->28
started
226
Query firmware table
information (likely
to detect VMs)
18->226
30
WerFault.exe
18->30
started
file5
signatures6
process7
dnsIp8
90
C:\Users\user\AppData\Local\...\zhangfan.exe, PE32
20->90
dropped
104
2 other malicious files
20->104
dropped
172
Multi AV Scanner detection
for dropped file
20->172
35
birge.exe
20->35
started
40
Player3.exe
20->40
started
92
C:\Windows\Temp\321.exe, PE32
24->92
dropped
94
C:\Windows\Temp\123.exe, PE32
24->94
dropped
42
123.exe
24->42
started
44
321.exe
24->44
started
96
C:\Users\user\AppData\Local\...\nbveek.exe, PE32
26->96
dropped
46
nbveek.exe
26->46
started
48
conhost.exe
28->48
started
136
45.66.159.142
ENZUINC-US
Russian Federation
32->136
138
157.240.253.35
FACEBOOKUS
United States
32->138
140
2 other IPs or domains
32->140
98
C:\Users\user\AppData\...\svcupdater.exe, PE32
32->98
dropped
100
C:\Users\user\AppData\Local\...\yjfkbugv.exe, PE32
32->100
dropped
102
C:\Users\...\qBSsJOyApayVlIeefVLnn2nG.tmp, PE32
32->102
dropped
106
2 other malicious files
32->106
dropped
174
Detected unpacking (changes
PE section rights)
32->174
176
Detected unpacking (overwrites
its own PE header)
32->176
178
Obfuscated command line
found
32->178
180
3 other signatures
32->180
50
qBSsJOyApayVlIeefVLnn2nG.tmp
32->50
started
52
cmd.exe
32->52
started
54
2 other processes
32->54
file9
signatures10
process11
dnsIp12
142
94.131.3.70
NASSIST-ASGI
Ukraine
35->142
144
77.73.134.24
FIBEROPTIXDE
Kazakhstan
35->144
146
77.73.134.35
FIBEROPTIXDE
Kazakhstan
35->146
108
C:\Users\user\AppData\Roaming\OlMj0160.exe, PE32+
35->108
dropped
110
C:\Users\user\AppData\Roaming\200H3qRp.exe, PE32+
35->110
dropped
120
7 other files (5 malicious)
35->120
dropped
182
Overwrites code with
unconditional jumps
- possibly settings
hooks in foreign process
35->182
184
Query firmware table
information (likely
to detect VMs)
35->184
186
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
35->186
200
4 other signatures
35->200
112
C:\Users\user\AppData\Local\...\nbveek.exe, PE32
40->112
dropped
188
Writes to foreign memory
regions
42->188
190
Allocates memory in
foreign processes
42->190
192
Injects a PE file into
a foreign processes
42->192
56
vbc.exe
42->56
started
60
conhost.exe
42->60
started
148
62.204.41.242, 49753, 49754, 49755
TNNET-ASTNNetOyMainnetworkFI
United Kingdom
46->148
114
C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+
46->114
dropped
116
C:\Users\user\AppData\Roaming\...\clip64.dll, PE32
46->116
dropped
122
2 other malicious files
46->122
dropped
194
Multi AV Scanner detection
for dropped file
46->194
196
Creates an undocumented
autostart registry key
46->196
198
Uses schtasks.exe or
at.exe to add and modify
task schedules
46->198
62
rundll32.exe
46->62
started
64
cmd.exe
46->64
started
66
schtasks.exe
46->66
started
68
rundll32.exe
46->68
started
124
9 other files (8 malicious)
50->124
dropped
70
finalrecovery.exe
50->70
started
118
C:\Windows\SysWOW64\...\yjfkbugv.exe (copy), PE32
52->118
dropped
73
conhost.exe
54->73
started
file13
signatures14
process15
dnsIp16
150
51.210.137.6
OVHFR
France
56->150
202
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
56->202
204
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
56->204
206
Tries to harvest and
steal browser information
(history, passwords,
etc)
56->206
208
Tries to steal Crypto
Currency Wallets
56->208
75
rundll32.exe
62->75
started
78
conhost.exe
64->78
started
80
cmd.exe
64->80
started
82
cacls.exe
64->82
started
84
cacls.exe
64->84
started
86
conhost.exe
66->86
started
152
45.12.253.72, 49766, 80
CMCSUS
Germany
70->152
154
45.12.253.56, 49762, 80
CMCSUS
Germany
70->154
156
45.12.253.75, 49768, 80
CMCSUS
Germany
70->156
126
C:\Users\user\AppData\...\Z08S8MlFk8f.exe, PE32
70->126
dropped
88
Z08S8MlFk8f.exe
70->88
started
file17
signatures18
process19
signatures20
230
System process connects
to network (likely due
to code injection or
exploit)
75->230
232
Tries to steal Instant
Messenger accounts or
passwords
75->232
234
Tries to harvest and
steal ftp login credentials
75->234
236
Tries to harvest and
steal browser information
(history, passwords,
etc)
75->236
238
Multi AV Scanner detection
for dropped file
88->238
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.