Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 18:50

General

  • Target

    00dd845a27cdd6a841129f3f25bc36fd11c64b769481d2a584164a99fbd2c3d6.exe

  • Size

    815KB

  • MD5

    1bbc286e0de70ea93a2d22382215cb6f

  • SHA1

    998f8216681b836c1c9995ffd0d617d0259fe94d

  • SHA256

    00dd845a27cdd6a841129f3f25bc36fd11c64b769481d2a584164a99fbd2c3d6

  • SHA512

    2ea1320c1e37907e97c4247b29c9723005bbf6c32e19aaac53d4f61e4c78ad260f811af031bee40cf519855f256cec7492c27988f902137c9a537df6b8f09175

  • SSDEEP

    12288:GMrgy90z+CjW5ZWOWEUTi85pVWgy4Bu8CixTSidrx1JzKHY5sLdVWcjKapw/CJ:ay6+sW5QpJvLy4Bjx5xbELORaGe

Malware Config

Extracted

Family

redline

Botnet

gruha

C2

77.91.124.55:19071

Attributes
  • auth_value

    2f4cf2e668a540e64775b27535cc6892

Extracted

Family

amadey

Version

3.89

Botnet

fb0fb8

C2

http://77.91.68.52

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explonde.exe

  • strings_key

    916aae73606d7a9e02a1d3b47c199688

  • url_paths

    /mac/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Mystic stealer payload 3 IoCs
  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00dd845a27cdd6a841129f3f25bc36fd11c64b769481d2a584164a99fbd2c3d6.exe
    "C:\Users\Admin\AppData\Local\Temp\00dd845a27cdd6a841129f3f25bc36fd11c64b769481d2a584164a99fbd2c3d6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2948
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5637144.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5637144.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1632
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1297842.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1297842.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1448
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\q7768750.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\q7768750.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3220
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:756
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3220 -s 568
            5⤵
            • Program crash
            PID:3572
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r4514159.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r4514159.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:516
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
              PID:3868
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 516 -s 584
              5⤵
              • Program crash
              PID:2916
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s8530875.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s8530875.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4544
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            4⤵
              PID:2884
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4544 -s 196
              4⤵
              • Program crash
              PID:4552
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t3656039.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t3656039.exe
          2⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4352
          • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
            "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"
            3⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4876
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F
              4⤵
              • Creates scheduled task(s)
              PID:1148
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4276
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                5⤵
                  PID:1268
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "explonde.exe" /P "Admin:N"
                  5⤵
                    PID:4984
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "explonde.exe" /P "Admin:R" /E
                    5⤵
                      PID:4616
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      5⤵
                        PID:2852
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\fefffe8cea" /P "Admin:N"
                        5⤵
                          PID:4604
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\fefffe8cea" /P "Admin:R" /E
                          5⤵
                            PID:4144
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3220 -ip 3220
                    1⤵
                      PID:4748
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 516 -ip 516
                      1⤵
                        PID:3092
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4544 -ip 4544
                        1⤵
                          PID:3016
                        • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
                          C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
                          1⤵
                          • Executes dropped EXE
                          PID:1480
                        • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
                          C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
                          1⤵
                          • Executes dropped EXE
                          PID:2488

                        Network

                        MITRE ATT&CK Matrix ATT&CK v13

                        Execution

                        Scheduled Task/Job

                        1
                        T1053

                        Persistence

                        Create or Modify System Process

                        1
                        T1543

                        Windows Service

                        1
                        T1543.003

                        Boot or Logon Autostart Execution

                        1
                        T1547

                        Registry Run Keys / Startup Folder

                        1
                        T1547.001

                        Scheduled Task/Job

                        1
                        T1053

                        Privilege Escalation

                        Create or Modify System Process

                        1
                        T1543

                        Windows Service

                        1
                        T1543.003

                        Boot or Logon Autostart Execution

                        1
                        T1547

                        Registry Run Keys / Startup Folder

                        1
                        T1547.001

                        Scheduled Task/Job

                        1
                        T1053

                        Defense Evasion

                        Modify Registry

                        2
                        T1112

                        Impair Defenses

                        1
                        T1562

                        Disable or Modify Tools

                        1
                        T1562.001

                        Discovery

                        Query Registry

                        1
                        T1012

                        System Information Discovery

                        2
                        T1082

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t3656039.exe
                          Filesize

