Threat name:
Amadey, Fabookie, Nymaim, RedLine, Smoke
Alert
Classification:
troj.spyw.evad
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Detected VMProtect packer
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Drops PE files to the document folder of the user
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies Group Policy settings
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses cmd line tools excessively to alter registry or file data
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected Costura Assembly Loader
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
839418
Sample:
93112B749D371AD66F0F856A1C0...
Startdate:
02/04/2023
Architecture:
WINDOWS
Score:
100
140
45.12.253.98
CMCSUS
Germany
2->140
174
Multi AV Scanner detection
for domain / URL
2->174
176
Malicious sample detected
(through community Yara
rule)
2->176
178
Antivirus detection
for URL or domain
2->178
180
23 other signatures
2->180
12
93112B749D371AD66F0F856A1C0C93D14F67960C644B6.exe
10
44
2->12
started
17
svchost.exe
2->17
started
19
svchost.exe
2->19
started
21
8 other processes
2->21
signatures3
process4
dnsIp5
160
87.240.132.78
VKONTAKTE-SPB-AShttpvkcomRU
Russian Federation
12->160
162
95.142.206.0
VKONTAKTE-SPB-AShttpvkcomRU
Russian Federation
12->162
166
16 other IPs or domains
12->166
124
C:\Users\...\pAEftml6Z9tsd6ypaHiLn9FQ.exe, PE32
12->124
dropped
126
C:\Users\...\okryAvXYj3P5pSxbI2wiFhOf.exe, PE32
12->126
dropped
128
C:\Users\...\mo8QOfyZ4ywSzIOiEHHgQtZY.exe, PE32
12->128
dropped
130
14 other malicious files
12->130
dropped
222
Creates HTML files with
.exe extension (expired
dropper behavior)
12->222
224
Disables Windows Defender
(deletes autostart)
12->224
226
Modifies Group Policy
settings
12->226
232
2 other signatures
12->232
23
J37ox0IdKUBseQZyy_xSdIUh.exe
12->23
started
26
okryAvXYj3P5pSxbI2wiFhOf.exe
12->26
started
29
hsVSuw2og20BthlHg5oWBE6z.exe
2
12->29
started
35
7 other processes
12->35
31
cmd.exe
17->31
started
33
conhost.exe
17->33
started
228
Changes security center
settings (notifications,
updates, antivirus,
firewall)
19->228
164
192.168.2.1
unknown
unknown
21->164
230
Query firmware table
information (likely
to detect VMs)
21->230
file6
signatures7
process8
dnsIp9
184
Checks for kernel code
integrity (NtQuerySystemInformation(CodeIntegrityInformation))
23->184
186
Maps a DLL or memory
area into another process
23->186
188
Checks if the current
machine is a virtual
machine (disk enumeration)
23->188
190
Creates a thread in
another existing process
(thread injection)
23->190
38
explorer.exe
23->38
injected
110
C:\Windows\Temp\321.exe, PE32
26->110
dropped
112
C:\Windows\Temp\123.exe, PE32
26->112
dropped
43
321.exe
26->43
started
45
123.exe
26->45
started
114
C:\Users\user\AppData\Local\...\is-NF9A5.tmp, PE32
29->114
dropped
47
is-NF9A5.tmp
29->47
started
192
Uses cmd line tools
excessively to alter
registry or file data
31->192
57
2 other processes
31->57
142
185.11.61.125
VERTEX-ASRU
Russian Federation
35->142
144
149.154.167.99
TELEGRAMRU
United Kingdom
35->144
146
7 other IPs or domains
35->146
116
C:\Users\...\FPTlLjG0_Rt6ECOYMewkI3Aa.exe, MS-DOS
35->116
dropped
118
C:\Users\user\AppData\Local\...\kina4477.exe, PE32
35->118
dropped
120
C:\Users\user\AppData\Local\...\ge626508.exe, PE32
35->120
dropped
122
4 other malicious files
35->122
dropped
194
