Analysis

  • max time kernel
    207s
  • max time network
    236s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2023 06:14

General

  • Target

    fac05aabb4be950e24a4baed4f3c2c18f94666f18b82828d680bb5886137bd87_JC.exe

  • Size

    1.0MB

  • MD5

    f4fe230f5bd0b35f89f5afd4fdba9efe

  • SHA1

    ed0f81671a0633553fc815bff6eedcfcd4347250

  • SHA256

    fac05aabb4be950e24a4baed4f3c2c18f94666f18b82828d680bb5886137bd87

  • SHA512

    63e4b68eb4c78ae8bade1934a99b5702063407f1d74b38a0e6ae3d2010e747233d046be0129da9252f31b48006b0cabdebbe030b2c1a44d273523dee287c64df

  • SSDEEP

    24576:kyxZpRPHJJDI5a9kmpzUxT147CerNZNds54IAhy:zTpRPHLE5OBFu47Pk4IS

Malware Config

Extracted

Family

redline

Botnet

gruha

C2

77.91.124.55:19071

Attributes
  • auth_value

    2f4cf2e668a540e64775b27535cc6892

Extracted

Family

amadey

Version

3.89

C2

http://77.91.68.52/mac/index.php

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explonde.exe

  • strings_key

    916aae73606d7a9e02a1d3b47c199688

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Mystic stealer payload 4 IoCs
  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 8 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fac05aabb4be950e24a4baed4f3c2c18f94666f18b82828d680bb5886137bd87_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\fac05aabb4be950e24a4baed4f3c2c18f94666f18b82828d680bb5886137bd87_JC.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2562300.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2562300.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5064
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8837815.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8837815.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2548
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5486151.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5486151.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1680
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6839590.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6839590.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:3524
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1759215.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1759215.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:3944
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:844
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 148
                7⤵
                • Program crash
                PID:4164
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3082935.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3082935.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:4480
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:1020
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 1020 -s 540
                    8⤵
                    • Program crash
                    PID:3744
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 152
                  7⤵
                  • Program crash
                  PID:1740
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s3106482.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s3106482.exe
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:4516
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                  PID:3972
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4516 -s 152
                  6⤵
                  • Program crash
                  PID:2576
            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t9976434.exe
              C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t9976434.exe
              4⤵
              • Executes dropped EXE
              PID:4680
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3944 -ip 3944
        1⤵
          PID:368
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4480 -ip 4480
          1⤵
            PID:3000
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1020 -ip 1020
            1⤵
              PID:4636
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4516 -ip 4516
              1⤵
                PID:4040

              Network

              MITRE ATT&CK Matrix ATT&CK v13

              Persistence

              Create or Modify System Process

              1
              T1543

              Windows Service

              1
              T1543.003

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Privilege Escalation

              Create or Modify System Process

              1
              T1543

              Windows Service

              1
              T1543.003

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Defense Evasion

              Modify Registry

              2
              T1112

              Impair Defenses

              1
              T1562

              Disable or Modify Tools

              1
              T1562.001

              Discovery

              System Information Discovery

              1
              T1082

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log
                Filesize

                226B

                MD5

                916851e072fbabc4796d8916c5131092

                SHA1

                d48a602229a690c512d5fdaf4c8d77547a88e7a2

                SHA256

                7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                SHA512

                07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2562300.exe
                Filesize

                966KB

                MD5

                d0a189714edcf3b8ea7eb0f58150c0ea

                SHA1

                8199f911ef2da940087c6bc78f9093e59aa3e9e9

                SHA256

                9456d395044c8b2e28f87d83385b52d9a1994ece5b1d2a7595bb24cfea4454fb

                SHA512

                907a451bd5b4045dab04521560ea62a2e84d9951e54b4799a7d60edfe3d366ec94e2685210a117c6005a16c71f6c6ce632e9d95c94a619895866db0df56d1d43

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2562300.exe
                Filesize

                966KB

                MD5

                d0a189714edcf3b8ea7eb0f58150c0ea

                SHA1

                8199f911ef2da940087c6bc78f9093e59aa3e9e9

                SHA256

                9456d395044c8b2e28f87d83385b52d9a1994ece5b1d2a7595bb24cfea4454fb

                SHA512

                907a451bd5b4045dab04521560ea62a2e84d9951e54b4799a7d60edfe3d366ec94e2685210a117c6005a16c71f6c6ce632e9d95c94a619895866db0df56d1d43

