Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 18:50

General

  • Target

    2469003f42fad7f59b70f7ba006c65ee5db3798dfa579f761b047cd449e394fb.exe

  • Size

    600KB

  • MD5

    92caeb092fe661984d6b5938db1e3d2c

  • SHA1

    aab1602e93402605ae2f28b22ff993873730532a

  • SHA256

    2469003f42fad7f59b70f7ba006c65ee5db3798dfa579f761b047cd449e394fb

  • SHA512

    76aeb5a9753b57d6cecc4474965e0a623ab13ab5ca9439c2ce2d43797afded16c738fb0339789edf61bf6ce59c7df884ed120c57c1ed29536643d3df8be638f9

  • SSDEEP

    12288:JMr+y90odZgZUSkyiUAl6cKF/e7oVrKRQEXFp7GDlSAEkObTn94b:fyhrPqAQc2G7oNKeEnGDQMOd4b

Malware Config

Extracted

Family

amadey

Version

3.87

Botnet

59b440

C2

http://77.91.68.18

Attributes
  • install_dir

    b40d11255d

  • install_file

    saves.exe

  • strings_key

    fa622dfc42544927a6471829ee1fa9fe

  • url_paths

    /nice/index.php

rc4.plain

Extracted

Family

redline

Botnet

mrak

C2

77.91.124.82:19071

Attributes
  • auth_value

    7d9a335ab5dfd42d374867c96fe25302

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Mystic stealer payload 1 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2469003f42fad7f59b70f7ba006c65ee5db3798dfa579f761b047cd449e394fb.exe
    "C:\Users\Admin\AppData\Local\Temp\2469003f42fad7f59b70f7ba006c65ee5db3798dfa579f761b047cd449e394fb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2308
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2378133.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2378133.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3100
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4916712.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4916712.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4320
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3737668.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3737668.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1620
          • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
            "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1728
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:3132
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2328
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:2112
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "saves.exe" /P "Admin:N"
                  7⤵
                    PID:4108
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "saves.exe" /P "Admin:R" /E
                    7⤵
                      PID:5016
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:1144
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\b40d11255d" /P "Admin:N"
                        7⤵
                          PID:640
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\b40d11255d" /P "Admin:R" /E
                          7⤵
                            PID:788
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1422656.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1422656.exe
                      4⤵
                      • Executes dropped EXE
                      PID:2036
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d9711648.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d9711648.exe
                    3⤵
                    • Executes dropped EXE
                    PID:888
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:4064
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:3500
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:3344

              Network

              MITRE ATT&CK Matrix ATT&CK v13

              Execution

              Scheduled Task/Job

              1
              T1053

              Persistence

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Scheduled Task/Job

              1
              T1053

              Privilege Escalation

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Scheduled Task/Job

              1
              T1053

              Defense Evasion

              Modify Registry

              1
              T1112

              Discovery

              Query Registry

              1
              T1012

              System Information Discovery

              2
              T1082

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2378133.exe
                Filesize

                475KB

                MD5

                a6cba3983691b63782055d6a5e8d568e

                SHA1

                eb7c0479ca7e2277d64af94116fc7c794fafedc9

                SHA256

                0cad3d06292b2e69338c9795ea680ee9aa73b6b53b3c893f69b591d7495d3cab

                SHA512

                cbda81d6455a1bd04b7fe98766776d15fa67d65917776399b054560bacca4e898d03e75f7d0a57deeaa1b3044afd8ea16542a1c4f964f1c92fad38208b6b5844

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d9711648.exe
                Filesize

                173KB

                MD5

                3746b82fd2c0730d82a029824aca537b

                SHA1

                c869654d5abc34dfcecf5cb7f988b74ba0c3a381

                SHA256

                38a34d128bbd7405d2d9f90f532af35c28023c5362b830b3267a529b39188d86

                SHA512

                4d3af4a02d4749d556f4f246d3d756c09403a03bf6c1c1e8a68308b63e751d34bf1ed4844addefea5aeeb848fc88098737f7ef0b189e10694f494001f6b09062

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4916712.exe
                Filesize

                320KB

                MD5

                19b7368e3063539f75c22561487a6a91

                SHA1

                2644acb5025da4b9c94451ce177dd47aff9609d0

                SHA256

                e3fa594d84c3226c70e1deb782a5a8ea254152f17b8455d49923c16646ebf739

                SHA512

                b6d2e5febef2b66603a5daeb3c81349e9ec1657492040c5c088b657af5fc00ca3157945b743615449bc2a45be07820e5ef1315bf5d997b9831eca7d662cf95e2

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3737668.exe
                Filesize

                336KB

                MD5

                5caa9161da052af9a42bb1e1ba21f727

                SHA1

                81331a141dd208881173587c7cddf77389d97a79

                SHA256

                523ac0d13ca3604f47bca59a2543837a96d76d709fd376c34ef217f753a459b8

                SHA512

                8ba3665b84a33ee0a991a4001c9b1beaba8a63edb56db6723358a1b5a185d56d73fcf4927fcbc38a731e83a206a5224186d9a33f4944ef60613f991ad1d55a94

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1422656.exe
                Filesize

                141KB

                MD5

                0f64d4502c9ed8177a82b3bea893e56e

                SHA1

                97a7e92543f6c48950fe4a45325e89a7c35a05ce

                SHA256

                953191bb67e00845e433e49297bb8fa2b90cadd0d6645da2e145ed71261e91be

                SHA512

                5fa163380f06ebfdcc6a003f4c996f21994d9890e893403a881d56d8613707d4c2071995a34905daa503801cf764002166e6d2600db920fa8e75e396cda110e4

              • memory/888-36-0x0000000000350000-0x0000000000380000-memory.dmp
                Filesize

                192KB

              • memory/888-37-0x0000000006FC0000-0x0000000006FC6000-memory.dmp
                Filesize

                24KB

              • memory/888-38-0x0000000005260000-0x0000000005878000-memory.dmp
                Filesize

                6.1MB

              • memory/888-39-0x0000000004D90000-0x0000000004E9A000-memory.dmp
                Filesize

                1.0MB

              • memory/888-40-0x0000000004CC0000-0x0000000004CD2000-memory.dmp
                Filesize

                72KB

              • memory/888-41-0x0000000004D20000-0x0000000004D5C000-memory.dmp
                Filesize

                240KB

              • memory/888-42-0x0000000004EA0000-0x0000000004EEC000-memory.dmp
                Filesize

                304KB