                          219KB

                          MD5

                          c256a814d3f9d02d73029580dfe882b3

                          SHA1

                          e11e9ea937183139753f3b0d5e71c8301d000896

                          SHA256

                          53f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c

                          SHA512

                          1f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5637144.exe
                          Filesize

                          632KB

                          MD5

                          36e613620013d7c98fce6ad50f0e3c95

                          SHA1

                          c6a6fe34461cfce24c51e5bb15b1c3ac3dc76e60

                          SHA256

                          fb39eb7a4dd0c737136168f04b0b2293603b440c778b9dfd10fdda5329cd9050

                          SHA512

                          85bf562d89ca74cc3a3140ad4b51d7c3fa466be7fcb53d936046169264f01256b569af792cac5fc580527bb3451cb7a27ff7e93826c47b89a2af683833ceb3bc

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s8530875.exe
                          Filesize

                          413KB

                          MD5

                          c93c13d505991c7cb12237918c50ef65

                          SHA1

                          24ad52f45a5b27d30f763d8db79d559a7445bcae

                          SHA256

                          e5a4497939136c4bacb1ac5227957867151bf1e7be58aa92952325a79ba12edb

                          SHA512

                          614cc3719a3d666403ff2989d100b4c685b9ae6be5b21277a1a9eac8c1b4b57ceaac12e7874924e226e5fc12a008327d264cbd9afebc9aa2b3708fd11d630a22

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1297842.exe
                          Filesize

                          354KB

                          MD5

                          f9d2fcbcfca0cba8b419661c251c1eb6

                          SHA1

                          b0636f65f5b29ba8375a948e9a806d8aaebab16e

                          SHA256

                          a5ebf76860c64ee2848861fed3398dd6255a4a5eaa50e14d93e4a2b9a6c415dc

                          SHA512

                          e1421dd0d34f6cfd133666e8309b013e0a5f1ba3b025204316fd36863d671cd7f104a70f3a563b929ba184b5d9835555f44748d579ec9481704b7c1a4103c517

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\q7768750.exe
                          Filesize

                          250KB

                          MD5

                          45273b0f41e08d2f61edc364029ea992

                          SHA1

                          3ded2e0efc6558bb6cb5445da4b053374bd048dc

                          SHA256

                          cae055a0e95f4ace6e9c7a173b74294d41e326b6c5f2cc48afbf1af334afb616

                          SHA512

                          d71e3337a171927d0df2f751b62bedad3281d43515f5da1dc6b912852955994eb1f21968f76c6165924fe66babc6a772227296e42959a1122f0b677bc6fe8f69

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r4514159.exe
                          Filesize

                          379KB

                          MD5

                          767d84dfc368dfa40300726c123dce8c

                          SHA1

                          db76960b8baafd82000c3141f0fb364e0161e889

                          SHA256

                          90deb0c2cc3a1504f3313ab533135bda41d95d7fb04a69db5349b67663e59144

                          SHA512

                          e03cf9c5785b74d7f35dfcf2647010b133c114244f3eab2f098382b4c1a216ac894d91b12f87a08779083f933ded52032abdd555c5d74eae5748b0e7704dd5c4

                        • memory/756-21-0x0000000000400000-0x000000000040A000-memory.dmp
                          Filesize

                          40KB

                        • memory/2884-32-0x0000000000400000-0x0000000000430000-memory.dmp
                          Filesize

                          192KB

                        • memory/2884-33-0x0000000002680000-0x0000000002686000-memory.dmp
                          Filesize

                          24KB

                        • memory/2884-35-0x000000000A440000-0x000000000A54A000-memory.dmp
                          Filesize

                          1.0MB

                        • memory/2884-34-0x000000000A8E0000-0x000000000AEF8000-memory.dmp
                          Filesize

                          6.1MB

                        • memory/2884-36-0x000000000A370000-0x000000000A382000-memory.dmp
                          Filesize

                          72KB

                        • memory/2884-42-0x000000000A3D0000-0x000000000A40C000-memory.dmp
                          Filesize

                          240KB

                        • memory/2884-43-0x00000000047D0000-0x000000000481C000-memory.dmp
                          Filesize

                          304KB

                        • memory/3868-28-0x0000000000400000-0x0000000000428000-memory.dmp
                          Filesize

                          160KB

                        • memory/3868-26-0x0000000000400000-0x0000000000428000-memory.dmp
                          Filesize

                          160KB

                        • memory/3868-25-0x0000000000400000-0x0000000000428000-memory.dmp
                          Filesize

                          160KB