Analysis

  • max time kernel
    187s
  • max time network
    200s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2023 06:56

General

  • Target

    a5e94d8e041e724e5c508199f0893bab8a13412d8e5b686ed858d27464253c15.exe

  • Size

    1.3MB

  • MD5

    7a73cde0219ccaecaeeb8688dfc188f0

  • SHA1

    ced62b6be618f331387e70f60cd973b1a9da11e2

  • SHA256

    a5e94d8e041e724e5c508199f0893bab8a13412d8e5b686ed858d27464253c15

  • SHA512

    93da886a6962dd6408562810bbbac026b22a17ff5017a76eba20fc96fcae3a1192b0477f0975f82d5503ad57325f893bfee8396acf85eeb51580d953e7ccaad4

  • SSDEEP

    24576:Iy/nXKWt1zq1xznodLTIE+Tsnlio8l0AdQrCWUbjTl4jiv1E2:PPbGnmLp+AbOdQrCDTll1

Malware Config

Extracted

Family

redline

Botnet

gruha

C2

77.91.124.55:19071

Attributes
  • auth_value

    2f4cf2e668a540e64775b27535cc6892

Extracted

Family

amadey

Version

3.89

C2

http://77.91.68.52/mac/index.php

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explonde.exe

  • strings_key

    916aae73606d7a9e02a1d3b47c199688

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Mystic stealer payload 4 IoCs
  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 8 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5e94d8e041e724e5c508199f0893bab8a13412d8e5b686ed858d27464253c15.exe
    "C:\Users\Admin\AppData\Local\Temp\a5e94d8e041e724e5c508199f0893bab8a13412d8e5b686ed858d27464253c15.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4827358.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4827358.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4324
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7799763.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7799763.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4100
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5566774.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5566774.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3524
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2542850.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2542850.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:444
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4700964.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4700964.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:4000
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4720
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 220
                7⤵
                • Program crash
                PID:2472
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4688864.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4688864.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:4220
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:4328
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 204
                    8⤵
                    • Program crash
                    PID:2968
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4220 -s 152
                  7⤵
                  • Program crash
                  PID:4184
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s7668554.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s7668554.exe
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:4400
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                  PID:3248
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4400 -s 148
                  6⤵
                  • Program crash
                  PID:2136
            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0020987.exe
              C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0020987.exe
              4⤵
              • Executes dropped EXE
              PID:3180
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4000 -ip 4000
        1⤵
          PID:2448
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4220 -ip 4220
          1⤵
            PID:3332
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4328 -ip 4328
            1⤵
              PID:460
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4400 -ip 4400
              1⤵
                PID:4484

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log
                Filesize

                226B

                MD5

                916851e072fbabc4796d8916c5131092

                SHA1

                d48a602229a690c512d5fdaf4c8d77547a88e7a2

                SHA256

                7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                SHA512

                07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4827358.exe
                Filesize

                1.2MB

                MD5

                2717b17bfe5ceef08b32dc03665e34c9

                SHA1

                d233d7340a184ea6fafd7e2a3800f3ded1b80e8c

                SHA256

                cf0c655684839fffde38f928ea527d12582270ffad828f23279c1ae8a8ff4db1

                SHA512

                e0154157652fb8722c7f6ab3d518f02d523e93e6a36b3663389def429a2a33fe669cffccb05712addca0995600b2d7f33ef82d8b83ec2e2ecc99ea3c26d561a0

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4827358.exe
                Filesize

                1.2MB

                MD5

                2717b17bfe5ceef08b32dc03665e34c9

                SHA1

                d233d7340a184ea6fafd7e2a3800f3ded1b80e8c

                SHA256

                cf0c655684839fffde38f928ea527d12582270ffad828f23279c1ae8a8ff4db1

                SHA512

                e0154157652fb8722c7f6ab3d518f02d523e93e6a36b3663389def429a2a33fe669cffccb05712addca0995600b2d7f33ef82d8b83ec2e2ecc99ea3c26d561a0

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7799763.exe
                Filesize

