Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 17:27

General

  • Target

    cce5498639767f010fc7b6b7a5e2ae7c721720e093acf7ad8ec6bd81e63ab983.exe

  • Size

    390KB

  • MD5

    6a0feb970b0232737d1ed6729e4f0f46

  • SHA1

    82a778375910a0c96a19c6b455a0b11cb23a99ae

  • SHA256

    cce5498639767f010fc7b6b7a5e2ae7c721720e093acf7ad8ec6bd81e63ab983

  • SHA512

    965df101e912175946921d874c0aceb674147673b6afa72ee1e2c42a18f894ce8e6eb8ddaf5902b082373efec89f467b496feb7b7ea049bb41c4736984e92d1d

  • SSDEEP

    6144:Kxy+bnr+7p0yN90QE1Jy1+Jta10DfACoB1OrkI1wxvaf+1bX+Kx3n9:TMrXy90m+JtYYYdDskpxKQ1x39

Malware Config

Extracted

Family

amadey

Version

3.86

C2

http://5.42.92.67

Attributes
  • install_dir

    ebb444342c

  • install_file

    legola.exe

  • strings_key

    5680b049188ecacbfa57b1b29c2f35a7

  • url_paths

    /norm/index.php

rc4.plain

Extracted

Family

redline

Botnet

lande

C2

77.91.124.84:19071

Attributes
  • auth_value

    9fa41701c47df37786234f3373f21208

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cce5498639767f010fc7b6b7a5e2ae7c721720e093acf7ad8ec6bd81e63ab983.exe
    "C:\Users\Admin\AppData\Local\Temp\cce5498639767f010fc7b6b7a5e2ae7c721720e093acf7ad8ec6bd81e63ab983.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0798013.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0798013.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2632
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p0352502.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p0352502.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2296
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8904991.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8904991.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3332
        • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe
          "C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1088
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legola.exe /TR "C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:1756
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legola.exe" /P "Admin:N"&&CACLS "legola.exe" /P "Admin:R" /E&&echo Y|CACLS "..\ebb444342c" /P "Admin:N"&&CACLS "..\ebb444342c" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1828
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:1236
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "legola.exe" /P "Admin:N"
                6⤵
                  PID:632
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "legola.exe" /P "Admin:R" /E
                  6⤵
                    PID:3572
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:884
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\ebb444342c" /P "Admin:N"
                      6⤵
                        PID:2504
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\ebb444342c" /P "Admin:R" /E
                        6⤵
                          PID:4448
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t6843467.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t6843467.exe
                  2⤵
                  • Executes dropped EXE
                  PID:756
              • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe
                C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe
                1⤵
                • Executes dropped EXE
                PID:440
              • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe
                C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe
                1⤵
                • Executes dropped EXE
                PID:4948
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe start wuauserv
                1⤵
                • Launches sc.exe
                PID:1660
              • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe
                C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe
                1⤵
                • Executes dropped EXE
                PID:840

              Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t6843467.exe

                      Filesize

                      173KB

                      MD5

                      6390dd7a0d60c983dd05fa60aeb1f9cb

                      SHA1

                      268d47d67b1f545435410ce837d0b026cb1e2db7

                      SHA256

                      7777365f08e05d503df21ec590de6d7d29abfcaff212fc47ff2dbcee2ea9e50e

                      SHA512

                      eff8412cc54c02d2f72fed097773719d439c4979b3fca2d16507b476c3c3888b5c31bd38adec504ee60a751ed4eb00f80f928b96b83e65b515aee87ea4129356

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0798013.exe

                      Filesize

                      234KB

                      MD5

                      c03d312eeb1d42c54d575ce2544db58f

                      SHA1

                      533fb59e9eb485f466b6418016c11cf53fc98651

                      SHA256

                      eee860edc0a46d95f673410539e9ed97da5b03f553db85701b27f22964d7e694

                      SHA512

                      de2bb3681680e5b3d6468d0fa244e3e8ed3c621e3d631bec1eea656e369300e3956955cf2d24182f2e4cbbec97319f7b89b978b0dd5727d0d286598d4404a32e

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p0352502.exe

                      Filesize

                      13KB

                      MD5

                      eb6dde3a48ab63c370fd9090fbff0205

                      SHA1

                      006c301e02e14656fe715d31878f0e35180b2bf1

                      SHA256

                      22ea650c2f7b591af30b35254d3182c2c05ee6b7e87c64166dec754cbcac2a0a

                      SHA512

                      e47e3e41b548ee3ed9476d12bc9e6d15bc8d7e02416eac3c3d131c01aa27728bb82c61df94e39c2983c36fd9b0363232634680c88e0acf630d39e48d73062e2f

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8904991.exe

                      Filesize

                      224KB

                      MD5

                      b61c79541c3cb7fa2d9a1477a6e00fa9

                      SHA1

                      6922fb1416d8baae120d0b4074d4fa106a76660d

                      SHA256

                      59016e2c510ffb82cf55fea555cbd5c94cbe07f3b0271d94dd99427895f8d7c4

                      SHA512

                      cbb775f34031bb132e5b958d48b77553198b734f5db92456a5a529447adfd26f62316bd5a80a908e85c90993753040242ad9dc374804f4e2520463e75a08a69b

                    • memory/756-36-0x00000000059E0000-0x0000000005AEA000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/756-33-0x0000000000F90000-0x0000000000FC0000-memory.dmp

                      Filesize

                      192KB

                    • memory/756-34-0x0000000003240000-0x0000000003246000-memory.dmp

                      Filesize

                      24KB

                    • memory/756-35-0x0000000005EE0000-0x00000000064F8000-memory.dmp

                      Filesize

                      6.1MB

                    • memory/756-37-0x0000000005920000-0x0000000005932000-memory.dmp

                      Filesize

                      72KB

                    • memory/756-38-0x0000000005980000-0x00000000059BC000-memory.dmp

                      Filesize

                      240KB

                    • memory/756-39-0x0000000005AF0000-0x0000000005B3C000-memory.dmp

                      Filesize

                      304KB

                    • memory/2296-15-0x0000000000660000-0x000000000066A000-memory.dmp

                      Filesize

                      40KB

                    • memory/2296-14-0x00007FFF0EED3000-0x00007FFF0EED5000-memory.dmp

                      Filesize

                      8KB