Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 18:20

General

  • Target

    4563b46d64120bf9833b2c3a8c333cb31977f9c75d32f836c04620dc0ce6623c.exe

  • Size

    1.0MB

  • MD5

    8fe82d0e2d2518638a767d3f01fdac83

  • SHA1

    42909c9e87631077b5e113a22bf1245310ea602e

  • SHA256

    4563b46d64120bf9833b2c3a8c333cb31977f9c75d32f836c04620dc0ce6623c

  • SHA512

    333c825d1eec6f9adca67a48a3875526ae357c871c3bb0d9da39f4bd3822f9668d44f32951c501e0aee6cb5ee3b6798f6f0279a90ab726604f7e2856dd371df7

  • SSDEEP

    24576:oyhpxgYfKwXna+XvuL3IWmgqG3x/YcVDHG72+opgKICo/:vjxg8XxmHTc6pgKI

Malware Config

Extracted

Family

amadey

Version

3.87

Botnet

59b440

C2

http://77.91.68.18

Attributes
  • install_dir

    b40d11255d

  • install_file

    saves.exe

  • strings_key

    fa622dfc42544927a6471829ee1fa9fe

  • url_paths

    /nice/index.php

rc4.plain

Extracted

Family

redline

Botnet

mrak

C2

77.91.124.82:19071

Attributes
  • auth_value

    7d9a335ab5dfd42d374867c96fe25302

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Mystic stealer payload 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4563b46d64120bf9833b2c3a8c333cb31977f9c75d32f836c04620dc0ce6623c.exe
    "C:\Users\Admin\AppData\Local\Temp\4563b46d64120bf9833b2c3a8c333cb31977f9c75d32f836c04620dc0ce6623c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8604958.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8604958.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3972
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4048091.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4048091.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3956
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4518310.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4518310.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2208
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6792313.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6792313.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:3296
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3911739.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3911739.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4092
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3265909.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3265909.exe
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2608
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
                7⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:4796
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                  8⤵
                  • Creates scheduled task(s)
                  PID:4988
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2596
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    9⤵
                      PID:5056
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "saves.exe" /P "Admin:N"
                      9⤵
                        PID:4724
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "saves.exe" /P "Admin:R" /E
                        9⤵
                          PID:2032
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                          9⤵
                            PID:3444
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\b40d11255d" /P "Admin:N"
                            9⤵
                              PID:2716
                            • C:\Windows\SysWOW64\cacls.exe
                              CACLS "..\b40d11255d" /P "Admin:R" /E
                              9⤵
                                PID:2792
                      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s7153634.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s7153634.exe
                        5⤵
                        • Executes dropped EXE
                        PID:1344
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t3406829.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t3406829.exe
                      4⤵
                      • Executes dropped EXE
                      PID:5112
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:4708
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:4452
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe start wuauserv
                1⤵
                • Launches sc.exe
                PID:1396

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8604958.exe

                Filesize

                932KB

                MD5

                a58644eb45239964236ec05cce13b249

                SHA1

                d1a59a990c82f2c105d3da2fc1522465941cc38e

                SHA256

                e00fcf7879b51547a2dcea474889c5b5138db2146ddb3e381b1da72924a4c6ff

                SHA512

                7ff37c6d9c15e417732ef48a71a944028aa9435ce20213995126340415e08aa6e80cac946ab56dda74f600a531964ea0eabd2ca1279c137e362a8a8274c0d088

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4048091.exe

                Filesize

                706KB

                MD5

                acbd5eb455eeef31f3fc512830bb9815

                SHA1

                c9a92ff92b2a98d3bec72d352115391f09285e78

                SHA256

                ebe45a4ecd5fb54693a48cee72ddf56a65b8f20bfd7265a70a47d98ca94103af

                SHA512

                e17334013b4689d68f5b7c70dcd49a0c371549f7b7fd1da8a6f87985a087307003eb2147cd16b17a1fa011e5d2f4d0666a3e694505a9626a35f631cfe6fc6607

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t3406829.exe

                Filesize

                173KB

                MD5

                76de42d01980bcad529962fd08778f80

                SHA1

                76e10520b7ed6d95328ace86ac09385bbb0128b5

                SHA256

                edca3ab3efd99c653e933d73e6198a67eb4e316e59c46fc4e42bafdfd856e51f

                SHA512

                a26efc3e0bffbd82719c96a0bde994df59c2da9ad05d7f94a959b8679e07d4f6adeb1e01e1c687d399fede3e807c01c374392fb4d9767d10423eceb02d01bae3

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4518310.exe

                Filesize

                550KB

                MD5

                4b2c0c80b2a28c7c8745adc03f1db440

                SHA1

                c0b8f219d54fe1ab92ab230c27a95e6c4f7de144

                SHA256

                0dc4b0ea6084e1c071a1e4ffc36a3848536a52a521750de81c59e37a5da15277

                SHA512

                730375291b0dedaec51ec59a6e7ec67b6b32b0cb354411500620177c7edc36d7696d5712cbe3a76edbc4c548e3bd55827fdd4ada79b5fb67adb1b689f4286c7c

