Threat name:
Amadey, SmokeLoader, Xmrig, onlyLogger
Alert
Classification:
spre.phis.troj.adwa.spyw.expl.evad.mine
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Contains functionality to modify clipboard data
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Creates files in the system32 config directory
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Drops script or batch files to the startup folder
Found hidden mapped module (file has been removed from disk)
Found malware configuration
Infects executable files (exe, dll, sys, html)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Protects its processes via BreakOnTermination flag
Sample is not signed and drops a device driver
Sample uses string decryption to hide its real strings
Sigma detected: Drops script at startup location
Sigma detected: Stop multiple services
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Instant Messenger accounts or passwords
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected Generic Downloader
Yara detected SmokeLoader
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1318650
Sample:
file.exe
Startdate:
03/10/2023
Architecture:
WINDOWS
Score:
100
136
Multi AV Scanner detection
for domain / URL
2->136
138
Found malware configuration
2->138
140
Malicious sample detected
(through community Yara
rule)
2->140
142
18 other signatures
2->142
12
file.exe
1
2->12
started
15
updater.exe
2->15
started
18
cmd.exe
2->18
started
20
5 other processes
2->20
process3
file4
172
Allocates memory in
foreign processes
12->172
174
Adds a directory exclusion
to Windows Defender
12->174
176
Disables UAC (registry)
12->176
22
InstallUtil.exe
15
343
12->22
started
27
InstallUtil.exe
12->27
started
29
powershell.exe
17
12->29
started
118
C:\Windows\Temp\vzfjseeodhka.tmp, PE32+
15->118
dropped
120
C:\Windows\Temp\fpsprjlqcfim.sys, PE32+
15->120
dropped
178
Protects its processes
via BreakOnTermination
flag
15->178
180
Injects code into the
Windows Explorer (explorer.exe)
15->180
182
Writes to foreign memory
regions
15->182
190
3 other signatures
15->190
184
Uses powercfg.exe to
modify the power settings
18->184
186
Modifies power options
to not sleep / hibernate
18->186
31
conhost.exe
18->31
started
33
sc.exe
18->33
started
35
sc.exe
18->35
started
39
3 other processes
18->39
188
Creates files in the
system32 config directory
20->188
37
conhost.exe
20->37
started
41
6 other processes
20->41
signatures5
process6
dnsIp7
126
85.217.144.143
WS171-ASRU
Bulgaria
22->126
128
5.42.64.10
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
22->128
130
28 other IPs or domains
22->130
90
C:\Users\...\zGLVSyr3lieKwWkUrKVibfRf.exe, PE32
22->90
dropped
92
C:\Users\...\yptETVGqfq2qI3hG0DRY8GNG.exe, PE32+
22->92
dropped
94
C:\Users\...\ymwfjfATlQ1x2kcVEIn9cxvy.exe, PE32
22->94
dropped
96
266 other malicious files
22->96
dropped
144
Infects executable files
(exe, dll, sys, html)
22->144
43
UX0P5YlAJlwQd2iTdnUGgRYH.exe
22->43
started
47
H0T8qmc33UYShhnAc4Hi7ByG.exe
22->47
started
49
ajPURNrTju7klgxDAuGVGGah.exe
22->49
started
53
7 other processes
22->53
146
Drops script or batch
files to the startup
folder
27->146
148
Creates HTML files with
.exe extension (expired
dropper behavior)
27->148
51
conhost.exe
29->51
started
file8
signatures9
process10
dnsIp11
106
C:\Users\user\AppData\Local\...\nhdues.exe, PE32
43->106
dropped
192
Contains functionality
to inject code into
remote processes
43->192
56
nhdues.exe
43->56
started
194
Detected unpacking (changes
PE section rights)
47->194
196
Injects a PE file into
a foreign processes
47->196
61
H0T8qmc33UYShhnAc4Hi7ByG.exe
47->61
started
108
C:\Program Filesbehaviorgraphoogle\Chrome\updater.exe, PE32+
49->108
dropped
110
C:\Windows\System32\drivers\etc\hosts, ASCII
49->110
dropped
198
Modifies the hosts file
49->198
200
Adds a directory exclusion
to Windows Defender
49->200
122
142.250.31.132
GOOGLEUS
United States
53->122
124
172.253.63.102
GOOGLEUS
United States
53->124
112
C:\Users\user\AppData\...\9582477640.exe, PE32
53->112
dropped
114
C:\Users\user\AppData\Local\...\s51[1], PE32
53->114
dropped
116
C:\Users\user\AppData\Local\...\s51[1], PE32
53->116
dropped
file12
signatures13
process14
dnsIp15
132
193.42.32.29
EENET-ASEE
Germany
56->132
98
C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+
56->98
dropped
100
C:\Users\user\AppData\Roaming\...\clip64.dll, PE32
56->100
dropped
102
C:\Users\user\AppData\Local\...\cred64[1].dll, PE32+
56->102
dropped
104
C:\Users\user\AppData\Local\...\clip64[1].dll, PE32
56->104
dropped
158
Multi AV Scanner detection
for dropped file
56->158
160
Creates an undocumented
autostart registry key
56->160
162
Uses schtasks.exe or
at.exe to add and modify
task schedules
56->162
63
rundll32.exe
56->63
started
66
cmd.exe
56->66
started
68
schtasks.exe
56->68
started
70
rundll32.exe
56->70
started
164
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
61->164
166
Checks for kernel code
integrity (NtQuerySystemInformation(CodeIntegrityInformation))
61->166
168
Maps a DLL or memory
area into another process
61->168
170
2 other signatures
61->170
file16
signatures17
process18
signatures19
202
Contains functionality
to modify clipboard
data
63->202
72
rundll32.exe
63->72
started
76
conhost.exe
66->76
started
78
cmd.exe
66->78
started
80
cacls.exe
66->80
started
84
4 other processes
66->84
82
conhost.exe
68->82
started
process20
dnsIp21
134
109.206.241.33
AWMLTNL
Germany
72->134
150
System process connects
to network (likely due
to code injection or
exploit)
72->150
152
Tries to steal Instant
Messenger accounts or
passwords
72->152
154
Tries to harvest and
steal ftp login credentials
72->154
156
Tries to harvest and
steal browser information
(history, passwords,
etc)
72->156
86
tar.exe
72->86
started
signatures22
process23
process24
88
conhost.exe
86->88
started
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.