Threat name:
Amadey, RisePro Stealer
Alert
Classification:
phis.troj.spyw.evad
.NET source code contains very large array initializations
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to check for running processes (XOR)
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Found API chain indicative of sandbox detection
Found evasive API chain (may stop execution after checking volume information)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found stalling execution ending in API Sleep call
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Sample uses string decryption to hide its real strings
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Sigma detected: Capture Wi-Fi password
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal WLAN passwords
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Uses known network protocols on non-standard ports
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected RisePro Stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1408896
Sample:
Rprin5xkan.exe
Startdate:
14/03/2024
Architecture:
WINDOWS
Score:
100
99
ipinfo.io
2->99
101
db-ip.com
2->101
121
Snort IDS alert for
network traffic
2->121
123
Multi AV Scanner detection
for domain / URL
2->123
125
Found malware configuration
2->125
127
16 other signatures
2->127
13
Rprin5xkan.exe
2
2->13
started
16
MSIUpdaterV131.exe
2->16
started
18
AdobeUpdaterV131.exe
2->18
started
20
13 other processes
2->20
signatures3
process4
signatures5
161
Contains functionality
to inject code into
remote processes
13->161
163
Writes to foreign memory
regions
13->163
165
Allocates memory in
foreign processes
13->165
167
Injects a PE file into
a foreign processes
13->167
22
RegAsm.exe
3
91
13->22
started
27
conhost.exe
13->27
started
169
Antivirus detection
for dropped file
16->169
171
Multi AV Scanner detection
for dropped file
16->171
173
Detected unpacking (changes
PE section rights)
16->173
175
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
16->175
177
Machine Learning detection
for dropped file
18->177
179
Tries to evade debugger
and weak emulator (self
modifying code)
18->179
181
Hides threads from debuggers
18->181
183
Found evasive API chain
(may stop execution
after checking volume
information)
20->183
185
2 other signatures
20->185
29
conhost.exe
20->29
started
31
conhost.exe
20->31
started
33
conhost.exe
20->33
started
35
conhost.exe
20->35
started
process6
dnsIp7
103
193.233.132.62, 49717, 49718, 49720
FREE-NET-ASFREEnetEU
Russian Federation
22->103
105
193.233.132.74, 49706, 50500
FREE-NET-ASFREEnetEU
Russian Federation
22->105
107
3 other IPs or domains
22->107
91
C:\Users\user\...\fhXikZ0A_k655zia4RdG.exe, PE32
22->91
dropped
93
C:\Users\user\...\AShTAMK9jAGv6NKXopMm.exe, PE32
22->93
dropped
95
C:\Users\user\AppData\Local\...dgeMS131.exe, PE32
22->95
dropped
97
10 other files (8 malicious)
22->97
dropped
153
Contains functionality
to check for running
processes (XOR)
22->153
155
Tries to steal Mail
credentials (via file
/ registry access)
22->155
157
Found stalling execution
ending in API Sleep
call
22->157
159
6 other signatures
22->159
37
AShTAMK9jAGv6NKXopMm.exe
22->37
started
41
fhXikZ0A_k655zia4RdG.exe
2
22->41
started
43
schtasks.exe
1
22->43
started
45
5 other processes
22->45
file8
signatures9
process10
file11
87
C:\Users\user\AppData\Local\...\explorha.exe, PE32
37->87
dropped
137
Antivirus detection
for dropped file
37->137
139
Multi AV Scanner detection
for dropped file
37->139
141
Detected unpacking (changes
PE section rights)
37->141
151
3 other signatures
37->151
47
explorha.exe
37->47
started
143
Machine Learning detection
for dropped file
41->143
145
Found evasive API chain
(may stop execution
after checking volume
information)
41->145
147
Tries to evade debugger
and weak emulator (self
modifying code)
41->147
149
Tries to detect virtualization
through RDTSC time measurements
41->149
52
conhost.exe
43->52
started
54
conhost.exe
45->54
started
56
conhost.exe
45->56
started
58
conhost.exe
45->58
started
60
2 other processes
45->60
signatures12
process13
dnsIp14
109
193.233.132.56, 49734, 49735, 49736
FREE-NET-ASFREEnetEU
Russian Federation
47->109
79
C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+
47->79
dropped
81
C:\Users\user\AppData\Roaming\...\clip64.dll, PE32
47->81
dropped
83
C:\Users\user\AppData\Local\...\clip64[1].dll, PE32
47->83
dropped
85
C:\Users\user\AppData\Local\...\cred64[1].dll, PE32+
47->85
dropped
113
Antivirus detection
for dropped file
47->113
115
Multi AV Scanner detection
for dropped file
47->115
117
Detected unpacking (changes
PE section rights)
47->117
119
6 other signatures
47->119
62
rundll32.exe
47->62
started
64
rundll32.exe
47->64
started
file15
signatures16
process17
signatures18
67
rundll32.exe
62->67
started
111
System process connects
to network (likely due
to code injection or
exploit)
64->111
process19
signatures20
129
Tries to steal Instant
Messenger accounts or
passwords
67->129
131
Uses netsh to modify
the Windows network
and firewall settings
67->131
133
Tries to harvest and
steal ftp login credentials
67->133
135
2 other signatures
67->135
70
powershell.exe
67->70
started
73
netsh.exe
67->73
started
process21
file22
89
C:\Users\user\...\246122658369_Desktop.zip, Zip
70->89
dropped
75
conhost.exe
70->75
started
77
conhost.exe
73->77
started
process23
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://147.45.47.101:30495/zidan/frukt.exe