Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/05/2024, 10:08

General

  • Target

    b4f17a4609e2cec3a4889b16b6afbe340483f8403878fb6bc6d524be8e5764a2.exe

  • Size

    1.2MB

  • MD5

    910fefd3f292d4d7610f6a3808b66374

  • SHA1

    87530428d2bb2886054f0653431d00546c30227e

  • SHA256

    b4f17a4609e2cec3a4889b16b6afbe340483f8403878fb6bc6d524be8e5764a2

  • SHA512

    52ffec25a6975e9f969cbbfcf1edddea0882a28f886dcb3afd5b842d56c862c53dc440b452853f6ac37cc9eab9d898662fe43f313610a5850c31b9c596de9380

  • SSDEEP

    24576:xygcC36v7qWUmK7GdziyEpbfzzYRYjtsL+3/bCst:kZC36v7qWp3kXrjts2b

Malware Config

Extracted

Family

redline

Botnet

grome

C2

77.91.124.86:19084

Extracted

Family

amadey

Version

3.89

Botnet

04d170

C2

http://77.91.124.1

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explothe.exe

  • strings_key

    36a96139c1118a354edf72b1080d4b2f

  • url_paths

    /theme/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Mystic stealer payload 3 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4f17a4609e2cec3a4889b16b6afbe340483f8403878fb6bc6d524be8e5764a2.exe
    "C:\Users\Admin\AppData\Local\Temp\b4f17a4609e2cec3a4889b16b6afbe340483f8403878fb6bc6d524be8e5764a2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3372
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\YK6tv16.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\YK6tv16.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2724
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Np0iM98.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Np0iM98.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3020
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\NI6QM81.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\NI6QM81.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4844
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1QP08OE3.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1QP08OE3.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:220
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3992
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2DZ3471.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2DZ3471.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:872
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:4508
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                  PID:2768
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  6⤵
                    PID:5064
              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3Zk65Ny.exe
                C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3Zk65Ny.exe
                4⤵
                • Executes dropped EXE
                • Checks SCSI registry key(s)
                PID:1032
            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4Lk482oQ.exe
              C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4Lk482oQ.exe
              3⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:3940
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                4⤵
                  PID:4968
            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5FB7go3.exe
              C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5FB7go3.exe
              2⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1724
              • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"
                3⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:2548
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F
                  4⤵
                  • Creates scheduled task(s)
                  PID:4340
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit
                  4⤵
                    PID:4028
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      5⤵
                        PID:4140
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "explothe.exe" /P "Admin:N"
                        5⤵
                          PID:1376
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "explothe.exe" /P "Admin:R" /E
                          5⤵
                            PID:1176
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                            5⤵
                              PID:392
                            • C:\Windows\SysWOW64\cacls.exe
                              CACLS "..\fefffe8cea" /P "Admin:N"
                              5⤵
                                PID:2544
                              • C:\Windows\SysWOW64\cacls.exe
                                CACLS "..\fefffe8cea" /P "Admin:R" /E
                                5⤵
                                  PID:4396
                        • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                          C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                          1⤵
                          • Executes dropped EXE
                          PID:4676
                        • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                          C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                          1⤵
                          • Executes dropped EXE
                          PID:1248

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                          Filesize

                          226B

                          MD5

                          916851e072fbabc4796d8916c5131092

                          SHA1

                          d48a602229a690c512d5fdaf4c8d77547a88e7a2

                          SHA256

                          7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                          SHA512

                          07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5FB7go3.exe

                          Filesize

                          221KB

                          MD5

                          effef5c131edf4a949c92b92b9208d65

                          SHA1

                          9c67877f59ed096d856b64d60ac5b13439598cae

                          SHA256

                          d60278b23501f43a316974758221f41bc0c9de3316c4ecf246ef2fa790fba9ff

                          SHA512

                          8022e6c533fb0c4a5f409eec1d7bfe481a912555eb8a7dad44214a7115a922c342ecb0367f4c10fde89415235305e1f99a2a0bd048d1828f18276f38f1ec7225

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\YK6tv16.exe

                          Filesize

                          1.0MB

                          MD5

                          bb915ae0e035f983c4bae2cecbbb512b

                          SHA1

                          f81e2597118f131a59a231fab1db0c94704c9673

                          SHA256

                          2a0447dab712b930f7be23f4599670fc7f840dc5f0462231110559328f11f25b

                          SHA512

                          ffc61c2081edbe525c897f01b9aa89c47f70b23cf21975d47f4a0be8b28f2b7549e415df6ff8e93079e9e9f7504ab806dd31265b2f68dcb5e5175db6a512c71f

