Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 07:44

General

  • Target

    7252b3ba9094d91a1e12f9c9944f24ccf25c9a4c75e7f7e3380ca37b8e6bfbcd.exe

  • Size

    1.4MB

  • MD5

    be9c6334a9f060d8e383c10608a271a0

  • SHA1

    89958e3ef709d8e05e9b5bae33d09149098dc0d1

  • SHA256

    7252b3ba9094d91a1e12f9c9944f24ccf25c9a4c75e7f7e3380ca37b8e6bfbcd

  • SHA512

    094c026745ecc79e088cc0cdc4387c1f254a3d2c4e755234d914e399bda1bd6dddd5777f1e7bf1bdaa4a81ed9dab11cf4501fd363131a0309643a9e1f90def5b

  • SSDEEP

    24576:lyU/Q553sqM2nXWkJ0MT9opnaX6RXVX6iU3jA7MvnhwmEY3Ji8KeMGCfY:An558NCXW4B96aX4XVXK3IMpFEYJi8KI

Malware Config

Extracted

Family

redline

Botnet

frant

C2

77.91.124.55:19071

Extracted

Family

amadey

Version

3.89

Botnet

04d170

C2

http://77.91.124.1

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explothe.exe

  • strings_key

    36a96139c1118a354edf72b1080d4b2f

  • url_paths

    /theme/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Mystic stealer payload 3 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7252b3ba9094d91a1e12f9c9944f24ccf25c9a4c75e7f7e3380ca37b8e6bfbcd.exe
    "C:\Users\Admin\AppData\Local\Temp\7252b3ba9094d91a1e12f9c9944f24ccf25c9a4c75e7f7e3380ca37b8e6bfbcd.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4236
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Rh5KG66.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Rh5KG66.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1180
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zE1Cd92.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zE1Cd92.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4100
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1QI09EE4.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1QI09EE4.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1548
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
              PID:824
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              5⤵
              • Modifies Windows Defender Real-time Protection settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2288
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1548 -s 584
              5⤵
              • Program crash
              PID:2096
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2iI15SS.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2iI15SS.exe
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:3968
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              5⤵
                PID:3920
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 200
                5⤵
                • Program crash
                PID:4596
          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Jk9686.exe
            C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Jk9686.exe
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:3364
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              4⤵
                PID:1988
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3364 -s 572
                4⤵
                • Program crash
                PID:3512
          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4iA530IJ.exe
            C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4iA530IJ.exe
            2⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3340
            • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
              "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"
              3⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2108
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F
                4⤵
                • Creates scheduled task(s)
                PID:4164
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:1196
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:1184
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "explothe.exe" /P "Admin:N"
                    5⤵
                      PID:4296
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "explothe.exe" /P "Admin:R" /E
                      5⤵
                        PID:3004
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        5⤵
                          PID:4868
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\fefffe8cea" /P "Admin:N"
                          5⤵
                            PID:4468
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\fefffe8cea" /P "Admin:R" /E
                            5⤵
                              PID:3608
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1548 -ip 1548
                      1⤵
                        PID:2544
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3968 -ip 3968
                        1⤵
                          PID:3576
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3364 -ip 3364
                          1⤵
                            PID:384
                          • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                            C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                            1⤵
                            • Executes dropped EXE
                            PID:2856
                          • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                            C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                            1⤵
                            • Executes dropped EXE
                            PID:3492

                          Network

                          MITRE ATT&CK Matrix ATT&CK v13

                          Execution

                          Scheduled Task/Job

                          1
                          T1053

                          Persistence

                          Create or Modify System Process

                          1
                          T1543

                          Windows Service

                          1
                          T1543.003

                          Boot or Logon Autostart Execution

                          1
                          T1547

                          Registry Run Keys / Startup Folder

                          1
                          T1547.001

                          Scheduled Task/Job

                          1
                          T1053

                          Privilege Escalation

                          Create or Modify System Process

                          1
                          T1543

                          Windows Service

                          1
                          T1543.003

                          Boot or Logon Autostart Execution

                          1
                          T1547

                          Registry Run Keys / Startup Folder

                          1
                          T1547.001

                          Scheduled Task/Job

                          1
                          T1053

                          Defense Evasion

                          Modify Registry

                          2
                          T1112

                          Impair Defenses

                          1
                          T1562

                          Disable or Modify Tools

                          1
                          T1562.001

                          Discovery

                          Query Registry

                          1
                          T1012

                          System Information Discovery

                          2
                          T1082

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4iA530IJ.exe
                            Filesize