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s7153634.exe

                Filesize

                141KB

                MD5

                1d08f87e73e654eebdc4c6fc65bb4384

                SHA1

                46565e4ccc6f0d3284db8766051b5ff874b5cdff

                SHA256

                30cb56e5c1e5ff45b9b263043454f6b6c3ff8a104a28db100985581d28052579

                SHA512

                9665aa87927a8288c68ce7d4bdb765cc8651db30db645e24b29074c3003ed661c12333266aedcdd50ac58e03d9e1b2cd906d4b9343f13ae4764d454f408cfbb7

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6792313.exe

                Filesize

                384KB

                MD5

                69e7719f6476e97aaa9979c2d5653a96

                SHA1

                147a3b24d5c166959ddc577d9ed55b6697bbe464

                SHA256

                962b0f5c7d41692b35e966b876883354ef256e58e04d019aae6d58d6dd644ab0

                SHA512

                2bd46236f3eca45b76623336d0c871023198dc01060511b6cc8735746f130a8f995f1ea11349eed63329fc5b9348ab51248c56c756d80780a8f6c621b32e6989

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3911739.exe

                Filesize

                185KB

                MD5

                250f7c6a5a07a08e4486c49d8b00aa24

                SHA1

                6de9b91376b77b411995462e90586d463236b8c6

                SHA256

                266d70698bc42701680aba69d44dafa2869dca61f9f7d67b3006fb1c79c4c498

                SHA512

                eb380128354fbf23456831f5793272a1a19c03dcd616746750ec63376e1ed3a00100648ea487d309a3a83f41d55d2cdc58fc44ff918b8f8bef4ab59a9ec466ec

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3265909.exe

                Filesize

                335KB

                MD5

                6cbeaca077f1783f3e8aede0772ba92e

                SHA1

                92f3db4070fb08186f75775196138edbf464db69

                SHA256

                cbcfeb1a949e41ff701eb2b5e444497d6b470808fd60dec76e8d0aa576bd031b

                SHA512

                ac78a8b769356dac610176b8abbd29ce9e4dfc45616ba88460f6c1934570fd980935cf079d3420ecec78abc301e94488c1bdf6f5932e68323cea9992725ac35c

              • memory/4092-38-0x0000000004F50000-0x0000000004F66000-memory.dmp

                Filesize

                88KB

              • memory/4092-41-0x0000000004F50000-0x0000000004F66000-memory.dmp

                Filesize

                88KB

              • memory/4092-63-0x0000000004F50000-0x0000000004F66000-memory.dmp

                Filesize

                88KB

              • memory/4092-61-0x0000000004F50000-0x0000000004F66000-memory.dmp

                Filesize

                88KB

              • memory/4092-60-0x0000000004F50000-0x0000000004F66000-memory.dmp

                Filesize

                88KB

              • memory/4092-57-0x0000000004F50000-0x0000000004F66000-memory.dmp

                Filesize

                88KB

              • memory/4092-56-0x0000000004F50000-0x0000000004F66000-memory.dmp

                Filesize

                88KB

              • memory/4092-53-0x0000000004F50000-0x0000000004F66000-memory.dmp

                Filesize

                88KB

              • memory/4092-51-0x0000000004F50000-0x0000000004F66000-memory.dmp

                Filesize

                88KB

              • memory/4092-49-0x0000000004F50000-0x0000000004F66000-memory.dmp

                Filesize

                88KB

              • memory/4092-47-0x0000000004F50000-0x0000000004F66000-memory.dmp

                Filesize

                88KB

              • memory/4092-45-0x0000000004F50000-0x0000000004F66000-memory.dmp

                Filesize

                88KB

              • memory/4092-43-0x0000000004F50000-0x0000000004F66000-memory.dmp

                Filesize

                88KB

              • memory/4092-65-0x0000000004F50000-0x0000000004F66000-memory.dmp

                Filesize

                88KB

              • memory/4092-39-0x0000000004F50000-0x0000000004F66000-memory.dmp

                Filesize

                88KB

              • memory/4092-37-0x0000000004F50000-0x0000000004F6C000-memory.dmp

                Filesize

                112KB

              • memory/4092-36-0x00000000049A0000-0x0000000004F44000-memory.dmp

                Filesize

                5.6MB

              • memory/4092-35-0x0000000002480000-0x000000000249E000-memory.dmp

                Filesize

                120KB

              • memory/5112-85-0x0000000000D90000-0x0000000000DC0000-memory.dmp

                Filesize

                192KB

              • memory/5112-86-0x00000000056B0000-0x00000000056B6000-memory.dmp

                Filesize

                24KB

              • memory/5112-87-0x0000000005D40000-0x0000000006358000-memory.dmp

                Filesize

                6.1MB

              • memory/5112-88-0x0000000005830000-0x000000000593A000-memory.dmp

                Filesize

                1.0MB

              • memory/5112-89-0x0000000005720000-0x0000000005732000-memory.dmp

                Filesize

                72KB

              • memory/5112-90-0x0000000005740000-0x000000000577C000-memory.dmp

                Filesize

                240KB

              • memory/5112-91-0x00000000057C0000-0x000000000580C000-memory.dmp

                Filesize

                304KB