Analysis

  • max time kernel
    136s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 10:41

General

  • Target

    0b23052e1def21c0e818780565a7776ae96e61597a9cf4ab1fc690daa4a85105.exe

  • Size

    754KB

  • MD5

    6810cf7b150188a3ff1356eead999753

  • SHA1

    e31eefe748f66c894f169b4ee25e435a5f7d8d15

  • SHA256

    0b23052e1def21c0e818780565a7776ae96e61597a9cf4ab1fc690daa4a85105

  • SHA512

    6e96d879ae6dac11a8ed4f28989b81d5a41c148c7971d993fd34d74252995c6829a5a84f885132d84e9682def59635bcc2ef097f9f4e4fb33f00abbf8c6f2cbc

  • SSDEEP

    12288:cMrwy90C09MZWecKH7UZUNXYGIWj/dUBB4FSVvMj3Q2VO8RvyBB7fUraG315:syY9MkecKHAYoGIWgBwSIDVXvc7UuM15

Malware Config

Extracted

Family

amadey

Version

3.89

Botnet

fb0fb8

C2

http://77.91.68.52

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explonde.exe

  • strings_key

    916aae73606d7a9e02a1d3b47c199688

  • url_paths

    /mac/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Mystic stealer payload 3 IoCs
  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b23052e1def21c0e818780565a7776ae96e61597a9cf4ab1fc690daa4a85105.exe
    "C:\Users\Admin\AppData\Local\Temp\0b23052e1def21c0e818780565a7776ae96e61597a9cf4ab1fc690daa4a85105.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1848
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5479720.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5479720.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3724
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5066203.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5066203.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2456
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\q9513403.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\q9513403.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:5012
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4880
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r4003265.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r4003265.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4272
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
              PID:4232
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s9959432.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s9959432.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4412
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            4⤵
            • Checks SCSI registry key(s)
            PID:768
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t8356296.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t8356296.exe
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3292
        • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
          "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1208
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F
            4⤵
            • Creates scheduled task(s)
            PID:1196
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2000
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              5⤵
                PID:3652
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "explonde.exe" /P "Admin:N"
                5⤵
                  PID:4500
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "explonde.exe" /P "Admin:R" /E
                  5⤵
                    PID:4540
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    5⤵
                      PID:4644
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\fefffe8cea" /P "Admin:N"
                      5⤵
                        PID:1104
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\fefffe8cea" /P "Admin:R" /E
                        5⤵
                          PID:3484
                • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
                  C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
                  1⤵
                  • Executes dropped EXE
                  PID:3272
                • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
                  C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
                  1⤵
                  • Executes dropped EXE
                  PID:4280
                • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
                  C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
                  1⤵
                  • Executes dropped EXE
                  PID:3256

                Network

                MITRE ATT&CK Matrix ATT&CK v13

                Execution

                Scheduled Task/Job

                1
                T1053

                Persistence

                Create or Modify System Process

                1
                T1543

                Windows Service

                1
                T1543.003

                Boot or Logon Autostart Execution

                1
                T1547

                Registry Run Keys / Startup Folder

                1
                T1547.001

                Scheduled Task/Job

                1
                T1053

                Privilege Escalation

                Create or Modify System Process

                1
                T1543

                Windows Service

                1
                T1543.003

                Boot or Logon Autostart Execution

                1
                T1547

                Registry Run Keys / Startup Folder

                1
                T1547.001

                Scheduled Task/Job

                1
                T1053

                Defense Evasion

                Modify Registry

                2
                T1112

                Impair Defenses

                1
                T1562

                Disable or Modify Tools

                1
                T1562.001

                Discovery

                Query Registry

                2
                T1012

                System Information Discovery

                3
                T1082

                Peripheral Device Discovery

                1
                T1120

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t8356296.exe
                  Filesize

                  219KB

                  MD5

                  c256a814d3f9d02d73029580dfe882b3

                  SHA1

                  e11e9ea937183139753f3b0d5e71c8301d000896

                  SHA256

                  53f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c

                  SHA512

                  1f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5479720.exe
                  Filesize

                  571KB

                  MD5

                  b0c26dce9dfcb23feecf2926eff86e6d

                  SHA1

                  a82cf418e51d8d90e5155527d8c095dc4baef4b5

                  SHA256

                  b46f3aa7329a5871b2e84071be155fe42a88382f2ec4657544b40cb618a58a78

                  SHA512

                  ae08ccb0ca7eb5a31087d1b6195e75901706530f9eb815c8eb99811bafb95c284ecbce9d0ca4d99845ca1c45aab9d377e3a2abb533dec2b44f25740d8089276b

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s9959432.exe
                  Filesize

                  248KB

                  MD5

                  a516862933ef9d5afbdb6b5edefc40f1

                  SHA1

                  acc6c9fc38e3baba18baf9ad28d6111091db5818

                  SHA256

                  632cd63394ac96afd3cb379c5eaf6bba8540542a7ed28d87112e4932b38e23d3

                  SHA512

                  36d543443a07eba64630593d75a1600f541a058d14784bed1a086c0a4afdfd541f80587761f2c933a967e45295d8270899fa1e3ae7b7eff0c19a6f9d21f97385

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5066203.exe
                  Filesize

                  339KB

                  MD5

                  40bf0792127f32dc7737e3f9a417c8ca

                  SHA1

                  f6e2f442b93b2e62bf18146c7ce83db30c666748

                  SHA256

                  4159e70667a6c3eedb77e304e04914b1b4bd6966f130de102fb9a6f6f8b0ced9

                  SHA512

                  b03533c1b410e2583e3120bb667960c1b4c95387421ab0b7db3328c46775b613bcefae5873c35eb0336328a5ed2e16b04e7738e808bd849ba8aaff8712a362f5

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\q9513403.exe
                  Filesize

                  229KB

                  MD5

                  bd3ad5a5f3bdbbcc666960e355ea0ab4

                  SHA1

                  00319db9ddecfbca5c26206e742b89305c4eb5f7

                  SHA256

                  28242776c7ccefaf54d1912cea0de80422bb9c33381684b7eab7670c3b0d7f32

                  SHA512

                  e826591c641e34cfc417e189635069b6bc8a5e3f2ab2c0f02399eaf902a9f2aafd386fe390cef842d7f70f25d43e01349189f1e359207600e2b7b73cf46f2679

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r4003265.exe
                  Filesize

                  358KB

                  MD5

                  f282056f10136b92852aad5453ce8d88

                  SHA1

                  c596b38fd1873e868fbc54bd681f7acf4cfbca65

                  SHA256

                  364e1d94470ff9b0ab459d72e01e353b491a152b186ef355063fe1b363eeb652

                  SHA512

                  617074cb977fbc5baa86249536cc6ae50bedd2eb6ed16296e60c8696cf17889cff8c0fb0e0013d83d47521dbcd8c65a31900244a8e6709193dc915945ffb9c78

                • memory/768-32-0x0000000000400000-0x0000000000409000-memory.dmp
                  Filesize

                  36KB

                • memory/4232-25-0x0000000000400000-0x0000000000428000-memory.dmp
                  Filesize

                  160KB

                • memory/4232-26-0x0000000000400000-0x0000000000428000-memory.dmp
                  Filesize

                  160KB

                • memory/4232-28-0x0000000000400000-0x0000000000428000-memory.dmp
                  Filesize

                  160KB

                • memory/4880-21-0x0000000000400000-0x000000000040A000-memory.dmp
                  Filesize

                  40KB