Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 12:54

General

  • Target

    0edb945c8dd154bc423c54a58705917964bbfb8f0391f3350b75f33df5c740dd.exe

  • Size

    755KB

  • MD5

    053c3c8e722fa47bd2838b181c048d4f

  • SHA1

    45a6adcdfc9dd036ca7edae5af73dfb8f51fb4fb

  • SHA256

    0edb945c8dd154bc423c54a58705917964bbfb8f0391f3350b75f33df5c740dd

  • SHA512

    776b7eda980d98638096e170736cdfe4622e8fd2f6c8dda2c661c738ee201fcf4a048156f159b7dd3649713338e7e683a87bb9cf69115c02b630b4c68480835c

  • SSDEEP

    12288:QMrhy90cINZiNM09CQ+yMCpfb5nIyt7s0zv4kma32U6yWy7P3RvcBLMxC++B+dGK:hyxI2uyMgN7sEmaLRx3cJ+dn

Malware Config

Extracted

Family

redline

Botnet

genda

C2

77.91.124.55:19071

Extracted

Family

amadey

Version

3.89

C2

http://77.91.124.1

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explothe.exe

  • strings_key

    36a96139c1118a354edf72b1080d4b2f

  • url_paths

    /theme/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Mystic stealer payload 3 IoCs
  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0edb945c8dd154bc423c54a58705917964bbfb8f0391f3350b75f33df5c740dd.exe
    "C:\Users\Admin\AppData\Local\Temp\0edb945c8dd154bc423c54a58705917964bbfb8f0391f3350b75f33df5c740dd.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4520
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7768946.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7768946.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1504
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9327222.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9327222.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3580
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\q6134869.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\q6134869.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2360
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r8873344.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r8873344.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3508
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
              PID:4428
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3508 -s 616
              5⤵
              • Program crash
              PID:808
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s5765129.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s5765129.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4864
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            4⤵
              PID:2164
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4864 -s 152
              4⤵
              • Program crash
              PID:2472
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t0352074.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t0352074.exe
          2⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:856
          • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
            "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"
            3⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:5112
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F
              4⤵
              • Creates scheduled task(s)
              PID:4456
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:380
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                5⤵
                  PID:1780
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "explothe.exe" /P "Admin:N"
                  5⤵
                    PID:512
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "explothe.exe" /P "Admin:R" /E
                    5⤵
                      PID:3088
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      5⤵
                        PID:2944
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\fefffe8cea" /P "Admin:N"
                        5⤵
                          PID:3892
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\fefffe8cea" /P "Admin:R" /E
                          5⤵
                            PID:2244
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3508 -ip 3508
                    1⤵
                      PID:4564
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4864 -ip 4864
                      1⤵
                        PID:1876
                      • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                        C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                        1⤵
                        • Executes dropped EXE
                        PID:2632
                      • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                        C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                        1⤵
                        • Executes dropped EXE
                        PID:2400
                      • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                        C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                        1⤵
                        • Executes dropped EXE
                        PID:3972

                      Network

                      MITRE ATT&CK Matrix ATT&CK v13

                      Execution

                      Scheduled Task/Job

                      1
                      T1053

                      Persistence

                      Create or Modify System Process

                      1
                      T1543

                      Windows Service

                      1
                      T1543.003

                      Boot or Logon Autostart Execution

                      1
                      T1547

                      Registry Run Keys / Startup Folder

                      1
                      T1547.001

                      Scheduled Task/Job

                      1
                      T1053

                      Privilege Escalation

                      Create or Modify System Process

                      1
                      T1543

                      Windows Service

                      1
                      T1543.003

                      Boot or Logon Autostart Execution

                      1
                      T1547

                      Registry Run Keys / Startup Folder

                      1
                      T1547.001

                      Scheduled Task/Job

                      1
                      T1053

                      Defense Evasion

                      Modify Registry

                      3
                      T1112

                      Impair Defenses

                      2
                      T1562

                      Disable or Modify Tools

                      2
                      T1562.001

                      Discovery

                      Query Registry

                      1
                      T1012

                      System Information Discovery

                      2
                      T1082

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t0352074.exe
                        Filesize

                        219KB

                        MD5

                        4bd59a6b3207f99fc3435baf3c22bc4e

                        SHA1

                        ae90587beed289f177f4143a8380ba27109d0a6f

                        SHA256

                        08e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236

                        SHA512

                        ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7768946.exe
                        Filesize

