Threat name:
Amadey, Fabookie, Glupteba, Nymaim, Priv
Alert
Classification:
troj.spyw.expl.evad
.NET source code contains very large strings
.NET source code references suspicious native API functions
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Detected VMProtect packer
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Downloads files with wrong headers with respect to MIME Content-Type
Drops PE files to the document folder of the user
Drops PE files with a suspicious file extension
Found C&C like URL pattern
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May check the online IP address of the machine
Modifies Group Policy settings
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Uses ipconfig to lookup or modify the Windows network settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected PrivateLoader
Yara detected RedLine Stealer
Yara detected UAC Bypass using CMSTP
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
843537
Sample:
fXO5EFgrtQ.exe
Startdate:
08/04/2023
Architecture:
WINDOWS
Score:
100
149
45.12.253.98
CMCSUS
Germany
2->149
151
www.facebook.com
2->151
153
5 other IPs or domains
2->153
183
Snort IDS alert for
network traffic
2->183
185
Multi AV Scanner detection
for domain / URL
2->185
187
Malicious sample detected
(through community Yara
rule)
2->187
189
32 other signatures
2->189
11
fXO5EFgrtQ.exe
19
2->11
started
16
PowerControl_Svc.exe
16
2->16
started
18
svchost.exe
2->18
started
20
11 other processes
2->20
signatures3
process4
dnsIp5
177
94.142.138.113, 49707, 80
IHOR-ASRU
Russian Federation
11->177
179
telegram.org
149.154.167.99, 443, 49706
TELEGRAMRU
United Kingdom
11->179
181
2 other IPs or domains
11->181
131
C:\Users\...\1bKk2Cz3atMMUnJwr6483NNM.exe, MS-DOS
11->131
dropped
133
C:\Users\user\AppData\Local\...\WWW14[1].bmp, MS-DOS
11->133
dropped
135
C:\...\PowerControl_Svc.exe, PE32
11->135
dropped
137
C:\...\PowerControl_Svc.exe:Zone.Identifier, ASCII
11->137
dropped
235
Drops PE files to the
document folder of the
user
11->235
237
May check the online
IP address of the machine
11->237
239
Uses schtasks.exe or
at.exe to add and modify
task schedules
11->239
22
1bKk2Cz3atMMUnJwr6483NNM.exe
11
44
11->22
started
27
schtasks.exe
1
11->27
started
139
C:\Users\...\gMGR68BJ4eeOD_nnoG7Wfa95.exe, MS-DOS
16->139
dropped
141
C:\Users\user\AppData\Local\...\WWW14[1].bmp, MS-DOS
16->141
dropped
29
gMGR68BJ4eeOD_nnoG7Wfa95.exe
36
16->29
started
31
schtasks.exe
16->31
started
241
Changes security center
settings (notifications,
updates, antivirus,
firewall)
18->241
243
Query firmware table
information (likely
to detect VMs)
20->243
33
WerFault.exe
20->33
started
35
WerFault.exe
20->35
started
file6
signatures7
process8
dnsIp9
161
94.142.138.131
IHOR-ASRU
Russian Federation
22->161
163
vk.com
87.240.129.133
VKONTAKTE-SPB-AShttpvkcomRU
Russian Federation
22->163
169
14 other IPs or domains
22->169
115
C:\Users\...\sxScg3qFpX4gIpcx1nKdDQPB.exe, PE32
22->115
dropped
117
C:\Users\...\fYJQkSAsctbzKJHHc3HYndIx.exe, PE32
22->117
dropped
119
C:\Users\...\Z4qEXueVnQFcAO6POzuisON5.exe, PE32
22->119
dropped
127
13 other malicious files
22->127
dropped
193
Multi AV Scanner detection
for dropped file
22->193
195
Overwrites code with
unconditional jumps
- possibly settings
hooks in foreign process
22->195
197
Query firmware table
information (likely
to detect VMs)
22->197
205
7 other signatures
22->205
37
81MLoG1a2dFuYRMSZxThdtGT.exe
22->37
started
40
ASqTm3hNXAinimeAF8dXKBU_.exe
22->40
started
43
Z4qEXueVnQFcAO6POzuisON5.exe
22->43
started
49
7 other processes
22->49
45
conhost.exe
27->45
started
165
