Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-05-2024 15:01

General

  • Target

    188abd944862b0218c2c1eb1ca15b896c802801a2127e4abb847bc5ba1a2eb8c.exe

  • Size

    390KB

  • MD5

    f8cfb1df4bcb4f9f8b7b9d0708e16d69

  • SHA1

    93755a42eacd228ef291a3136a1394593c678faa

  • SHA256

    188abd944862b0218c2c1eb1ca15b896c802801a2127e4abb847bc5ba1a2eb8c

  • SHA512

    12b8522f261a7e3d0b91a41cfbf93b80bd10ffde1f8b53c548e8aafcca765cd92f511b71d05a298b7712e9f30b3cf81eced8ffe73ebee48b3230d5402cdf3f68

  • SSDEEP

    6144:KQy+bnr+lp0yN90QE4JX36Yol3tvc630ZEnOOZ38ow6db8IEw2+ogF1AmoTMJrTH:0MrFy9003obIE3dwooI+c1AlTM0Mq8X

Malware Config

Extracted

Family

amadey

Version

3.86

C2

http://5.42.92.67

Attributes
  • install_dir

    ebb444342c

  • install_file

    legola.exe

  • strings_key

    5680b049188ecacbfa57b1b29c2f35a7

  • url_paths

    /norm/index.php

rc4.plain

Extracted

Family

redline

Botnet

krast

C2

77.91.68.68:19071

Attributes
  • auth_value

    9059ea331e4599de3746df73ccb24514

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\188abd944862b0218c2c1eb1ca15b896c802801a2127e4abb847bc5ba1a2eb8c.exe
    "C:\Users\Admin\AppData\Local\Temp\188abd944862b0218c2c1eb1ca15b896c802801a2127e4abb847bc5ba1a2eb8c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2516
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8834784.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8834784.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4684
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p6024513.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p6024513.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:224
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3281945.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3281945.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4520
        • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe
          "C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2256
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legola.exe /TR "C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:4732
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legola.exe" /P "Admin:N"&&CACLS "legola.exe" /P "Admin:R" /E&&echo Y|CACLS "..\ebb444342c" /P "Admin:N"&&CACLS "..\ebb444342c" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4444
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:3736
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "legola.exe" /P "Admin:N"
                6⤵
                  PID:4872
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "legola.exe" /P "Admin:R" /E
                  6⤵
                    PID:1936
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:4988
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\ebb444342c" /P "Admin:N"
                      6⤵
                        PID:4640
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\ebb444342c" /P "Admin:R" /E
                        6⤵
                          PID:636
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t4703666.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t4703666.exe
                  2⤵
                  • Executes dropped EXE
                  PID:524
              • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe
                C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe
                1⤵
                • Executes dropped EXE
                PID:1580
              • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe
                C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe
                1⤵
                • Executes dropped EXE
                PID:1368

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t4703666.exe

                Filesize

                173KB

                MD5

                92896756339664edd69e086829234514

                SHA1

                b3b9f861a5fa36bb344d5c52391d3ff0cae9de5b

                SHA256

                dfce1ccb0f6ba325e07ab39dd9280e2610f4adfe1857583df952671a4448e6be

                SHA512

                47808b5c0c81769d29786a7cb30838261d7eaa9173f9f945d69f00a70b426afde307756d26c1eeea3688f6ea0076c703e0be1b2040f18199fd0b7466ab979b25

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8834784.exe

                Filesize

                234KB

                MD5

                fabbcd6d7c76d9310107813b06225a8d

                SHA1

                0e797be42bb783a6c897d9ea7c0f16c897eb33a3

                SHA256

                95a6babc911300f9cebcbb8bd2cfabb550b74da7e6098500aa8bbf8b6a29bcf4

                SHA512

                a4ec410d28a284002f113abec2f7e46d7c27acca834e73a74f4b259ec4d7cc23da54d6ca8fd01ad9b5d693579a916654612f8da6c582c6ab496a99cb9c382091

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p6024513.exe

                Filesize

                11KB

                MD5

                8049e71888ff041f4fa1afce82cc1dd6

                SHA1

                057a9a55a81dae9428d7023f11dabfb2d2b8095f

                SHA256

                479076695d105e53b0116565376c01af1a216c2f4a62389f9eef696b78c0dda6

                SHA512

                570b943be0eee0482f7af50a617b9e5978b3c578c24acf79c1c88297389949c98c8e1afed6a7e8513899cb5986c3700d79332170bba712a771ce739191acbebb

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3281945.exe

                Filesize

                223KB

                MD5

                ce6eb063a96f68056943450f2cb130bd

                SHA1

                aa9b744dc8e5bf692babe6251a8e576841884cc8

                SHA256

                1dfb1add3b793558718e67479b5765bdaab5eb23fe5395e1ad75a263cc2fbf8f

                SHA512

                d78670ff1bc408ad96dcff1f357859167aaec9b01666e238643c1a799e368a791d617de78784d880120d56600e31ababb9aa8810f5cb7dc5e57e0686bbf0a554

              • memory/224-15-0x00000000005F0000-0x00000000005FA000-memory.dmp

                Filesize

                40KB

              • memory/224-14-0x00007FFD8F803000-0x00007FFD8F805000-memory.dmp

                Filesize

                8KB

              • memory/524-33-0x0000000000450000-0x0000000000480000-memory.dmp

                Filesize

                192KB

              • memory/524-34-0x0000000000B50000-0x0000000000B56000-memory.dmp

                Filesize

                24KB

              • memory/524-35-0x0000000005600000-0x0000000005C18000-memory.dmp

                Filesize

                6.1MB

              • memory/524-36-0x00000000050F0000-0x00000000051FA000-memory.dmp

                Filesize

                1.0MB

              • memory/524-37-0x0000000004E10000-0x0000000004E22000-memory.dmp

                Filesize

                72KB

              • memory/524-38-0x0000000004E70000-0x0000000004EAC000-memory.dmp

                Filesize

                240KB

              • memory/524-39-0x0000000004FE0000-0x000000000502C000-memory.dmp

                Filesize

                304KB