aa.exe

First submission 2024-10-14 08:05:03 Last sumbission 2024-10-15 20:51:03

File details

File type: PE32 executable (GUI) Intel 80386, for MS Windows
Mime type: application/x-dosexec
File size: 762.14 KB (780432 bytes)
Compile time: 2017-07-05 21:57:26
MD5: e9b569f7cbf23d91df065c18f4c43840
SHA1: 5d7cb1a2ca7db04edf23dd3ed41125c8c867b0ad
SHA256: d67c7ef1c8e2cd56e266902bef814ac328d64bbe06086f4ee24fbadbebf39605
Import Hash : 64720560b6fe716899d329e150e5fb91
Sections 4 .text .rdata .data .rsrc
Directories 3 import resource security

File features detected

Is DLL
Packers
Anti Debug
Anti VM
Signed
XOR

OSINT Enrichments

Virus Total: 58/77 VT report date: 2024-10-13 23:55:01
Malware Type 3 hacktool trojan pua
Threat Type 3 ammyy ammyadmn filereppup

URLs, FQDN and IP indicators 2

URL Host (FQDN/IP) Date Added
hXXp://www.aureanet.com/aa.exe VirusTotal Report www.aureanet.com VirusTotal Report 2024-10-15 20:51:07
hXXp://aureanet.com/aa.exe VirusTotal Report aureanet.com VirusTotal Report 2024-10-14 08:05:03

PE Sections 0 suspicious

Name VAddress VSize Size SHA1 MD5 Suspicious
.text 0x1000 0x8305a 540672 c386fe13f8472d71310ea2dca5d7123407ced9a5 8aeaf5ba0911231691302eeb3bdfea8f
.rdata 0x85000 0x188de 102400 b5489ec4a9a959d600b4e3576a338ae8ef00e678 61b8db91e05d3da50d77beeefeb87f05
.data 0x9e000 0x1aea8 81920 c68d893c41bce72357494f6eef2d6382fcde1885 2160ec8803885bca22c0168b0d488020
.rsrc 0xb9000 0xa1d0 45056 8f19e6a56cfda5a4503500325d59896ea6fff1c9 8f880b72b7e9da5ad38c35fe568763f8

PE Resources 11

Name Language Sublanguage Offset Size Data
BINARY LANG_NEUTRAL SUBLANG_NEUTRAL 0xbf448 1
RT_CURSOR LANG_ENGLISH SUBLANG_ENGLISH_US 0xc0bf0 308
RT_BITMAP LANG_NEUTRAL SUBLANG_NEUTRAL 0xc01c0 1194
RT_ICON LANG_NEUTRAL SUBLANG_NEUTRAL 0xbe370 4264
RT_MENU LANG_NEUTRAL SUBLANG_NEUTRAL 0xb99d0 250
RT_DIALOG LANG_NEUTRAL SUBLANG_NEUTRAL 0xbb350 784
RT_GROUP_CURSOR LANG_ENGLISH SUBLANG_ENGLISH_US 0xc0d28 20
RT_GROUP_ICON LANG_NEUTRAL SUBLANG_NEUTRAL 0xbf418 48
RT_VERSION LANG_ENGLISH SUBLANG_ENGLISH_US 0xc0670 736
RT_MANIFEST LANG_NEUTRAL SUBLANG_NEUTRAL 0xbb7e0 637
None LANG_NEUTRAL SUBLANG_NEUTRAL 0xbb7d0 11

Meta infos 13

LegalCopyright:
InternalName: Ammyy Admin
FileVersion: 3.5
FileDescription: Ammyy Admin
SpecialBuild:
CompanyName: Ammyy LLC
LegalTrademarks:
Comments:
ProductName: Ammyy Admin
ProductVersion: 3.5
PrivateBuild:
Translation: 0x0409 0x04b0
OriginalFilename:

Packers detected 3

Microsoft Visual C++ v6.0
Microsoft Visual C++ 5.0
Microsoft Visual C++

Anti debug functions 7

FindWindowA
FindWindowW
GetLastError
GetWindowThreadProcessId
Process32First
Process32Next
TerminateProcess

Anti debug functions 1

VMCheck.dll

File signature

MD5 SHA1 Block size Virtual Address
1d2870c6cc43d7096ce78c38079a966c 57805525d4070fbb350f4ac6886a801cc6df1b58 6288 774144

Strings analysis - File found

Binary
Ammyy_Contact_Book.bin
*.bin
contacts3.bin
settings.bin
_tmp\AMMYY_Admin.bin
settings3.bin
contacts.bin
sessions.bin
Log
eAMMYY_service.log
ammyy.log
Temporary
%sAmmyy_%X.tmp
Object
hhctrl.ocx
Library
W\winsta.dll
ewmsgapi.dll
ADVAPI32.dll
SHLWAPI.dll
dwmapi.dll
WTSAPI32.dll
MSVCRT.dll
USER32.dll
SHELL32.dll
WS2_32.dll
COMCTL32.dll
secur32.dll
WININET.dll
USERENV.dll
SETUPAPI.dll
GDI32.dll
KERNEL32.dll
DSOUND.dll
COMDLG32.dll
IPHLPAPI.DLL
msvcp60.dll

Strings analysis - Possible IPs found 2

1.0.0.1
127.0.0.1

Strings analysis - Possible URLs found 15

http://www.ammyy.com/?lang=
http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
http://ts-ocsp.ws.symantec.com07
http://ocsp.comodoca.com0
http://crl.thawte.com/ThawteTimestampingCA.crl0
https://secure.comodo.net/CPS0C
http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
http://crt.comodoca.com/COMODORSAAddTrustCA.crt0$
http://ocsp.thawte.com0
http://www.ammyy.com/
http://www.ammyy.com
http://rl.ammyy.com
http://crt.comodoca.com/COMODORSACodeSigningCA.crt0$
http://ts-aia.ws.symantec.com/tss-ca-g2.cer0<

Import functions