Threat name:
Amadey, DarkTortilla, RedLine, XWorm
Alert
Classification:
troj.spyw.expl.evad
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to inject code into remote processes
Creates an undocumented autostart registry key
Creates HTML files with .exe extension (expired dropper behavior)
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Drops PE files to the user root directory
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Potentially malicious time measurement code found
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected DarkTortilla Crypter
Yara detected Generic Downloader
Yara detected Powershell download and execute
Yara detected RedLine Stealer
Yara detected UAC Bypass using CMSTP
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1490209
Sample:
SecuriteInfo.com.Win32.Troj...
Startdate:
08/08/2024
Architecture:
WINDOWS
Score:
100
187
Found malware configuration
2->187
189
Malicious sample detected
(through community Yara
rule)
2->189
191
Antivirus detection
for URL or domain
2->191
193
25 other signatures
2->193
12
Cerker.exe
9
2->12
started
16
axplong.exe
2->16
started
19
SecuriteInfo.com.Win32.TrojanX-gen.2935.18945.exe
1
4
2->19
started
21
9 other processes
2->21
process3
dnsIp4
141
185.215.113.16
WHOLESALECONNECTIONSNL
Portugal
12->141
143
185.216.214.225
SERVERDISCOUNTERserverdiscountercomDE
Germany
12->143
145
188.114.97.3
CLOUDFLARENETUS
European Union
12->145
109
C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe, PE32
12->109
dropped
111
C:\ProgramData\FRaqbC8wSA1XvpFVjCRGryWt.exe, PE32
12->111
dropped
23
FRaqbC8wSA1XvpFVjCRGryWt.exe
3
12->23
started
26
IIZS2TRqf69aZbLAX3cf3edn.exe
15
6
12->26
started
30
schtasks.exe
1
12->30
started
147
185.196.11.123
SIMPLECARRIERCH
Switzerland
16->147
113
C:\Users\user\AppData\Local\...\MYNEWRDX.exe, PE32
16->113
dropped
115
C:\Users\user\AppData\Local\...\FILE2233.exe, PE32+
16->115
dropped
117
C:\Users\user\AppData\...\stealc_default.exe, PE32
16->117
dropped
123
11 other malicious files
16->123
dropped
149
Hides threads from debuggers
16->149
151
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
16->151
153
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
16->153
119
C:\Users\user\AppData\Local\...\Cerker.exe, PE32
19->119
dropped
121
C:\Users\user\...\Cerker.exe:Zone.Identifier, ASCII
19->121
dropped
155
Creates an undocumented
autostart registry key
19->155
157
Creates multiple autostart
registry keys
19->157
159
Contains functionality
to inject code into
remote processes
19->159
161
Uses schtasks.exe or
at.exe to add and modify
task schedules
19->161
32
Cerker.exe
19->32
started
34
schtasks.exe
1
19->34
started
163
Multi AV Scanner detection
for dropped file
21->163
165
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
21->165
167
Hides that the sample
has been downloaded
from the Internet (zone.identifier)
21->167
169
Injects a PE file into
a foreign processes
21->169
36
ednfosi.exe
21->36
started
38
ednfosi.exe
21->38
started
40
ednfosi.exe
21->40
started
file5
signatures6
process7
dnsIp8
199
Machine Learning detection
for dropped file
23->199
201
Hides that the sample
has been downloaded
from the Internet (zone.identifier)
23->201
203
Injects a PE file into
a foreign processes
23->203
42
FRaqbC8wSA1XvpFVjCRGryWt.exe
23->42
started
45
FRaqbC8wSA1XvpFVjCRGryWt.exe
23->45
started
133
208.95.112.1
TUT-ASUS
United States
26->133
99
C:\Users\user\Windows.exe, PE32
26->99
dropped
205
Antivirus detection
for dropped file
26->205
207
Multi AV Scanner detection
for dropped file
26->207
209
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
26->209
215
3 other signatures
26->215
47
schtasks.exe
26->47
started
49
conhost.exe
30->49
started
211
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
32->211
213
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
32->213
51
conhost.exe
34->51
started
file9
signatures10
process11
file12
97
C:\Users\user\AppData\Local\...\ednfosi.exe, PE32
42->97
dropped
53
ednfosi.exe
42->53
started
56
conhost.exe
47->56
started
process13
signatures14
195
Hides that the sample
has been downloaded
from the Internet (zone.identifier)
53->195
197
Injects a PE file into
a foreign processes
53->197
58
ednfosi.exe
53->58
started
62
ednfosi.exe
53->62
started
process15
dnsIp16
135
185.208.158.115
SIMPLECARRER2IT
Switzerland
58->135
137
140.82.121.3
GITHUBUS
United States
58->137
139
185.199.110.133
FASTLYUS
Netherlands
58->139
101
C:\Users\user\AppData\Local\...\file3333.exe, PE32+
58->101
dropped
103
C:\Users\user\AppData\Local\...\kitty.exe, PE32
58->103
dropped
105
C:\Users\user\AppData\...\7694d27252.exe, PE32
58->105
dropped
107
3 other malicious files
58->107
dropped
64
file3333.exe
58->64
started
67
7694d27252.exe
58->67
started
70
kitty.exe
58->70
started
file17
process18
file19
171
Multi AV Scanner detection
for dropped file
64->171
173
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
64->173
175
Writes to foreign memory
regions
64->175
183
3 other signatures
64->183
72
RegSvcs.exe
64->72
started
77
powershell.exe
64->77
started
79
WerFault.exe
64->79
started
83
2 other processes
64->83
87
C:\Users\user\AppData\Local\...\axplong.exe, PE32
67->87
dropped
177
Antivirus detection
for dropped file
67->177
179
Detected unpacking (changes
PE section rights)
67->179
181
Machine Learning detection
for dropped file
67->181
185
6 other signatures
67->185
81
axplong.exe
67->81
started
signatures20
process21
dnsIp22
125
147.45.60.44
FREE-NET-ASFREEnetEU
Russian Federation
72->125
127
104.20.3.235
CLOUDFLARENETUS
United States
72->127
131
4 other IPs or domains
72->131
89
C:\Users\...\yyFfx6AhV88RLEAxPS6Uuxgq.exe, PE32
72->89
dropped
91
C:\Users\...\oHniPZfEkC9KZdgLhKykZwrZ.exe, PE32
72->91
dropped
93
C:\Users\...\hRmCs7VepTbNcl0Ov7O1JmhR.exe, PE32
72->93
dropped
95
14 other malicious files
72->95
dropped
217
Creates HTML files with
.exe extension (expired
dropper behavior)
72->217
219
Loading BitLocker PowerShell
Module
77->219
85
conhost.exe
77->85
started
129
20.189.173.21
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
79->129
221
Detected unpacking (changes
PE section rights)
81->221
223
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
81->223
225
Tries to evade debugger
and weak emulator (self
modifying code)
81->225
227
3 other signatures
81->227
file23
signatures24
process25
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.