                1.0MB

                MD5

                11c2308f5b82db455a8a2b67a21694bc

                SHA1

                ce30d9eaa016444b93ab60c029403967647cd3dd

                SHA256

                72abd1a249284aaa7e2f1a36b99572361d588acfe21165796a1dd5a414f0306a

                SHA512

                36a3b45c48bb14c542adc7078ad787aab99a25e314d56a8ee71b8bfff6d0535a785fc9aacc980f0302aff7d46cb3871fd45f16a0bc7b37f7c82171dfc30e4ee5

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7799763.exe
                Filesize

                1.0MB

                MD5

                11c2308f5b82db455a8a2b67a21694bc

                SHA1

                ce30d9eaa016444b93ab60c029403967647cd3dd

                SHA256

                72abd1a249284aaa7e2f1a36b99572361d588acfe21165796a1dd5a414f0306a

                SHA512

                36a3b45c48bb14c542adc7078ad787aab99a25e314d56a8ee71b8bfff6d0535a785fc9aacc980f0302aff7d46cb3871fd45f16a0bc7b37f7c82171dfc30e4ee5

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0020987.exe
                Filesize

                219KB

                MD5

                c256a814d3f9d02d73029580dfe882b3

                SHA1

                e11e9ea937183139753f3b0d5e71c8301d000896

                SHA256

                53f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c

                SHA512

                1f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0020987.exe
                Filesize

                219KB

                MD5

                c256a814d3f9d02d73029580dfe882b3

                SHA1

                e11e9ea937183139753f3b0d5e71c8301d000896

                SHA256

                53f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c

                SHA512

                1f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5566774.exe
                Filesize

                885KB

                MD5

                10ff714bdde9fd52d7444dc68a826435

                SHA1

                752f6e44f020be29029dd51d5fe7ba902f3d833f

                SHA256

                586a46e25c1f47145c67138c3c4363ceaa398efb58dd4ba55668ee9c5a443043

                SHA512

                e5e532d553014e0e9a800201662770ec916f4658aa5bd4f284470adb374887d235218212abcd18d6d0733a04b8c1bc228d4443913cf40335131c1c5815b2e027

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5566774.exe
                Filesize

                885KB

                MD5

                10ff714bdde9fd52d7444dc68a826435

                SHA1

                752f6e44f020be29029dd51d5fe7ba902f3d833f

                SHA256

                586a46e25c1f47145c67138c3c4363ceaa398efb58dd4ba55668ee9c5a443043

                SHA512

                e5e532d553014e0e9a800201662770ec916f4658aa5bd4f284470adb374887d235218212abcd18d6d0733a04b8c1bc228d4443913cf40335131c1c5815b2e027

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s7668554.exe
                Filesize

                1.0MB

                MD5

                06665752810cb750469df7705412ce97

                SHA1

                27fce3fe454b4fdce85cbff4403987fc6ac1a9e3

                SHA256

                2dea65403479e5089c546f801e138f3b4666353261216be1c1ac59e3f231d9c7

                SHA512

                511c364b91480464ca39f071b032e3dd1e1e2fa519286a9afb30d5b26d8ea05de28dd11221e62d420b4ac5311840427cfeaaf8d91feef48216b0cdd11dd21a46

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s7668554.exe
                Filesize

                1.0MB

                MD5

                06665752810cb750469df7705412ce97

                SHA1

                27fce3fe454b4fdce85cbff4403987fc6ac1a9e3

                SHA256

                2dea65403479e5089c546f801e138f3b4666353261216be1c1ac59e3f231d9c7

                SHA512

                511c364b91480464ca39f071b032e3dd1e1e2fa519286a9afb30d5b26d8ea05de28dd11221e62d420b4ac5311840427cfeaaf8d91feef48216b0cdd11dd21a46

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2542850.exe
                Filesize

                494KB

                MD5

                35976858c462939f81644dea00f81eb1

                SHA1

                86f3be174482c1e560ff19600aa24b665f30ee88

                SHA256

                4e669430464ef359fb6e81585b99f64d59c8adfda5e51533adcbe2689098899b

                SHA512

                3b396bdac70ace1358700044cb85fd433423d20252f7d6e4fc1e246c9833610ed53d84e79e6b75d29b392cb2fe9d2044709f580dba4b380b7efdb9694783b3f0

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2542850.exe
                Filesize