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4Lk482oQ.exe

                          Filesize

                          1.1MB

                          MD5

                          cc5f43e23e3eba6dc49374d4b1ad44ff

                          SHA1

                          052fcd86cc3f5c9c25516169265f2ba6602c3774

                          SHA256

                          4b51070ec1f32d84d05db7f6b9b965e93620af8aeecfcc0deb8d3b3b47d0a6a2

                          SHA512

                          ad32422e2765976b855864d23b13d6d9552bc8d9c987b3679ca5a3b8a640faeb6e6e554a0265b9f2b0346470662beb5f7a0fc107168a38fef53c70a0137ad047

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Np0iM98.exe

                          Filesize

                          651KB

                          MD5

                          b133559c047d01ddba88f17e11b6d61a

                          SHA1

                          5f838322a15076965016d0c57fd3439e24eca993

                          SHA256

                          b65709dc4b9f27624940eb79935d52a9b5b688a9e543c562770de29585fbe36e

                          SHA512

                          29f9c48f824ed49613132277eb125b15db09dab2f939183b745d493e1d0e1f999509254354d30163294bef89069cc85eb3aa87e3d0af50df18dfc0b2e90c0e7c

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3Zk65Ny.exe

                          Filesize

                          31KB

                          MD5

                          4d4305c2161520b51b9b2313189ba9c3

                          SHA1

                          fd42481e57bc1af7294b453b09b588019a36f55c

                          SHA256

                          cacff991d6989f6b13264c034e0ac005d611633c62b93647491d9fbdf1376398

                          SHA512

                          19a3437e3923b8a7faf65194d2ed3054ef96965114b0f063d8d01649b857f8c85b96e47e4d9625bf153dbbb082d6d2b9a73bd789c96f74edbf0bd32b5719090f

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\NI6QM81.exe

                          Filesize

                          527KB

                          MD5

                          d78acf545bc95b2639427a1a56c3941e

                          SHA1

                          8c9fb09b22e144c3d49e974964cc6c3976c65762

                          SHA256

                          68a8adc8a57eeca1b4d2502291b2b0e13019280786a52955299b5814147cb055

                          SHA512

                          72ecdd471580df7568e102126d5cb87880890173905e2e3852e92d748f75c0491f0fc2bf163b64d5854e7aa036481addf84f943fd5eec53705b5c1d95649dd8b

                        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1QP08OE3.exe

                          Filesize

                          869KB

                          MD5

                          b1bf804f66ab4702162c9551fbf97955

                          SHA1

                          cc21b129d45da92863dcfbd4106dcf283a4b3f47

                          SHA256

                          05aa0befe2cb56459fbd18736f4df1e380ad9530a528c3cdf3033d8937fda393

                          SHA512

                          1f498a33a5d93c37914c1a3a54b92ccff27748cfe8375c8fb85324b351c2e5910305112097538c94031022d4bc101447133755c0de56ea1c7cefa249c2be7835

                        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2DZ3471.exe

                          Filesize

                          1.0MB

                          MD5

                          51b2a7ce4f0e0f640d0fa02dc7a21c1e

                          SHA1

                          a1b62a2e1395d2756dcad11fbb896a22483c6dda

                          SHA256

                          82c9add5afb60e20789228b39c063c2c8c765741a5ab35e253b134a533236575

                          SHA512

                          b08d582ff8bcdd90ff388399b4dca8f93d0b46f55fa72be8c72acb967f5a27431c46c3bb15f8f3b9f3f7402d2520a9348ab2f74d4ea9be1eb9629ab38443df3d

                        • memory/1032-39-0x0000000000400000-0x0000000000409000-memory.dmp

                          Filesize

                          36KB

                        • memory/3992-28-0x0000000000400000-0x000000000040A000-memory.dmp

                          Filesize

                          40KB

                        • memory/4968-62-0x0000000007BA0000-0x0000000007CAA000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/4968-44-0x0000000000400000-0x000000000043E000-memory.dmp

                          Filesize

                          248KB

                        • memory/4968-51-0x0000000007DB0000-0x0000000008354000-memory.dmp

                          Filesize

                          5.6MB

                        • memory/4968-52-0x00000000078E0000-0x0000000007972000-memory.dmp

                          Filesize

                          584KB

                        • memory/4968-60-0x0000000004ED0000-0x0000000004EDA000-memory.dmp

                          Filesize

                          40KB

                        • memory/4968-61-0x0000000008980000-0x0000000008F98000-memory.dmp

                          Filesize

                          6.1MB

                        • memory/4968-63-0x0000000007AD0000-0x0000000007AE2000-memory.dmp

                          Filesize

                          72KB

                        • memory/4968-64-0x0000000007B30000-0x0000000007B6C000-memory.dmp

                          Filesize

                          240KB

                        • memory/4968-65-0x0000000007CB0000-0x0000000007CFC000-memory.dmp

                          Filesize

                          304KB

                        • memory/5064-32-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/5064-35-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB

                        • memory/5064-33-0x0000000000400000-0x0000000000434000-memory.dmp

                          Filesize

                          208KB