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8837815.exe
                Filesize

                783KB

                MD5

                9b7ff4ebc992571f2cd38c53e03be66f

                SHA1

                8b3b28180737b3b0d716fe2c3eb4c06d7710f572

                SHA256

                4161c680af82b59a776fd5658f83a972f63c36b81f335f081ce268928480d55f

                SHA512

                a557852e089b0a66277a136a1005201e9725b06b13eaa61411aa15a09442578b286b4f295476a3b98941a8470f25351a6fb36bae730829113240ff8ed3270a7b

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8837815.exe
                Filesize

                783KB

                MD5

                9b7ff4ebc992571f2cd38c53e03be66f

                SHA1

                8b3b28180737b3b0d716fe2c3eb4c06d7710f572

                SHA256

                4161c680af82b59a776fd5658f83a972f63c36b81f335f081ce268928480d55f

                SHA512

                a557852e089b0a66277a136a1005201e9725b06b13eaa61411aa15a09442578b286b4f295476a3b98941a8470f25351a6fb36bae730829113240ff8ed3270a7b

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t9976434.exe
                Filesize

                219KB

                MD5

                c256a814d3f9d02d73029580dfe882b3

                SHA1

                e11e9ea937183139753f3b0d5e71c8301d000896

                SHA256

                53f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c

                SHA512

                1f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t9976434.exe
                Filesize

                219KB

                MD5

                c256a814d3f9d02d73029580dfe882b3

                SHA1

                e11e9ea937183139753f3b0d5e71c8301d000896

                SHA256

                53f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c

                SHA512

                1f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5486151.exe
                Filesize

                600KB

                MD5

                50160e3614a2fd22c8bfb41dedb33e5f

                SHA1

                a63853041102df4536aae22a352dec16150bf513

                SHA256

                1e80672c2a3578b69d77cf71b61f5499e5daf57efe41e9d0694315bc7df0e042

                SHA512

                20827a39a55375550f533ff227c5081c3b712372c71630e0493584c7e3631eb4a93c6c714a4d0ae160f70a92ca14c86b3c7f0fc6f9cabed16663d6984aa59124

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5486151.exe
                Filesize

                600KB

                MD5

                50160e3614a2fd22c8bfb41dedb33e5f

                SHA1

                a63853041102df4536aae22a352dec16150bf513

                SHA256

                1e80672c2a3578b69d77cf71b61f5499e5daf57efe41e9d0694315bc7df0e042

                SHA512

                20827a39a55375550f533ff227c5081c3b712372c71630e0493584c7e3631eb4a93c6c714a4d0ae160f70a92ca14c86b3c7f0fc6f9cabed16663d6984aa59124

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s3106482.exe
                Filesize

                380KB

                MD5

                85202643cf7d05de3488aa879a95f1cc

                SHA1

                c17199d394adcc6f28c65de069a13407e333618c

                SHA256

                156c205bb300e64a3e918e3a577ba0563a3cf3d78f75353db23e5b0e16b4c4df

                SHA512

                4ee769700631dc8e009765329bd060af274e58f2aa304b7989b37dd714b72f60b1e4b74e27ce927b1518b5c7fa14cab418d97a8cb2028f8f451d39044ea9aab2

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s3106482.exe
                Filesize

                380KB

                MD5

                85202643cf7d05de3488aa879a95f1cc

                SHA1

                c17199d394adcc6f28c65de069a13407e333618c

                SHA256

                156c205bb300e64a3e918e3a577ba0563a3cf3d78f75353db23e5b0e16b4c4df

                SHA512

                4ee769700631dc8e009765329bd060af274e58f2aa304b7989b37dd714b72f60b1e4b74e27ce927b1518b5c7fa14cab418d97a8cb2028f8f451d39044ea9aab2

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6839590.exe
                Filesize

                338KB

                MD5

                de815683007065e50d468c281917c388

                SHA1

                2ba9905df09ceedcc9fbb4ad2e8461540c350699

                SHA256

                e88b3d9b188a27f258bee18ae1ad61e69c2147516b220df2ab0b647758dbcd48

                SHA512

                39467c62afaa40cda34a84cf0cae795b8232f68f278f542846b7d844fbdb149d73fbe4f8e32c83e4bdb4be5419b507adb57f323880e06ae955082169fd946161

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6839590.exe
                Filesize