                494KB

                MD5

                35976858c462939f81644dea00f81eb1

                SHA1

                86f3be174482c1e560ff19600aa24b665f30ee88

                SHA256

                4e669430464ef359fb6e81585b99f64d59c8adfda5e51533adcbe2689098899b

                SHA512

                3b396bdac70ace1358700044cb85fd433423d20252f7d6e4fc1e246c9833610ed53d84e79e6b75d29b392cb2fe9d2044709f580dba4b380b7efdb9694783b3f0

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4700964.exe
                Filesize

                860KB

                MD5

                dd5ee512376f09d00669ce5fa425f3a6

                SHA1

                a3b2e840f9219fbde8713480678023a4b9c34a2d

                SHA256

                5c048cb65fef1f393be7f52fe7a71a2fc154caf1b99b42b51ba7aea3078e15f7

                SHA512

                2320cdebbf57c9968bc0a39039cd16fcb4b4a2fc3877cde6f65607af039ecb266c958c3435b06b224f2494b371e183a1063c2ea37e8b0e2b5e11c4cf283ffa93

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4700964.exe
                Filesize

                860KB

                MD5

                dd5ee512376f09d00669ce5fa425f3a6

                SHA1

                a3b2e840f9219fbde8713480678023a4b9c34a2d

                SHA256

                5c048cb65fef1f393be7f52fe7a71a2fc154caf1b99b42b51ba7aea3078e15f7

                SHA512

                2320cdebbf57c9968bc0a39039cd16fcb4b4a2fc3877cde6f65607af039ecb266c958c3435b06b224f2494b371e183a1063c2ea37e8b0e2b5e11c4cf283ffa93

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4688864.exe
                Filesize

                1016KB

                MD5

                236995ece99e02bae6021849de47702a

                SHA1

                e5bf9e286a6ade9b91b50c4b4d51cd2d5e74847c

                SHA256

                3eb44dca8b059f13f74ba1d690e87f148897a38e3243e84b65950b5f2e6da20d

                SHA512

                fd18075e6a9099c194d38cbdb234c9b49e79b892e76c24c5ef4baaac0c151bcdb455b9fa79cf75071fc01e65c93accd41c5296ef8b13e0504f76b1d75ab0c51e

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4688864.exe
                Filesize

                1016KB

                MD5

                236995ece99e02bae6021849de47702a

                SHA1

                e5bf9e286a6ade9b91b50c4b4d51cd2d5e74847c

                SHA256

                3eb44dca8b059f13f74ba1d690e87f148897a38e3243e84b65950b5f2e6da20d

                SHA512

                fd18075e6a9099c194d38cbdb234c9b49e79b892e76c24c5ef4baaac0c151bcdb455b9fa79cf75071fc01e65c93accd41c5296ef8b13e0504f76b1d75ab0c51e

              • memory/3248-51-0x0000000000400000-0x0000000000430000-memory.dmp
                Filesize

                192KB

              • memory/3248-55-0x0000000001470000-0x0000000001476000-memory.dmp
                Filesize

                24KB

              • memory/3248-54-0x0000000073E20000-0x00000000745D0000-memory.dmp
                Filesize

                7.7MB

              • memory/3248-53-0x0000000073E20000-0x00000000745D0000-memory.dmp
                Filesize

                7.7MB

              • memory/4328-43-0x0000000000400000-0x0000000000428000-memory.dmp
                Filesize

                160KB

              • memory/4328-45-0x0000000000400000-0x0000000000428000-memory.dmp
                Filesize

                160KB

              • memory/4328-42-0x0000000000400000-0x0000000000428000-memory.dmp
                Filesize

                160KB

              • memory/4328-41-0x0000000000400000-0x0000000000428000-memory.dmp
                Filesize

                160KB

              • memory/4720-35-0x0000000000400000-0x000000000040A000-memory.dmp
                Filesize

                40KB

              • memory/4720-36-0x0000000074660000-0x0000000074E10000-memory.dmp
                Filesize

                7.7MB

              • memory/4720-47-0x0000000074660000-0x0000000074E10000-memory.dmp
                Filesize

                7.7MB

              • memory/4720-37-0x0000000074660000-0x0000000074E10000-memory.dmp
                Filesize

                7.7MB