Analysis

  • max time kernel
    96s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-10-2024 22:34

General

  • Target

    44f9127cc5ef663292f4867e04106e0730634f7269304932e5f7559c65899b68N.exe

  • Size

    766KB

  • MD5

    522c58493d7307cbc8b0fc2c4ae30210

  • SHA1

    93da0247c3ce85c910baafd25edf484fc906f6ff

  • SHA256

    44f9127cc5ef663292f4867e04106e0730634f7269304932e5f7559c65899b68

  • SHA512

    8c5c4bd4f7aa0e192ebe34469a53883aa56b3beb5d96bb5ad2caef3cfb009e7d1b9288d2e2c0fe4db6b742fa79424db88f4b35d7b03c26c59a86feee858aaa8a

  • SSDEEP

    12288:5Mrny90320Sm/NnOphxjhkbyBJm2qX6fIxl2iH0DVRRwnhE0bBoKQvgSZI7arz5J:uyh4lOfxjtBw6fM4jTC1oJJqM5NDD

Malware Config

Extracted

Family

amadey

Version

3.89

Botnet

fb0fb8

C2

http://77.91.68.52

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explonde.exe

  • strings_key

    916aae73606d7a9e02a1d3b47c199688

  • url_paths

    /mac/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Mystic stealer payload 3 IoCs
  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44f9127cc5ef663292f4867e04106e0730634f7269304932e5f7559c65899b68N.exe
    "C:\Users\Admin\AppData\Local\Temp\44f9127cc5ef663292f4867e04106e0730634f7269304932e5f7559c65899b68N.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:716
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6383983.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6383983.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3384
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9389528.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9389528.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3596
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\q0457569.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\q0457569.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3792
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3700
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 152
            5⤵
            • Program crash
            PID:2460
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r0116433.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r0116433.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2736
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3520
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2736 -s 140
            5⤵
            • Program crash
            PID:5016
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s6115943.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s6115943.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3992
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Checks SCSI registry key(s)
          PID:1372
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 568
          4⤵
          • Program crash
          PID:2776
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t6012442.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t6012442.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4248
      • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
        "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2988
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:3580
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1192
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4120
          • C:\Windows\SysWOW64\cacls.exe
            CACLS "explonde.exe" /P "Admin:N"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1136
          • C:\Windows\SysWOW64\cacls.exe
            CACLS "explonde.exe" /P "Admin:R" /E
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3876
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3308
          • C:\Windows\SysWOW64\cacls.exe
            CACLS "..\fefffe8cea" /P "Admin:N"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3808
          • C:\Windows\SysWOW64\cacls.exe
            CACLS "..\fefffe8cea" /P "Admin:R" /E
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2104
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3792 -ip 3792
    1⤵
      PID:1420
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2736 -ip 2736
      1⤵
        PID:2784
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3992 -ip 3992
        1⤵
          PID:1596
        • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
          C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
          1⤵
          • Executes dropped EXE
          PID:4852
        • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
          C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe
          1⤵
          • Executes dropped EXE
          PID:1992

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t6012442.exe

          Filesize

          219KB

          MD5

          c256a814d3f9d02d73029580dfe882b3

          SHA1

          e11e9ea937183139753f3b0d5e71c8301d000896

          SHA256

          53f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c

          SHA512

          1f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6383983.exe

          Filesize

          583KB

          MD5

          b5d554ae64132b9f73bb0e8c65993f74

          SHA1

          0793eebb849cf154a2b360616088fefcb4626fef

          SHA256

          993521a8caa930c33f43805d77d854b78c686a9a7a37977a4efb103e55168c18

          SHA512

          66d242711985d14637e60de18173a2dc9471452bb5d7cbb5c26f744e783a8ae4d1a6b0e7103db8559397e62d3f426fbbd14a8b781587cf507df1c97f6e32b5f1

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s6115943.exe

          Filesize

          247KB

          MD5

          c5d3688d8d7339db313cdb358c47496a

          SHA1

          be4d9238d6d958233269ba615e461727449bca60

          SHA256

          a4d34c4a0e1737897d42ab471159699d4115127a0fce2eca3661e795e6b41cba

          SHA512

          0a4419ddb951ad30023cdac9bd56f402e179a2482dd4fda42d692994cda5419cb764959857c23ac0f915ad6a1f3ed0e592444fc827dbafc71015e5945d49e8a5

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9389528.exe

          Filesize

          344KB

          MD5

          70892996a1ecdf76d70bdc189a263e6e

          SHA1

          2cad6f235eb2df76e7dc8e8752724f347abec038

          SHA256

          cca32a3d1575e97fbcbbb4e2b23f73922242c2b1a3a01dc0f256e28fed708608

          SHA512

          5b897ebe14feabf23173015abb0fda90291968c5cf63e0128e1f3bd19f888d0ad063dcd02490e9ef2a1d67127b1246680faa5f895490fa6408b87870b83db601

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\q0457569.exe

          Filesize

          228KB

          MD5

          c7b7ac2581db386b7c21ef42e38dd8af

          SHA1

          0e5cf20c668ec1ee1d3f5ba31489b788095ac584

          SHA256

          89757f4df814acb126d53016c13080472174ec4ff9895e140dc1ecf3eaa02c98

          SHA512

          5927ab7858659b0f2e580e5d9a6ad8e28fcfde74a02813ad62911f2bfae53ac22b33cddd89ff5c2a8fbb0df6341155acf3081a4a9d0492c015adfe359cbbd112

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r0116433.exe

          Filesize

          357KB

          MD5

          9fa3e93d3a41f380020d26e31e2b4647

          SHA1

          33ca673016fb0878448e670ff39203ac4cb228e5

          SHA256

          9568150b3e1f2e5fbc15830650bdec034c6c44d1b7aa0c849a54506fe78ee954

          SHA512

          1b965a4a96e8b79d2c0d70d932f48ce653b1663a7afc10b1d25b56bc7e1f3cea0494c0f4c5ee95f78141aa26b10787b9a6bcdd9049ea234f3a203449494e017e

        • memory/1372-32-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/3520-25-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/3520-28-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/3520-26-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/3700-21-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB