Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-01-2025 16:58

General

  • Target

    Armageddon Stealer 1.0 by Krusty/Armageddon Stealer 1.0 by Krusty.exe

  • Size

    436KB

  • MD5

    30b064d68ff6227419e29ddf0f5a81f3

  • SHA1

    f8e9b737b0350e93bf8b2d41479c0c9d00249cca

  • SHA256

    2c76e53d24f76b91c33a3cafefaa7100e590f433305f954f3233c56a8edaf9bd

  • SHA512

    579a9b5a8be8fb65fa3c34d2ac7c6e7e4943a2053897cf223419ea4936f0bc7a6469e2c57998a7b1ddd61f8b63dff0ed078ba993b6822b5c3d34c1c96e9d9bcc

  • SSDEEP

    3072:04lCFLQ666C66G666i666o666y666B66c666G66f666+666u6669p666366o6663:06CFgXtwJ3xjpfVKWMy

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Armageddon Stealer 1.0 by Krusty\Armageddon Stealer 1.0 by Krusty.exe
    "C:\Users\Admin\AppData\Local\Temp\Armageddon Stealer 1.0 by Krusty\Armageddon Stealer 1.0 by Krusty.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1884
    • C:\Users\Admin\AppData\Local\Temp\Armageddon Stealer 1.0 by Krusty\viewsource\Launcher.exe
      "C:\Users\Admin\AppData\Local\Temp\Armageddon Stealer 1.0 by Krusty\viewsource\Launcher.exe"
      2⤵
      • Drops startup file
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:536
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath C:\Windows\IMF\
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:228
      • C:\Windows\IMF\Windows Services.exe
        "C:\Windows\IMF\Windows Services.exe" {Arguments If Needed}
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3176
        • C:\Windows\IMF\Secure System Shell.exe
          "C:\Windows\IMF\Secure System Shell.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4580
        • C:\Windows\IMF\Runtime Explorer.exe
          "C:\Windows\IMF\Runtime Explorer.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3952
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath C:\Users\Admin\AppData\Roaming\
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2100
    • C:\Users\Admin\AppData\Local\Temp\Armageddon Stealer 1.0 by Krusty\viewsource\ak1.exe
      "C:\Users\Admin\AppData\Local\Temp\Armageddon Stealer 1.0 by Krusty\viewsource\ak1.exe"
      2⤵
        PID:1176

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      968cb9309758126772781b83adb8a28f

      SHA1

      8da30e71accf186b2ba11da1797cf67f8f78b47c

      SHA256

      92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

      SHA512

      4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      64B

      MD5

      2bb158a0e6a40f9500860738e4ef9ed2

      SHA1

      9fb78524b7c34ea51d7a2771b877fc71f7b428ce

      SHA256

      936ea53d3821d87b44b950a580285b1456ad7144c55aa2782dcc931f2b346c92

      SHA512

      c3f35acb5d542205eecfccbd83ed14329e12a5cfe6c5b9fbed7fd94983eedfe350a6fdbdd72ce3b125aa86ff865257b7c25ecfb5b4cff02f39da02a2df58ef1f

    • C:\Users\Admin\AppData\Local\Temp\Armageddon Stealer 1.0 by Krusty\Send.php

      Filesize

      88B

      MD5

      2cf0925c2ad295d8c07760fa26108596

      SHA1

      ca25244b44bf670c9acc84903e857be0ac8dedf7

      SHA256

      e6b83e1f946a57dc10a3ef452d65c9c4d38beec6ccbf4e069836c38448a894c3

      SHA512

      fbb94c85f5fbb42b69362189dc29caa6ca46d05dde5a6407f73424a2cbb054b92edb368a171998fd440ed9d5c28692013874aa3d9b1aa1336bb0dd8ef3ef0832

    • C:\Users\Admin\AppData\Local\Temp\Armageddon Stealer 1.0 by Krusty\Send.php

      Filesize

      101B

      MD5

      d0fb983b03f4ffa027c51dab7544c259

      SHA1

      dcfe29534ab26129188506e4e80aceb9f9c9e166

      SHA256

      c10db787797dc1a2c6b092b10174695990d471c593f56599f2db076a56a507f3

      SHA512

      5025a8c2a797b4c14ff0b9ed22c66873094d02203b62dd50f59c68e54f780765858d1ffec74575b717055727292d105792a63bf87c91a43817ea2e0974312fc5