Overwrites code with
unconditional jumps
- possibly settings
hooks in foreign process
35->194
196
Tries to harvest and
steal Putty / WinSCP
information (sessions,
passwords, etc)
35->196
198
Query firmware table
information (likely
to detect VMs)
35->198
200
6 other signatures
35->200
49
kina4477.exe
35->49
started
51
Install.exe
35->51
started
53
AppLaunch.exe
35->53
started
55
conhost.exe
35->55
started
file10
signatures11
process12
dnsIp13
148
123.140.161.243
LGDACOMLGDACOMCorporationKR
Korea Republic of
38->148
150
211.171.233.129
LGDACOMLGDACOMCorporationKR
Korea Republic of
38->150
152
188.114.96.7
CLOUDFLARENETUS
European Union
38->152
88
C:\Users\user\AppData\Roaming\fwiudur, PE32
38->88
dropped
90
C:\Users\user\AppData\Local\Temp\D804.exe, PE32
38->90
dropped
102
6 other malicious files
38->102
dropped
202
System process connects
to network (likely due
to code injection or
exploit)
38->202
204
Benign windows process
drops PE files
38->204
206
Hides that the sample
has been downloaded
from the Internet (zone.identifier)
38->206
59
rundll32.exe
38->59
started
154
127.0.0.1
unknown
unknown
43->154
92
C:\Users\user\AppData\...\DownloadMetadata, PDP-11
43->92
dropped
208
Multi AV Scanner detection
for dropped file
43->208
210
Query firmware table
information (likely
to detect VMs)
43->210
212
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
43->212
214
Tries to harvest and
steal browser information
(history, passwords,
etc)
43->214
156
51.210.161.21
OVHFR
France
45->156
216
Hides threads from debuggers
45->216
218
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
45->218
94
C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+
47->94
dropped
96
C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32
47->96
dropped
104
7 other files (5 malicious)
47->104
dropped
61
FRec42.exe
47->61
started
98
C:\Users\user\AppData\Local\...\kina2967.exe, PE32
49->98
dropped
100
C:\Users\user\AppData\Local\...\en094725.exe, PE32
49->100
dropped
65
kina2967.exe
49->65
started
67
config.exe
51->67
started
158
176.123.9.142
ALEXHOSTMD
Moldova Republic of
53->158
220
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
53->220
file14
signatures15
process16
dnsIp17
168
45.12.253.56
CMCSUS
Germany
61->168
170
45.12.253.72
CMCSUS
Germany
61->170
172
45.12.253.75
CMCSUS
Germany
61->172
132
C:\Users\user\AppData\...\c1BTNdDqaq.exe, PE32
61->132
dropped
69
c1BTNdDqaq.exe
61->69
started
134
C:\Users\user\AppData\Local\...\kina1777.exe, PE32
65->134
dropped
136
C:\Users\user\AppData\Local\...\dBH10s18.exe, PE32
65->136
dropped
72
kina1777.exe
65->72
started
138
C:\Users\user\AppData\Local\...\ilFbciO.exe, PE32
67->138
dropped
75
forfiles.exe
67->75
started
77
forfiles.exe
67->77
started
file18
process19
file20
182
Multi AV Scanner detection
for dropped file
69->182
106
C:\Users\user\AppData\Local\...\cor6838.exe, PE32
72->106
dropped
108
C:\Users\user\AppData\Local\...\bu258299.exe, PE32
72->108
dropped
79
bu258299.exe
72->79
started
82
cmd.exe
75->82
started
84
conhost.exe
75->84
started
signatures21
process22
signatures23
234
Multi AV Scanner detection
for dropped file
79->234
236
Disable Windows Defender
notifications (registry)
79->236
238
Uses cmd line tools
excessively to alter
registry or file data
82->238
86
reg.exe
82->86
started
process24
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.