104.21.29.224
CLOUDFLARENETUS
United States
29->165
167
ipinfo.io
29->167
121
C:\Users\...\ehzvkaftTdKpUZFdMAdxY3Rm.exe, PE32
29->121
dropped
123
C:\Users\...\ZVbZPCar6CeW3EXsh8mJ7BVC.exe, PE32+
29->123
dropped
125
C:\Users\...\ZASm7Sq89ecEimEeHGTBwQrM.exe, PE32
29->125
dropped
129
12 other malicious files
29->129
dropped
199
May check the online
IP address of the machine
29->199
201
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
29->201
203
Creates HTML files with
.exe extension (expired
dropper behavior)
29->203
47
conhost.exe
31->47
started
file10
signatures11
process12
dnsIp13
103
C:\Users\user\AppData\Local\...\is-TITCJ.tmp, PE32
37->103
dropped
52
is-TITCJ.tmp
37->52
started
207
Checks for kernel code
integrity (NtQuerySystemInformation(CodeIntegrityInformation))
40->207
209
Maps a DLL or memory
area into another process
40->209
211
Checks if the current
machine is a virtual
machine (disk enumeration)
40->211
213
Creates a thread in
another existing process
(thread injection)
40->213
55
explorer.exe
40->55
injected
105
C:\Users\user\AppData\Local\...\Install.exe, PE32
43->105
dropped
59
Install.exe
43->59
started
143
188.119.113.104
SERVERIUS-ASNL
Russian Federation
49->143
145
45.81.243.48
LVLT-10753US
Germany
49->145
147
10 other IPs or domains
49->147
107
C:\Users\user\AppData\Local\...\oneetx.exe, PE32
49->107
dropped
215
Overwrites code with
unconditional jumps
- possibly settings
hooks in foreign process
49->215
217
Disables Windows Defender
(deletes autostart)
49->217
219
Tries to harvest and
steal browser information
(history, passwords,
etc)
49->219
221
3 other signatures
49->221
61
cmd.exe
49->61
started
63
ipconfig.exe
49->63
started
65
conhost.exe
49->65
started
67
2 other processes
49->67
file14
signatures15
process16
dnsIp17
89
C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+
52->89
dropped
91
C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32
52->91
dropped
93
C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32
52->93
dropped
101
7 other files (5 malicious)
52->101
dropped
69
FRec48.exe
52->69
started
171
187.212.236.255
UninetSAdeCVMX
Mexico
55->171
173
175.126.109.15
SKB-ASSKBroadbandCoLtdKR
Korea Republic of
55->173
175
3 other IPs or domains
55->175
95
C:\Users\user\AppData\Roaming\vehvjbs, PE32
55->95
dropped
97
C:\Users\user\AppData\Local\Temp\524F.exe, PE32
55->97
dropped
223
System process connects
to network (likely due
to code injection or
exploit)
55->223
225
Benign windows process
drops PE files
55->225
227
Hides that the sample
has been downloaded
from the Internet (zone.identifier)
55->227
73
rundll32.exe
55->73
started
99
C:\Users\user\AppData\Local\...\Install.exe, PE32
59->99
dropped
229
Multi AV Scanner detection
for dropped file
59->229
75
Install.exe
59->75
started
231
Drops PE files with
a suspicious file extension
61->231
78
cmd.exe
61->78
started
80
conhost.exe
61->80
started
82
conhost.exe
63->82
started
file18
signatures19
process20
dnsIp21
155
45.12.253.56
CMCSUS
Germany
69->155
157
45.12.253.72
CMCSUS
Germany
69->157
159
45.12.253.75
CMCSUS
Germany
69->159
109
C:\Users\user\AppData\...\ipmG21Gdb95s.exe, PE32
69->109
dropped
84
ipmG21Gdb95s.exe
69->84
started
111
C:\Users\user\AppData\Local\...\XaQEPSv.exe, PE32
75->111
dropped
233
Multi AV Scanner detection
for dropped file
75->233
113
C:\Users\user\AppData\Local\...\Co.exe.pif, PE32
78->113
dropped
87
powershell.exe
78->87
started
file22
signatures23
process24
signatures25
191
Multi AV Scanner detection
for dropped file
84->191
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://163.123.143.4/download/Service_.vmp