Threat name:
000Stealer, Amadey, Glupteba, PrivateLoa
Alert
Classification:
troj.adwa.spyw.evad
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Creates an autostart registry key pointing to binary in C:\Windows
Creates an undocumented autostart registry key
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Drops PE files with benign system names
Found C&C like URL pattern
Found hidden mapped module (file has been removed from disk)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May check the online IP address of the machine
Modifies Group Policy settings
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for dropped file
PE file contains section with special chars
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Stop multiple services
Snort IDS alert for network traffic
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected PrivateLoader
Yara detected SmokeLoader
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1301082
Sample:
file.exe
Startdate:
31/08/2023
Architecture:
WINDOWS
Score:
100
143
Snort IDS alert for
network traffic
2->143
145
Found malware configuration
2->145
147
Malicious sample detected
(through community Yara
rule)
2->147
149
25 other signatures
2->149
12
file.exe
10
27
2->12
started
17
powershell.exe
19
2->17
started
19
svchost.exe
2->19
started
21
oneetx.exe
2->21
started
process3
dnsIp4
137
45.15.156.229, 49720, 80
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
12->137
139
45.9.74.80, 49729, 49730, 49740
FIRST-SERVER-EU-ASRU
Russian Federation
12->139
141
7 other IPs or domains
12->141
117
C:\Users\...\XEnqSE7jwF_pZyIf2zG_t2QG.exe, PE32
12->117
dropped
119
C:\Users\...\UoL5NWbbGwQBf76qXx3oYYeB.exe, PE32+
12->119
dropped
121
C:\Users\...\UOeXcSMGsFvW8JIteKDIEg0V.exe, PE32
12->121
dropped
123
2 other malicious files
12->123
dropped
203
May check the online
IP address of the machine
12->203
205
Creates HTML files with
.exe extension (expired
dropper behavior)
12->205
207
Disables Windows Defender
(deletes autostart)
12->207
209
2 other signatures
12->209
23
XEnqSE7jwF_pZyIf2zG_t2QG.exe
3
12->23
started
26
UOeXcSMGsFvW8JIteKDIEg0V.exe
1
12->26
started
30
UoL5NWbbGwQBf76qXx3oYYeB.exe
1
12->30
started
32
conhost.exe
17->32
started
file5
signatures6
process7
dnsIp8
97
C:\Users\user\AppData\Local\...\newplayer.exe, PE32
23->97
dropped
99
C:\Users\user\AppData\Local\...\a5718b57.exe, PE32
23->99
dropped
34
newplayer.exe
3
23->34
started
38
a5718b57.exe
23->38
started
135
185.149.146.217
FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU
Russian Federation
26->135
187
Query firmware table
information (likely
to detect VMs)
26->187
189
Found many strings related
to Crypto-Wallets (likely
being stolen)
26->189
191
Tries to harvest and
steal ftp login credentials
26->191
199
4 other signatures
26->199
101
C:\Users\user\AppData\...\bqnbpfosjipw.tmp, PE32+
30->101
dropped
103
C:\Windows\System32\drivers\etc\hosts, ASCII
30->103
dropped
193
Suspicious powershell
command line found
30->193
195
Writes to foreign memory
regions
30->195
197
Modifies the context
of a thread in another
process (thread injection)
30->197
201
3 other signatures
30->201
file9
signatures10
process11
file12
93
C:\Users\user\AppData\Local\...\oneetx.exe, PE32
34->93
dropped
157
Antivirus detection
for dropped file
34->157
159
Multi AV Scanner detection
for dropped file
34->159
161
Machine Learning detection
for dropped file
34->161
40
oneetx.exe
34->40
started
163
Detected unpacking (changes
PE section rights)
38->163
165
Checks for kernel code
integrity (NtQuerySystemInformation(CodeIntegrityInformation))
38->165
167
Maps a DLL or memory
area into another process
38->167
169
2 other signatures
38->169
45
explorer.exe
38->45
injected
signatures13
process14
dnsIp15
125
79.137.192.18, 49743, 80
PSKSET-ASRU
Russian Federation
40->125
127
192.168.2.1
unknown
unknown
40->127
105
C:\Users\user\AppData\Local\...\latestX.exe, PE32+
40->105
dropped
107
C:\...\31839b57a4f11171d6abc8bbc4451ee4.exe, PE32
40->107
dropped
109
C:\Users\user\AppData\Local\...\toolspub2.exe, PE32
40->109
dropped
115
3 other malicious files
40->115
dropped
171
Antivirus detection
for dropped file
40->171
173
Multi AV Scanner detection
for dropped file
40->173
175
Creates an undocumented
autostart registry key
40->175
183
2 other signatures
40->183
47
31839b57a4f11171d6abc8bbc4451ee4.exe
40->47
started
50
toolspub2.exe
40->50
started
52
latestX.exe
40->52
started
61
2 other processes
40->61
129
shsplatform.co.uk
80.66.203.53
UKFASTGB
United Kingdom
45->129
131
190.139.250.133
TelecomArgentinaSAAR
Argentina
45->131
133
3 other IPs or domains
45->133
111
C:\Users\user\AppData\Roaming\cjgcdcg, PE32
45->111
dropped
113
C:\Users\user\AppData\Local\Temp\7CDF.exe, PE32
45->113
dropped
177
System process connects
to network (likely due
to code injection or
exploit)
45->177
179
Benign windows process
drops PE files
45->179
181
Suspicious powershell
command line found
45->181
185
2 other signatures
45->185
55
dialer.exe
45->55
started
57
cmd.exe
45->57
started
59
cmd.exe
45->59
started
63
3 other processes
45->63
file16
signatures17
process18
file19
211
Multi AV Scanner detection
for dropped file
47->211
213
Detected unpacking (changes
PE section rights)
47->213
215
Detected unpacking (overwrites
its own PE header)
47->215
217
Drops PE files with
benign system names
47->217
65
31839b57a4f11171d6abc8bbc4451ee4.exe
47->65
started
69
powershell.exe
47->69
started
219
Machine Learning detection
for dropped file
50->219
221
Injects a PE file into
a foreign processes
50->221
71
toolspub2.exe
50->71
started
95
C:\Program Filesbehaviorgraphoogle\Chrome\updater.exe, PE32+
52->95
dropped
223
Adds a directory exclusion
to Windows Defender
52->223
225
Injects code into the
Windows Explorer (explorer.exe)
55->225
227
Writes to foreign memory
regions
55->227
229
Allocates memory in
foreign processes
55->229
231
Creates a thread in
another existing process
(thread injection)
55->231
73
lsass.exe
55->73
injected
75
4 other processes
55->75
233
Uses powercfg.exe to
modify the power settings
57->233
235
Modifies power options
to not sleep / hibernate
57->235
77
6 other processes
57->77
79
5 other processes
59->79
81
8 other processes
61->81
83
5 other processes
63->83
signatures20
process21
file22
91
C:\Windows\rss\csrss.exe, PE32
65->91
dropped
151
Creates an autostart
registry key pointing
to binary in C:\Windows
65->151
85
powershell.exe
65->85
started
87
conhost.exe
69->87
started
153
Injects code into the
Windows Explorer (explorer.exe)
73->153
155
Writes to foreign memory
regions
73->155
signatures23
process24
process25
89
conhost.exe
85->89
started
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.