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_dhomeehd.c5m.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Windows\IMF\Runtime Explorer.exe

      Filesize

      152KB

      MD5

      03f5e0141f4519f0c5ac26ce0b036a0f

      SHA1

      4f7a2a230e7a194a898cc9f2d563ac8777fe99c0

      SHA256

      78a408c628e33e3332645f480ee7ce01b5dc24fc96cf16ffa0868d43f3d421ef

      SHA512

      86a68f040654006e06b51c5714e0d7168d0d1bef7f3c39843632068104f773f771d21be4bc251d712f3e915cd1058f89ad31d9e3f3d9e7cf6da6785cbf22d8d7

    • C:\Windows\IMF\Secure System Shell.exe

      Filesize

      45KB

      MD5

      7d0c7359e5b2daa5665d01afdc98cc00

      SHA1

      c3cc830c8ffd0f53f28d89dcd9f3426be87085cb

      SHA256

      f1abd5ab03189e82971513e6ca04bd372fcf234d670079888f01cf4addd49809

      SHA512

      a8f82b11b045d8dd744506f4f56f3382b33a03684a6aebc91a02ea901c101b91cb43b7d0213f72f39cbb22f616ecd5de8b9e6c99fb5669f26a3ea6bcb63c8407

    • C:\Windows\IMF\Windows Services.exe

      Filesize

      46KB

      MD5

      ad0ce1302147fbdfecaec58480eb9cf9

      SHA1

      874efbc76e5f91bc1425a43ea19400340f98d42b

      SHA256

      2c339b52b82e73b4698a0110cdfe310c00c5c69078e9e1bd6fa1308652bf82a3

      SHA512

      adccd5520e01b673c2fc5c451305fe31b1a3e74891aece558f75fefc50218adf1fb81bb8c7f19969929d3fecb0fdb2cb5b564400d51e0a5a1ad8d5bc2d4eed53