                        572KB

                        MD5

                        356b87f7e7d1119be9f7c887741a938b

                        SHA1

                        cecc1ad33fe7b36014f02b4fa44f515fd3249bf5

                        SHA256

                        ec316cbf3c14217146a8ba824b3c65ab244912ea81788f99b6cffb0ace82e471

                        SHA512

                        e3ff0d16b7e1e701ce3da63036330f68d852a81404eb978ce939c3f1901d6348898da229820e1937536a403dd5071174de1968d1d6df8a3f492dd82b40512c44

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s5765129.exe
                        Filesize

                        386KB

                        MD5

                        d73886be4345e34cf4827fcb8a957cf4

                        SHA1

                        e1462c50683d4d0f8ec398ca1f9c8b62e1866823

                        SHA256

                        903ccb7a02e5c7b90cda143c57520d0ce32aff1859d47037c5c8763a7fe4365e

                        SHA512

                        9fa8e869eae791339743ce8950cf6baf99bab5e269284c667e04e8e9e46dd9868c0ff63a99cb8c4ec6aa9a845fd08875c1ddec4a717b1405b321b966aaa015d0

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9327222.exe
                        Filesize

                        309KB

                        MD5

                        2e4905aa800b199a194675fdfafc8b49

                        SHA1

                        f69b4fea9097cb4dc4d9185f4712afd347d0ee29

                        SHA256

                        78c46ce26624335d86d10014a51f6544018bcf6ffac94e3caa7d22984db07c59

                        SHA512

                        f550939e3880d94f29eb3e5d6537ea9ccb18f2a6e49a151822dfdf978515cadbc5f25d3518c0ae289a84cf341be95fec092ccf8e503105a75e2737f985234e76

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\q6134869.exe
                        Filesize

                        11KB

                        MD5

                        66233842cc4c6ffb85b56e67fece2373

                        SHA1

                        b38277717a66492ca9aa822ba760d26940bc5767

                        SHA256

                        d8d32c4b550eeb5c689f1424191f48be89b07453b0ca5753f4d19a544ebc0123

                        SHA512

                        8c7029f9079df2a839eb402c80b8656800ff07a5341930bc5f04494c1ae6777e35644c350ec6a45ffba4c34d1168416ed9ac9c351022241ef5371b08eff2c809

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r8873344.exe
                        Filesize

                        304KB

                        MD5

                        6fadd5e3de013d724ef45f2c1b157bcb

                        SHA1

                        6b826a70b3e01eb42b1cffecc6593d42adb10ddd

                        SHA256

                        4287e0b896754410651c0f7d0dec9e7d290d0b2b1cc38c5605f5920192424c85

                        SHA512

                        f4478bc5b1d71edc48e495f4f35ff6167ac02ac5f2a433b4c2eec57b6afce0e62fc832ce021f87eb80b4e16f7b1cb71daac2467a336801f56eb2dbbc19e91758

                      • memory/2164-34-0x0000000000400000-0x000000000043E000-memory.dmp
                        Filesize

                        248KB

                      • memory/2164-50-0x00000000085A0000-0x0000000008BB8000-memory.dmp
                        Filesize

                        6.1MB

                      • memory/2164-54-0x00000000076B0000-0x00000000076FC000-memory.dmp
                        Filesize

                        304KB

                      • memory/2164-53-0x0000000007710000-0x000000000774C000-memory.dmp
                        Filesize

                        240KB

                      • memory/2164-52-0x0000000007680000-0x0000000007692000-memory.dmp
                        Filesize

                        72KB

                      • memory/2164-35-0x00000000079D0000-0x0000000007F74000-memory.dmp
                        Filesize

                        5.6MB

                      • memory/2164-36-0x00000000074C0000-0x0000000007552000-memory.dmp
                        Filesize

                        584KB

                      • memory/2164-51-0x00000000078C0000-0x00000000079CA000-memory.dmp
                        Filesize

                        1.0MB

                      • memory/2164-49-0x0000000004A10000-0x0000000004A1A000-memory.dmp
                        Filesize

                        40KB

                      • memory/2360-22-0x0000000000770000-0x000000000077A000-memory.dmp
                        Filesize

                        40KB

                      • memory/2360-21-0x00007FFAE07C3000-0x00007FFAE07C5000-memory.dmp
                        Filesize

                        8KB

                      • memory/4428-28-0x0000000000400000-0x0000000000428000-memory.dmp
                        Filesize

                        160KB

                      • memory/4428-27-0x0000000000400000-0x0000000000428000-memory.dmp
                        Filesize

                        160KB

                      • memory/4428-30-0x0000000000400000-0x0000000000428000-memory.dmp
                        Filesize

                        160KB