                338KB

                MD5

                de815683007065e50d468c281917c388

                SHA1

                2ba9905df09ceedcc9fbb4ad2e8461540c350699

                SHA256

                e88b3d9b188a27f258bee18ae1ad61e69c2147516b220df2ab0b647758dbcd48

                SHA512

                39467c62afaa40cda34a84cf0cae795b8232f68f278f542846b7d844fbdb149d73fbe4f8e32c83e4bdb4be5419b507adb57f323880e06ae955082169fd946161

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1759215.exe
                Filesize

                217KB

                MD5

                4dba97fa9254b058d3adcc5e4fdc7ff8

                SHA1

                c156316ba6facf413b33e8912018c16ef83d558f

                SHA256

                efe3f717d23929a3cd8f0c142b693cc367ebf1d2d09d5ef4d8ccd2631b414cc9

                SHA512

                e520fc3a2cd0437ea1f86f0a0e9023dbd4df2797a22dbbbe3806a8aac3fc2a5829b3656a59aa4a7c046a6fee4e64ff9c510b72b9a33c067682830a5299e5fdc1

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1759215.exe
                Filesize

                217KB

                MD5

                4dba97fa9254b058d3adcc5e4fdc7ff8

                SHA1

                c156316ba6facf413b33e8912018c16ef83d558f

                SHA256

                efe3f717d23929a3cd8f0c142b693cc367ebf1d2d09d5ef4d8ccd2631b414cc9

                SHA512

                e520fc3a2cd0437ea1f86f0a0e9023dbd4df2797a22dbbbe3806a8aac3fc2a5829b3656a59aa4a7c046a6fee4e64ff9c510b72b9a33c067682830a5299e5fdc1

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3082935.exe
                Filesize

                346KB

                MD5

                3a5d33b68425941422b1395b7418cd5e

                SHA1

                d6db520a733df73b074f4b68377348130b157985

                SHA256

                db72a596ce38c242f9e08d0fdd6190d7a0d46580459a1152f73c5ba77d34f960

                SHA512

                87352099c488c2af0a4e95b5ac1909de791f7d0f5357e4407653ef10705c31507d59f0fb74691b557731c890e231182de225e309587b7cfc9860f1b762dfb7c0

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3082935.exe
                Filesize

                346KB

                MD5

                3a5d33b68425941422b1395b7418cd5e

                SHA1

                d6db520a733df73b074f4b68377348130b157985

                SHA256

                db72a596ce38c242f9e08d0fdd6190d7a0d46580459a1152f73c5ba77d34f960

                SHA512

                87352099c488c2af0a4e95b5ac1909de791f7d0f5357e4407653ef10705c31507d59f0fb74691b557731c890e231182de225e309587b7cfc9860f1b762dfb7c0

              • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
                Filesize

                219KB

                MD5

                c256a814d3f9d02d73029580dfe882b3

                SHA1

                e11e9ea937183139753f3b0d5e71c8301d000896

                SHA256

                53f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c

                SHA512

                1f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a

              • memory/844-39-0x0000000074170000-0x0000000074920000-memory.dmp
                Filesize

                7.7MB

              • memory/844-37-0x0000000074170000-0x0000000074920000-memory.dmp
                Filesize

                7.7MB

              • memory/844-36-0x0000000074170000-0x0000000074920000-memory.dmp
                Filesize

                7.7MB

              • memory/844-35-0x0000000000400000-0x000000000040A000-memory.dmp
                Filesize

                40KB

              • memory/1020-43-0x0000000000400000-0x0000000000428000-memory.dmp
                Filesize

                160KB

              • memory/1020-47-0x0000000000400000-0x0000000000428000-memory.dmp
                Filesize

                160KB

              • memory/1020-45-0x0000000000400000-0x0000000000428000-memory.dmp
                Filesize

                160KB

              • memory/1020-44-0x0000000000400000-0x0000000000428000-memory.dmp
                Filesize

                160KB

              • memory/3972-51-0x0000000000400000-0x0000000000430000-memory.dmp
                Filesize

                192KB

              • memory/3972-53-0x0000000073CE0000-0x0000000074490000-memory.dmp
                Filesize

                7.7MB

              • memory/3972-54-0x0000000002740000-0x0000000002746000-memory.dmp
                Filesize

                24KB

              • memory/3972-55-0x0000000073CE0000-0x0000000074490000-memory.dmp
                Filesize

                7.7MB