Threat name:
Amadey, Fabookie, PrivateLoader, RedLine
Alert
Classification:
phis.troj.spyw.evad
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Detected VMProtect packer
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Drops PE files to the document folder of the user
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies Group Policy settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Instant Messenger accounts or passwords
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected PrivateLoader
Yara detected RedLine Stealer
Yara detected SmokeLoader
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
787102
Sample:
SecuriteInfo.com.Trojan.Gen...
Startdate:
19/01/2023
Architecture:
WINDOWS
Score:
100
142
Malicious sample detected
(through community Yara
rule)
2->142
144
Antivirus detection
for URL or domain
2->144
146
Antivirus detection
for dropped file
2->146
148
17 other signatures
2->148
11
SecuriteInfo.com.Trojan.GenericKD.65039023.31886.8045.exe
10
40
2->11
started
16
nbveek.exe
2->16
started
process3
dnsIp4
130
87.240.132.78
VKONTAKTE-SPB-AShttpvkcomRU
Russian Federation
11->130
132
95.142.206.0
VKONTAKTE-SPB-AShttpvkcomRU
Russian Federation
11->132
134
13 other IPs or domains
11->134
102
C:\Users\...\lxHJN9LQ2IYl_BP0z1r2_NZn.exe, PE32
11->102
dropped
104
C:\Users\...\jVrOapx2LYM72im9SB0EeAGt.exe, PE32
11->104
dropped
106
C:\Users\...\ZWEYBpkQgkc_PGfLEBMOHOsP.exe, PE32+
11->106
dropped
108
13 other malicious files
11->108
dropped
176
Creates HTML files with
.exe extension (expired
dropper behavior)
11->176
178
Disables Windows Defender
(deletes autostart)
11->178
180
Modifies Group Policy
settings
11->180
182
2 other signatures
11->182
18
XNOGzlb5Md_htT2fP5y46aQH.exe
3
11->18
started
21
F2OXMJiaQKcvNjBGUn8DUlSG.exe
11->21
started
23
6pbOxtyIH9odgqH8M_AXOITc.exe
17
11->23
started
27
6 other processes
11->27
file5
signatures6
process7
dnsIp8
88
C:\Users\user\AppData\Local\...\nbveek.exe, PE32
18->88
dropped
29
nbveek.exe
18->29
started
90
C:\Windows\Temp\321.exe, PE32
21->90
dropped
92
C:\Windows\Temp\123.exe, PE32
21->92
dropped
34
321.exe
21->34
started
36
123.exe
21->36
started
124
149.154.167.99
TELEGRAMRU
United Kingdom
23->124
94
C:\Users\...\LvLVUIctgUV1bZJGWZK9dQ5I.exe, MS-DOS
23->94
dropped
96
C:\Users\user\AppData\Local\...\WW14[1].bmp, MS-DOS
23->96
dropped
98
C:\...\PowerControl_Svc.exe, MS-DOS
23->98
dropped
160
Overwrites code with
unconditional jumps
- possibly settings
hooks in foreign process
23->160
162
Query firmware table
information (likely
to detect VMs)
23->162
164
Hides threads from debuggers
23->164
166
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
23->166
126
157.240.253.35
FACEBOOKUS
United States
27->126
128
45.66.159.142
ENZUINC-US
Russian Federation
27->128
100
C:\Users\user\AppData\Local\...\Zt76vTE.cpl, PE32
27->100
dropped
168
Writes to foreign memory
regions
27->168
170
Allocates memory in
foreign processes
27->170
172
Checks for kernel code
integrity (NtQuerySystemInformation(CodeIntegrityInformation))
27->172
174
4 other signatures
27->174
38
WerFault.exe
27->38
started
40
control.exe
27->40
started
42
vbc.exe
27->42
started
44
conhost.exe
27->44
started
file9
signatures10
process11
dnsIp12
136
62.204.41.27
TNNET-ASTNNetOyMainnetworkFI
United Kingdom
29->136
110
C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+
29->110
dropped
112
C:\Users\user\AppData\Roaming\...\clip64.dll, PE32
29->112
dropped
114
C:\Users\user\AppData\Local\...\cred64[1].dll, PE32+
29->114
dropped
116
C:\Users\user\AppData\Local\...\clip64[1].dll, PE32
29->116
dropped
184
Multi AV Scanner detection
for dropped file
29->184
186
Creates an undocumented
autostart registry key
29->186
188
Machine Learning detection
for dropped file
29->188
202
2 other signatures
29->202
46
rundll32.exe
29->46
started
48
cmd.exe
29->48
started
50
schtasks.exe
29->50
started
52
rundll32.exe
29->52
started
190
Writes to foreign memory
regions
34->190
192
Allocates memory in
foreign processes
34->192
194
Injects a PE file into
a foreign processes
34->194
54
vbc.exe
34->54
started
58
conhost.exe
34->58
started
60
vbc.exe
36->60
started
64
2 other processes
36->64
138
20.189.173.21
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
38->138
196
Queries sensitive Plug
and Play Device Information
(via WMI, Win32_PnPEntity,
often done to detect
virtual machines)
38->196
198
Queries sensitive BIOS
Information (via WMI,
Win32_Bios & Win32_BaseBoard,
often done to detect
virtual machines)
38->198
200
Queries memory information
(via WMI often done
to detect virtual machines)
38->200
62
rundll32.exe
40->62
started
140
185.244.181.112
BELCLOUDBG
Russian Federation
42->140
file13
signatures14
process15
dnsIp16
66
rundll32.exe
46->66
started
70
conhost.exe
48->70
started
72
cmd.exe
48->72
started
74
cacls.exe
48->74
started
80
4 other processes
48->80
76
conhost.exe
50->76
started
120
65.21.213.208
CP-ASDE
United States
54->120
158
Tries to harvest and
steal browser information
(history, passwords,
etc)
54->158
122
51.210.137.6
OVHFR
France
60->122
78
rundll32.exe
62->78
started
signatures17
process18
dnsIp19
118
192.168.2.1
unknown
unknown
66->118
150
System process connects
to network (likely due
to code injection or
exploit)
66->150
152
Tries to steal Instant
Messenger accounts or
passwords
66->152
154
Tries to harvest and
steal ftp login credentials
66->154
156
Tries to harvest and
steal browser information
(history, passwords,
etc)
66->156
82
tar.exe
66->82
started
84
rundll32.exe
78->84
started
signatures20
process21
process22
86
conhost.exe
82->86
started
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.