                            219KB

                            MD5

                            4bd59a6b3207f99fc3435baf3c22bc4e

                            SHA1

                            ae90587beed289f177f4143a8380ba27109d0a6f

                            SHA256

                            08e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236

                            SHA512

                            ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324

                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Rh5KG66.exe
                            Filesize

                            1.2MB

                            MD5

                            aa7c9c9f515b1b8d1cb134ae05c320dc

                            SHA1

                            bcd9186bb14e85ea44fc543d4c446e1747670314

                            SHA256

                            12ea8fb4e06f3511dbb1bd334d447cbcf2b316dad2ab06402c231a7624abc671

                            SHA512

                            2998cb7e7893666aca1a4d5691112ea996ef0c23f66b9484f177ba0c6c6f8f6118c8073a97fbd7fd8000f86f40a6e35fd6dbb3bc5aca2dfa4ab1669816bff8f4

                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Jk9686.exe
                            Filesize

                            1.8MB

                            MD5

                            babf1e2271d697da2a5600e7d8e73b12

                            SHA1

                            4c25dbe4f8163fb25b53ae4482a827a81a96d1fe

                            SHA256

                            1ee3e81e7b509dca6ba6978e75c6472f4df4ae889fe516b56716fe8e8b34d324

                            SHA512

                            c98423ebc4a86dea2b2c7b27c3102290558e504c3a568d8187639cc91e21d0c5edcc68e7d61e4765cbe52904fb2e8998f7d6f6bfcc089867260606d4b618feb9

                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zE1Cd92.exe
                            Filesize

                            739KB

                            MD5

                            8edb1bb49260d1a7d4aacd6aaf4e40ce

                            SHA1

                            79d2d4827a26e49e5d01fe616aec527cb93da1b7

                            SHA256

                            051e33468212a604936b36f4a0648ddacf0e90611af5fc0258fe07a28b7931e4

                            SHA512

                            a7373290d41691135c68192285fcf0d9db930b0f5dfc6f9877e589f0b927265b54b0db6f279ee47ac0162c6f6d2409f6afd30d268acd583bd70f8643ebc41549

                          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1QI09EE4.exe
                            Filesize

                            1.8MB

                            MD5

                            87a98b966995062cad0e4258bf004731

                            SHA1

                            ad1e15058dd00bec15772dbc5ea93dfb9a466b81

                            SHA256

                            6bc49cded7fa79927f71bac12a3d349c84eadb4efeb3d82804f99db36d0b376a

                            SHA512

                            1ceebca1df001952bd5a595aacfe2cd69afaa1dd68188ce8dd459bfc971931588410f11f1a080284000b2c5187227d030268d71525987a46c870cddfcfc22d79

                          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2iI15SS.exe
                            Filesize

                            1.7MB

                            MD5

                            0657bef0a66d6873be4310e519348cd6

                            SHA1

                            2d463e9fd299164c8d0d81a87bf66f8e9ddb97aa

                            SHA256

                            03649fa5511ee818e968cda8f315e13134dd505e3c315d98306198347882a7ee

                            SHA512

                            b3a8cceeefb6caae55e7cebae81ae24a959a8d1d13a10228465e86d3580df3e80ad548b7185e970efe9a7f384e97a669125e858abc662f27fbc968f0c1c99c2d

                          • memory/1988-82-0x0000000007EE0000-0x0000000007FEA000-memory.dmp
                            Filesize