    • memory/228-95-0x00000000074A0000-0x00000000074B1000-memory.dmp

      Filesize

      68KB

    • memory/228-38-0x00000000062E0000-0x000000000632C000-memory.dmp

      Filesize

      304KB

    • memory/228-107-0x00000000075C0000-0x00000000075C8000-memory.dmp

      Filesize

      32KB

    • memory/228-106-0x00000000075E0000-0x00000000075FA000-memory.dmp

      Filesize

      104KB

    • memory/228-105-0x00000000074E0000-0x00000000074F4000-memory.dmp

      Filesize

      80KB

    • memory/228-104-0x00000000074D0000-0x00000000074DE000-memory.dmp

      Filesize

      56KB

    • memory/228-94-0x0000000007520000-0x00000000075B6000-memory.dmp

      Filesize

      600KB

    • memory/228-93-0x00000000072F0000-0x00000000072FA000-memory.dmp

      Filesize

      40KB

    • memory/228-92-0x0000000007280000-0x000000000729A000-memory.dmp

      Filesize

      104KB

    • memory/228-18-0x00000000049F0000-0x0000000004A26000-memory.dmp

      Filesize

      216KB

    • memory/228-90-0x00000000078C0000-0x0000000007F3A000-memory.dmp

      Filesize

      6.5MB

    • memory/228-20-0x0000000005060000-0x0000000005688000-memory.dmp

      Filesize

      6.2MB

    • memory/228-21-0x00000000057C0000-0x00000000057E2000-memory.dmp

      Filesize

      136KB

    • memory/228-73-0x0000000007150000-0x00000000071F3000-memory.dmp

      Filesize

      652KB

    • memory/228-23-0x0000000005910000-0x0000000005976000-memory.dmp

      Filesize

      408KB

    • memory/228-22-0x00000000058A0000-0x0000000005906000-memory.dmp

      Filesize

      408KB

    • memory/228-61-0x000000006F820000-0x000000006F86C000-memory.dmp

      Filesize

      304KB

    • memory/228-72-0x0000000006530000-0x000000000654E000-memory.dmp

      Filesize

      120KB

    • memory/228-35-0x0000000005980000-0x0000000005CD4000-memory.dmp

      Filesize

      3.3MB

    • memory/228-60-0x0000000007110000-0x0000000007142000-memory.dmp

      Filesize

      200KB

    • memory/228-37-0x0000000005F80000-0x0000000005F9E000-memory.dmp

      Filesize

      120KB

    • memory/536-62-0x0000000005F80000-0x0000000005FF6000-memory.dmp

      Filesize

      472KB

    • memory/536-8-0x00000000749C0000-0x0000000075170000-memory.dmp

      Filesize

      7.7MB

    • memory/536-10-0x00000000749C0000-0x0000000075170000-memory.dmp

      Filesize

      7.7MB

    • memory/536-11-0x0000000006320000-0x000000000639E000-memory.dmp

      Filesize

      504KB

    • memory/536-9-0x00000000003F0000-0x0000000000404000-memory.dmp

      Filesize

      80KB

    • memory/536-12-0x00000000749C0000-0x0000000075170000-memory.dmp

      Filesize

      7.7MB

    • memory/536-91-0x00000000749C0000-0x0000000075170000-memory.dmp

      Filesize

      7.7MB

    • memory/536-74-0x0000000005F60000-0x0000000005F7E000-memory.dmp

      Filesize

      120KB

    • memory/1176-15-0x00000000014C0000-0x00000000014D0000-memory.dmp

      Filesize

      64KB

    • memory/1176-34-0x000000001C860000-0x000000001C8AC000-memory.dmp

      Filesize

      304KB

    • memory/1176-19-0x000000001C700000-0x000000001C79C000-memory.dmp

      Filesize

      624KB

    • memory/1176-136-0x00000000014C0000-0x00000000014D0000-memory.dmp

      Filesize

      64KB

    • memory/1176-17-0x000000001C110000-0x000000001C5DE000-memory.dmp

      Filesize

      4.8MB

    • memory/1176-30-0x00000000014A0000-0x00000000014A8000-memory.dmp

      Filesize

      32KB

    • memory/1176-16-0x000000001BB90000-0x000000001BC36000-memory.dmp

      Filesize

      664KB

    • memory/1176-36-0x000000001C910000-0x000000001C970000-memory.dmp

      Filesize

      384KB

    • memory/1884-4-0x0000000005830000-0x00000000058C2000-memory.dmp

      Filesize

      584KB

    • memory/1884-1-0x0000000000C60000-0x0000000000CD4000-memory.dmp

      Filesize

      464KB

    • memory/1884-14-0x00000000749C0000-0x0000000075170000-memory.dmp

      Filesize

      7.7MB

    • memory/1884-5-0x0000000005760000-0x000000000576A000-memory.dmp

      Filesize

      40KB

    • memory/1884-6-0x00000000058D0000-0x0000000005926000-memory.dmp

      Filesize

      344KB

    • memory/1884-7-0x00000000749C0000-0x0000000075170000-memory.dmp

      Filesize

      7.7MB

    • memory/1884-0-0x00000000749CE000-0x00000000749CF000-memory.dmp

      Filesize

      4KB

    • memory/1884-2-0x0000000005670000-0x000000000570C000-memory.dmp

      Filesize

      624KB

    • memory/1884-3-0x0000000005D40000-0x00000000062E4000-memory.dmp

      Filesize

      5.6MB

    • memory/2100-119-0x000000006F820000-0x000000006F86C000-memory.dmp

      Filesize

      304KB

    • memory/2100-131-0x00000000077D0000-0x00000000077E4000-memory.dmp

      Filesize

      80KB

    • memory/2100-130-0x0000000007790000-0x00000000077A1000-memory.dmp

      Filesize

      68KB

    • memory/2100-129-0x0000000007460000-0x0000000007503000-memory.dmp

      Filesize

      652KB

    • memory/3176-89-0x0000000000810000-0x0000000000822000-memory.dmp

      Filesize

      72KB

    • memory/4580-100-0x00000000009F0000-0x0000000000A02000-memory.dmp

      Filesize

      72KB