Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 18:50

General

  • Target

    77ac4e5ef850f053915a6aca7fc85f62c897f29cc6bc77bfbb192062c7aa5053.exe

  • Size

    572KB

  • MD5

    1ac19b91e5253c091061691c660c70fb

  • SHA1

    7b113146e03c198d1cd4a7b1d10c2dad5bb6a909

  • SHA256

    77ac4e5ef850f053915a6aca7fc85f62c897f29cc6bc77bfbb192062c7aa5053

  • SHA512

    6ed54774d55e8fc33480a56533c43f8eeffa64c225832e9e7aa932566c66bc80a0c1b9cf95db749f2a024316d57779255659151a483d7c5acc9c24e483e6af08

  • SSDEEP

    12288:6Mr9y90/DGsxoXIq17/+FrSBIEBOFgJdHsKPdg54J:HysGwo4cb+dSOA7rPfJ

Malware Config

Extracted

Family

amadey

Version

3.89

Botnet

fb0fb8

C2

http://77.91.68.52

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explonde.exe

  • strings_key

    916aae73606d7a9e02a1d3b47c199688

  • url_paths

    /mac/index.php

rc4.plain

Extracted

Family

redline

Botnet

mrak

C2

77.91.124.82:19071

Attributes
  • auth_value

    7d9a335ab5dfd42d374867c96fe25302

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\77ac4e5ef850f053915a6aca7fc85f62c897f29cc6bc77bfbb192062c7aa5053.exe
    "C:\Users\Admin\AppData\Local\Temp\77ac4e5ef850f053915a6aca7fc85f62c897f29cc6bc77bfbb192062c7aa5053.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2904
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2121682.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2121682.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4596
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2849645.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2849645.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3444
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\q7686010.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\q7686010.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2576
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r7196851.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r7196851.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2672
          • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
            "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4868
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:4112
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:3488
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:1364
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "explonde.exe" /P "Admin:N"
                  7⤵
                    PID:2820
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "explonde.exe" /P "Admin:R" /E
                    7⤵
                      PID:1432
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:4048
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\fefffe8cea" /P "Admin:N"
                        7⤵
                          PID:1504
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\fefffe8cea" /P "Admin:R" /E
                          7⤵
                            PID:4304
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s1871232.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s1871232.exe
                    3⤵
                    • Executes dropped EXE
                    PID:3424
              • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
                C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
                1⤵
                • Executes dropped EXE
                PID:4956
              • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
                C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
                1⤵
                • Executes dropped EXE
                PID:8
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe start wuauserv
                1⤵
                • Launches sc.exe
                PID:4728
              • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
                C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
                1⤵
                • Executes dropped EXE
                PID:3664

              Network

              MITRE ATT&CK Matrix ATT&CK v13

              Execution

              Scheduled Task/Job

              1
              T1053

              Persistence

              Create or Modify System Process

              1
              T1543

              Windows Service

              1
              T1543.003

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Scheduled Task/Job

              1
              T1053

              Privilege Escalation

              Create or Modify System Process

              1
              T1543

              Windows Service

              1
              T1543.003

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Scheduled Task/Job

              1
              T1053

              Defense Evasion

              Modify Registry

              3
              T1112

              Impair Defenses

              2
              T1562

              Disable or Modify Tools

              2
              T1562.001

              Discovery

              Query Registry

              1
              T1012

              System Information Discovery

              2
              T1082

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2121682.exe
                Filesize

                390KB

                MD5

                af64dd4608c03a5ccca7f0c55331acb2

                SHA1

                28225983cb51e94173ef73fa058fd6e27a3d4c30

                SHA256

                9e5e86873a0dd192be96daacd1c15a9d5231dd48887c55b1ad2b6580f4ecac5f

                SHA512

                30d3858d35fdfa9e269ebe72e7df341099d08791b708b14f848f1e05671d2cf8edee2e1d8f5229a6968fd464039e429744f03fa4e76bcce9ad47aa414496a226

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s1871232.exe
                Filesize

                176KB

                MD5

                484aa8a994e4b0d4f6394de29572fedf

                SHA1

                136dd59824c115d7ed7177b1cd443d8aea19917e

                SHA256

                5f251747cc00b6519344a8eab58b8bc8d321280d88e27c5bff306f40a53df0b4

                SHA512

                984122db98e575fd3ec63a9198905bd24123620656345b76930d3428d5c1d88bf9ce7563b0f1212147a72ff8c16924a6c2259c9672bad511112c76893b07b8c4

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2849645.exe
                Filesize

                234KB

                MD5

                45e93a000b07f25fe943fdf1f7b65357

                SHA1

                87725546f53447d680f47e63a0cc581dcd4503fa

                SHA256

                9a45e9c2060aa38e5c0bd25ef98f2a3acb0c464207b459fa09e6fe8492e26755

                SHA512

                83cb89078894b96f0bf1f7a8ef6b2983d7e21f60bd575004772267424c4603b75e18f9f805535634a9678aa58494f25eb83fdfc36553f25b3c80bdd4691b2c6d

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\q7686010.exe
                Filesize

                12KB

                MD5

                05d44dca7da313a6875ab2e2ce15cf4c

                SHA1

                fb62bcfc8209d7246dce532fd00d4ea2d56ecb71

                SHA256

                b894a0dc444adc2774ca868edb76d306b089eccd9dbea910c9a5f8bb7f4dc50c

                SHA512

                01075dd204512cb35dcd4cb0f77fe2962ee2e8709ff48cf36b3e681b96caafe1c4edcb0b4cab6be77754f791907dfd368570b425e89f740231578f19e2fc3fb7

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r7196851.exe
                Filesize

                221KB

                MD5

                a179aaa8b2da45d6806e6a737696d101

                SHA1

                0d5e6174461ffb16368cd80216abca674d893660

                SHA256

                f13ad3f74496d3eb644233b1f70c1b9c10abdd4b777007daa0d391fbfdd44a73

                SHA512

                41b53c48d9f6ba2bb744e48654957b12c93493cb1f2bfc11bac85694eaac5642bb3480fbaea1d16d5a89b886289efcbfc527c762114a4d85f7cbbef7eac3d375

              • memory/2576-21-0x0000000000CF0000-0x0000000000CFA000-memory.dmp
                Filesize

                40KB

              • memory/2576-22-0x00007FFE5F563000-0x00007FFE5F565000-memory.dmp
                Filesize

                8KB

              • memory/3424-39-0x0000000000500000-0x0000000000530000-memory.dmp
                Filesize

                192KB

              • memory/3424-40-0x0000000004DE0000-0x0000000004DE6000-memory.dmp
                Filesize

                24KB

              • memory/3424-41-0x000000000A810000-0x000000000AE28000-memory.dmp
                Filesize

                6.1MB

              • memory/3424-42-0x000000000A370000-0x000000000A47A000-memory.dmp
                Filesize

                1.0MB

              • memory/3424-43-0x000000000A2A0000-0x000000000A2B2000-memory.dmp
                Filesize

                72KB

              • memory/3424-44-0x000000000A300000-0x000000000A33C000-memory.dmp
                Filesize

                240KB

              • memory/3424-45-0x0000000002780000-0x00000000027CC000-memory.dmp
                Filesize

                304KB