Analysis

  • max time kernel
    143s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 18:05

General

  • Target

    188abd944862b0218c2c1eb1ca15b896c802801a2127e4abb847bc5ba1a2eb8c.exe

  • Size

    390KB

  • MD5

    f8cfb1df4bcb4f9f8b7b9d0708e16d69

  • SHA1

    93755a42eacd228ef291a3136a1394593c678faa

  • SHA256

    188abd944862b0218c2c1eb1ca15b896c802801a2127e4abb847bc5ba1a2eb8c

  • SHA512

    12b8522f261a7e3d0b91a41cfbf93b80bd10ffde1f8b53c548e8aafcca765cd92f511b71d05a298b7712e9f30b3cf81eced8ffe73ebee48b3230d5402cdf3f68

  • SSDEEP

    6144:KQy+bnr+lp0yN90QE4JX36Yol3tvc630ZEnOOZ38ow6db8IEw2+ogF1AmoTMJrTH:0MrFy9003obIE3dwooI+c1AlTM0Mq8X

Malware Config

Extracted

Family

amadey

Version

3.86

C2

http://5.42.92.67

Attributes
  • install_dir

    ebb444342c

  • install_file

    legola.exe

  • strings_key

    5680b049188ecacbfa57b1b29c2f35a7

  • url_paths

    /norm/index.php

rc4.plain

Extracted

Family

redline

Botnet

krast

C2

77.91.68.68:19071

Attributes
  • auth_value

    9059ea331e4599de3746df73ccb24514

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\188abd944862b0218c2c1eb1ca15b896c802801a2127e4abb847bc5ba1a2eb8c.exe
    "C:\Users\Admin\AppData\Local\Temp\188abd944862b0218c2c1eb1ca15b896c802801a2127e4abb847bc5ba1a2eb8c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4196
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8834784.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8834784.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:396
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p6024513.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p6024513.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1924
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3281945.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3281945.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2772
        • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe
          "C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2148
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legola.exe /TR "C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:2164
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legola.exe" /P "Admin:N"&&CACLS "legola.exe" /P "Admin:R" /E&&echo Y|CACLS "..\ebb444342c" /P "Admin:N"&&CACLS "..\ebb444342c" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:868
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:4492
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "legola.exe" /P "Admin:N"
                6⤵
                  PID:4728
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "legola.exe" /P "Admin:R" /E
                  6⤵
                    PID:824
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:1604
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\ebb444342c" /P "Admin:N"
                      6⤵
                        PID:740
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\ebb444342c" /P "Admin:R" /E
                        6⤵
                          PID:3176
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t4703666.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t4703666.exe
                  2⤵
                  • Executes dropped EXE
                  PID:928
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4744,i,15142778360084620907,1763097090506261076,262144 --variations-seed-version --mojo-platform-channel-handle=1036 /prefetch:8
                1⤵
                  PID:1324
                • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe
                  C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe
                  1⤵
                  • Executes dropped EXE
                  PID:968
                • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe
                  C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe
                  1⤵
                  • Executes dropped EXE
                  PID:4160

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t4703666.exe
                  Filesize

                  173KB

                  MD5

                  92896756339664edd69e086829234514

                  SHA1

                  b3b9f861a5fa36bb344d5c52391d3ff0cae9de5b

                  SHA256

                  dfce1ccb0f6ba325e07ab39dd9280e2610f4adfe1857583df952671a4448e6be

                  SHA512

                  47808b5c0c81769d29786a7cb30838261d7eaa9173f9f945d69f00a70b426afde307756d26c1eeea3688f6ea0076c703e0be1b2040f18199fd0b7466ab979b25

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8834784.exe
                  Filesize

                  234KB

                  MD5

                  fabbcd6d7c76d9310107813b06225a8d

                  SHA1

                  0e797be42bb783a6c897d9ea7c0f16c897eb33a3

                  SHA256

                  95a6babc911300f9cebcbb8bd2cfabb550b74da7e6098500aa8bbf8b6a29bcf4

                  SHA512

                  a4ec410d28a284002f113abec2f7e46d7c27acca834e73a74f4b259ec4d7cc23da54d6ca8fd01ad9b5d693579a916654612f8da6c582c6ab496a99cb9c382091

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p6024513.exe
                  Filesize

                  11KB

                  MD5

                  8049e71888ff041f4fa1afce82cc1dd6

                  SHA1

                  057a9a55a81dae9428d7023f11dabfb2d2b8095f

                  SHA256

                  479076695d105e53b0116565376c01af1a216c2f4a62389f9eef696b78c0dda6

                  SHA512

                  570b943be0eee0482f7af50a617b9e5978b3c578c24acf79c1c88297389949c98c8e1afed6a7e8513899cb5986c3700d79332170bba712a771ce739191acbebb

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3281945.exe
                  Filesize

                  223KB

                  MD5

                  ce6eb063a96f68056943450f2cb130bd

                  SHA1

                  aa9b744dc8e5bf692babe6251a8e576841884cc8

                  SHA256

                  1dfb1add3b793558718e67479b5765bdaab5eb23fe5395e1ad75a263cc2fbf8f

                  SHA512

                  d78670ff1bc408ad96dcff1f357859167aaec9b01666e238643c1a799e368a791d617de78784d880120d56600e31ababb9aa8810f5cb7dc5e57e0686bbf0a554

                • memory/928-36-0x0000000004D90000-0x0000000004E9A000-memory.dmp
                  Filesize

                  1.0MB

                • memory/928-33-0x0000000000290000-0x00000000002C0000-memory.dmp
                  Filesize

                  192KB

                • memory/928-34-0x0000000002580000-0x0000000002586000-memory.dmp
                  Filesize

                  24KB

                • memory/928-35-0x00000000052A0000-0x00000000058B8000-memory.dmp
                  Filesize

                  6.1MB

                • memory/928-37-0x0000000004C10000-0x0000000004C22000-memory.dmp
                  Filesize

                  72KB

                • memory/928-38-0x0000000004C80000-0x0000000004CBC000-memory.dmp
                  Filesize

                  240KB

                • memory/928-39-0x0000000004CC0000-0x0000000004D0C000-memory.dmp
                  Filesize

                  304KB

                • memory/1924-15-0x0000000000940000-0x000000000094A000-memory.dmp
                  Filesize

                  40KB

                • memory/1924-14-0x00007FFAFBAB3000-0x00007FFAFBAB5000-memory.dmp
                  Filesize

                  8KB