                            1.0MB

                          • memory/1988-81-0x0000000008C30000-0x0000000009248000-memory.dmp
                            Filesize

                            6.1MB

                          • memory/1988-83-0x0000000007D00000-0x0000000007D12000-memory.dmp
                            Filesize

                            72KB

                          • memory/1988-68-0x0000000004F60000-0x0000000004F6A000-memory.dmp
                            Filesize

                            40KB

                          • memory/1988-67-0x0000000007B50000-0x0000000007BE2000-memory.dmp
                            Filesize

                            584KB

                          • memory/1988-66-0x0000000000400000-0x000000000043E000-memory.dmp
                            Filesize

                            248KB

                          • memory/1988-84-0x0000000007DD0000-0x0000000007E0C000-memory.dmp
                            Filesize

                            240KB

                          • memory/1988-85-0x0000000007D30000-0x0000000007D7C000-memory.dmp
                            Filesize

                            304KB

                          • memory/2288-39-0x0000000005A50000-0x0000000005A66000-memory.dmp
                            Filesize

                            88KB

                          • memory/2288-55-0x0000000005A50000-0x0000000005A66000-memory.dmp
                            Filesize

                            88KB

                          • memory/2288-43-0x0000000005A50000-0x0000000005A66000-memory.dmp
                            Filesize

                            88KB

                          • memory/2288-41-0x0000000005A50000-0x0000000005A66000-memory.dmp
                            Filesize

                            88KB

                          • memory/2288-47-0x0000000005A50000-0x0000000005A66000-memory.dmp
                            Filesize

                            88KB

                          • memory/2288-37-0x0000000005A50000-0x0000000005A66000-memory.dmp
                            Filesize

                            88KB

                          • memory/2288-36-0x0000000005A50000-0x0000000005A66000-memory.dmp
                            Filesize

                            88KB

                          • memory/2288-29-0x0000000005A50000-0x0000000005A66000-memory.dmp
                            Filesize

                            88KB

                          • memory/2288-31-0x0000000005A50000-0x0000000005A66000-memory.dmp
                            Filesize

                            88KB

                          • memory/2288-28-0x0000000005A50000-0x0000000005A66000-memory.dmp
                            Filesize

                            88KB

                          • memory/2288-49-0x0000000005A50000-0x0000000005A66000-memory.dmp
                            Filesize

                            88KB

                          • memory/2288-21-0x0000000000400000-0x0000000000432000-memory.dmp
                            Filesize

                            200KB

                          • memory/2288-22-0x0000000000400000-0x0000000000432000-memory.dmp
                            Filesize

                            200KB

                          • memory/2288-24-0x0000000000400000-0x0000000000432000-memory.dmp
                            Filesize

                            200KB

                          • memory/2288-51-0x0000000005A50000-0x0000000005A66000-memory.dmp
                            Filesize

                            88KB

                          • memory/2288-53-0x0000000005A50000-0x0000000005A66000-memory.dmp
                            Filesize

                            88KB

                          • memory/2288-45-0x0000000005A50000-0x0000000005A66000-memory.dmp
                            Filesize

                            88KB

                          • memory/2288-33-0x0000000005A50000-0x0000000005A66000-memory.dmp
                            Filesize

                            88KB

                          • memory/2288-27-0x0000000005A50000-0x0000000005A6C000-memory.dmp
                            Filesize

                            112KB

                          • memory/2288-26-0x0000000006000000-0x00000000065A4000-memory.dmp
                            Filesize

                            5.6MB

                          • memory/2288-25-0x0000000003400000-0x000000000341E000-memory.dmp
                            Filesize

                            120KB

                          • memory/3920-60-0x0000000000400000-0x0000000000428000-memory.dmp
                            Filesize

                            160KB

                          • memory/3920-62-0x0000000000400000-0x0000000000428000-memory.dmp
                            Filesize

                            160KB

                          • memory/3920-59-0x0000000000400000-0x0000000000428000-memory.dmp
                            Filesize

                            160KB