Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 19:12

General

  • Target

    35cd974b16f79c47cbb0de20c8a1ff5494093da28e9909d73df1cc40bc1e6dec.exe

  • Size

    1.3MB

  • MD5

    d1f9a12cbe2463928f93af9df2581972

  • SHA1

    9d71be92b4a421e298ae6fc509d326e6fcd3b3c1

  • SHA256

    35cd974b16f79c47cbb0de20c8a1ff5494093da28e9909d73df1cc40bc1e6dec

  • SHA512

    125939fc5108d907644aea134f4c3a4ec961a3bb1a6111db4863b532ed671f685165154689a14f9bc735ab887d1296aed99f373ab3f98c1a0f9a590d52a41e83

  • SSDEEP

    24576:by9RXWCPEo9sN4cLWpA7eCKs6Rg8m/ZWOBjSYK9SvBsn64boafIBQ01K0Vry:O9RXWSEo9smcL++cs6inHBjSBA+rpk

Malware Config

Extracted

Family

amadey

Version

3.89

Botnet

fb0fb8

C2

http://77.91.68.52

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explonde.exe

  • strings_key

    916aae73606d7a9e02a1d3b47c199688

  • url_paths

    /mac/index.php

rc4.plain

Extracted

Family

redline

Botnet

mrak

C2

77.91.124.82:19071

Attributes
  • auth_value

    7d9a335ab5dfd42d374867c96fe25302

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Mystic stealer payload 1 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35cd974b16f79c47cbb0de20c8a1ff5494093da28e9909d73df1cc40bc1e6dec.exe
    "C:\Users\Admin\AppData\Local\Temp\35cd974b16f79c47cbb0de20c8a1ff5494093da28e9909d73df1cc40bc1e6dec.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5819175.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5819175.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4176
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0598187.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0598187.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:348
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y5500197.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y5500197.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2484
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l1296671.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l1296671.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3940
            • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
              "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1140
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:4396
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:4880
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:2240
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "explonde.exe" /P "Admin:N"
                    8⤵
                      PID:1068
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "explonde.exe" /P "Admin:R" /E
                      8⤵
                        PID:3100
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:628
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\fefffe8cea" /P "Admin:N"
                          8⤵
                            PID:5044
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\fefffe8cea" /P "Admin:R" /E
                            8⤵
                              PID:2488
                      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m5176152.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m5176152.exe
                        5⤵
                        • Executes dropped EXE
                        PID:2364
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n4997969.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n4997969.exe
                      4⤵
                      • Executes dropped EXE
                      PID:4232
              • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
                C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
                1⤵
                • Executes dropped EXE
                PID:4200
              • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
                C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
                1⤵
                • Executes dropped EXE
                PID:1860

              Network

              MITRE ATT&CK Matrix ATT&CK v13

              Execution

              Scheduled Task/Job

              1
              T1053

              Persistence

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Scheduled Task/Job

              1
              T1053

              Privilege Escalation

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Scheduled Task/Job

              1
              T1053

              Defense Evasion

              Modify Registry

              1
              T1112

              Discovery

              Query Registry

              1
              T1012

              System Information Discovery

              2
              T1082

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5819175.exe
                Filesize

                1.2MB

                MD5

                ac5e91f34cbbf36db18a8686c4a0699e

                SHA1

                ffd0c05caa8abb8b62f2e295c2de4ca699a08773

                SHA256

                a598d4f7bb893e669979fe1dcfb20f39ddfafe2819e104834e633ad18df6eede

                SHA512

                919e50401266f62b48b52ccc3c2a1e48c023f9e12e5075fcdbfb1870cdf93ceef6f431e2f0a3ae6018853574ca3c7fd33a82579aa15e32ea6b318607354ffc85

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0598187.exe
                Filesize

                434KB

                MD5

                f36451207c72f33d6ca31907ab61db21

                SHA1

                f29364ddd5d34fd486c75b3f4e8fdb96393c43a0

                SHA256

                1792d13f98d1a8003fd48d754fc49cad8a5fd221ecd08e071fbf41166ca9b4c5

                SHA512

                e5ca4c0f2f8beaca51fc7dfc576ebcb76f42b8663dccb7077f9de3577ff128ab6be8cac55a44923c5209c7138c08c16b1c9d53da4d8a4a6ab05a95d4d8525de0

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n4997969.exe
                Filesize

                175KB

                MD5

                b990afc2893e5a1ac8f09c38db87fd24

                SHA1

                0058b2ab5476531588b93db0276e0de9e2577083

                SHA256

                c99b98cf3b36a6ba38773c7d1da85312c96feee8d4489ad984fa6fc012771efe

                SHA512

                3df6ec43cba8c8c280f93f1234cb5fe8b81f5f27a3b7fa766c79f7d2ef03027b7c775735c2901f99ac71cdde20021c6edde392f49f05114a32681085ad53193e

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y5500197.exe
                Filesize

                279KB

                MD5

                1860359c97adcc0fb54039d68983e735

                SHA1

                c374e47ee26618d638e8d0d38ed986080f4f2a34

                SHA256

                2c1a53454cdb3c93d4275741d1748b54d553b493f7a630e4c719ac73c199fc9a

                SHA512

                0938142996ebaa197ee297fd0347ef6568ae085c82d871dce5f869a9a4397ce6ebfe867e99e950103441ea000b62c4f00fc5aecb5fd25c7888a25685dd43305e

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l1296671.exe
                Filesize

                220KB

                MD5

                70d33a5b3b4bffa31324723b548c781d

                SHA1

                02b9739a982b1fbd6b4e7ba46cedd7240f5950f1

                SHA256

                69b72d6ea69bb3f832121e1163211a108e658c6943dfd89fe3fadf72493122de

                SHA512

                4486f85390979a1e647c58b276dc576064c8bbefe77e0bf6cfcdf2cbd2383db26951306f83974f2975077bc0b0c237e1b2200ab400083c29935b3a6585a4cf22

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m5176152.exe
                Filesize

                141KB

                MD5

                74c01e48552336ca838e7c500d9e0c3b

                SHA1

                d13d1c145066549fcd80010373d520962412a8a1

                SHA256

                67e37fde308a038c0aaf65716d679f7588fc2ea74c855372ca86f8ec50a3daac

                SHA512

                7818cfa81976239c7918d8dae5141cb644a07c568136592a97d31b6e6de9050bd9d529720ad0917ec85632b484dd097e59fe61a62aae09b1ca9584b299adccb5

              • memory/4232-43-0x0000000000950000-0x0000000000980000-memory.dmp
                Filesize

                192KB

              • memory/4232-44-0x0000000002BF0000-0x0000000002BF6000-memory.dmp
                Filesize

                24KB

              • memory/4232-45-0x00000000058B0000-0x0000000005EC8000-memory.dmp
                Filesize

                6.1MB

              • memory/4232-46-0x00000000053A0000-0x00000000054AA000-memory.dmp
                Filesize

                1.0MB

              • memory/4232-47-0x00000000052D0000-0x00000000052E2000-memory.dmp
                Filesize

                72KB

              • memory/4232-48-0x0000000005330000-0x000000000536C000-memory.dmp
                Filesize

                240KB

              • memory/4232-49-0x00000000054B0000-0x00000000054FC000-memory.dmp
                Filesize

                304KB