Report - Amday.exe

Ave Maria WARZONE RAT Generic Malware Themida Packer UPX MPRESS Malicious Library Admin Tool (Sysinternals etc ...) PE File PE32 OS Processor Check DLL JPEG Format PE64 .NET EXE
ScreenShot
Created 2023.06.14 19:30 Machine s1_win7_x6403
Filename Amday.exe
Type MS-DOS executable, MZ for MS-DOS
AI Score
2
Behavior Score
19.4
ZERO API file : clean
VT API (file) 47 detected (AIDetectMalware, Deyma, malicious, high confidence, GenericKD, V7qe, confidence, 100%, ABRisk, NLTL, Attribute, HighConfidence, GenCBL, score, BotX, Siggen20, AMADEY, YXDFKZ, Artemis, high, Sabsik, Casdet, Detected, AntiAnalysis, ai score=87, unsafe, Chgt, 65oQciLZtWJ, ZexaF, Tpvaa0U6R8cO)
md5 325cedfb3e4d23ddf1062ad55b6f6b6e
sha256 38d7fbdc314f881b461c766742a26d3df72c553d25c8f1c20da1adcdbea1afef
ssdeep 98304:uSWz0m6iijzsGupvTo9GDd1HwAOiU0KIX6ksJc:Tfti2Ys9GDd1HjpU0pX6m
imphash 5bd91a0f42fd0a961c30b4fc8a1545ce
impfuzzy 3:sUx2AEZsS9KTXz/HAGM1LsfvEKM9CROXKLbK1djSMXRLMab7VeW7VJDBAn:nERGDfALWvEKzRgKLb2sY467Ve6zAn
  Network IP location

Signature (43cnts)

Level Description
danger File has been identified by 47 AntiVirus engines on VirusTotal as malicious
watch A process attempted to delay the analysis task.
watch Attempts to create or modify system certificates
watch Attempts to identify installed AV products by installation directory
watch Checks for the presence of known windows from debuggers and forensic tools
watch Checks the version of Bios
watch Collects information about installed applications
watch Communicates with host for which no DNS query was performed
watch Creates an executable file in a user folder
watch Detects Virtual Machines through their custom firmware
watch Detects VMWare through the in instruction feature
watch Drops a binary and executes it
watch Harvests credentials from local FTP client softwares
watch Installs itself for autorun at Windows startup
watch Looks for the Windows Idle Time to determine the uptime
watch Tries to unhook Windows functions monitored by Cuckoo
watch Uses suspicious command line tools or Windows utilities
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice An executable file was downloaded by the process oneetx.exe
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice Expresses interest in specific running processes
notice Foreign language identified in PE resource
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Queries for potentially installed applications
notice Sends data using the HTTP POST Method
notice Steals private information from local Internet browsers
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Command line console output was observed
info One or more processes crashed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer
info Tries to locate where the browsers are installed
info Uses Windows APIs to generate a cryptographic key

Rules (18cnts)

Level Name Description Collection
danger Ave_Maria_Zero Remote Access Trojan that is also called WARZONE RAT binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (download)
warning themida_packer themida packer binaries (download)
watch Admin_Tool_IN_Zero Admin Tool Sysinternals binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch MPRESS_Zero MPRESS packed file binaries (download)
watch MPRESS_Zero MPRESS packed file binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info Is_DotNET_EXE (no description) binaries (download)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info IsPE64 (no description) binaries (download)
info JPEG_Format_Zero JPEG Format binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (14cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://haisatatakarya.com/64.dll Unknown 5.181.216.116 clean
http://62.182.156.152/so57Nst/Plugins/cred64.dll GB Clouvider Limited 62.182.156.152 clean
http://africatechs.com/YoutubeAdvert.exe US CLOUDFLARENET 104.21.46.153 clean
http://62.182.156.152/so57Nst/index.php?scr=1 GB Clouvider Limited 62.182.156.152 clean
http://62.182.156.152/so57Nst/index.php GB Clouvider Limited 62.182.156.152 clean
http://62.182.156.152/so57Nst/Plugins/clip64.dll GB Clouvider Limited 62.182.156.152 malware
https://africatechs.com/YoutubeAdvert.exe US CLOUDFLARENET 104.21.46.153 malware
haisatatakarya.com Unknown 5.181.216.116 clean
africatechs.com US CLOUDFLARENET 172.67.140.104 malware
95.143.190.57 Unknown 95.143.190.57 clean
77.91.68.63 RU Foton Telecom CJSC 77.91.68.63 malware
62.182.156.152 GB Clouvider Limited 62.182.156.152 malware
5.181.216.116 Unknown 5.181.216.116 malware
104.21.46.153 US CLOUDFLARENET 104.21.46.153 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.DLL
 0xb8a0b4 GetModuleHandleA
 0xb8a0b8 GetProcAddress
USER32.dll
 0xb8a0c0 GetDC
GDI32.dll
 0xb8a0c8 BitBlt
ADVAPI32.dll
 0xb8a0d0 RegCloseKey
SHELL32.dll
 0xb8a0d8 None
WININET.dll
 0xb8a0e0 InternetOpenA
gdiplus.dll
 0xb8a0e8 GdiplusStartup

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure