Analysis

  • max time kernel
    158s
  • max time network
    164s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    07-10-2021 12:07

General

  • Target

    4138c3b3168b4cf2846b18945a5b575c0f17afe63826f1ca05515ba88c8ca358.exe

  • Size

    578KB

  • MD5

    0f7a33360cfb19513d6d5261c1dc1394

  • SHA1

    bd14d2c349fdeb1a1e3ea4e842e370ee7572eb8a

  • SHA256

    4138c3b3168b4cf2846b18945a5b575c0f17afe63826f1ca05515ba88c8ca358

  • SHA512

    d18a97a22a4e57cb010e683152b113b9586f688d57284b6fcfa1c180fa082907e86b5bcfd1cc13813ae91e518d1cd1087799d97715c3cb6aa16debe8199049a0

Malware Config

Extracted

Family

amadey

Version

2.70

C2

185.215.113.45/g4MbvE/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 13 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4138c3b3168b4cf2846b18945a5b575c0f17afe63826f1ca05515ba88c8ca358.exe
    "C:\Users\Admin\AppData\Local\Temp\4138c3b3168b4cf2846b18945a5b575c0f17afe63826f1ca05515ba88c8ca358.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1608
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\4138c3b3168b4cf2846b18945a5b575c0f17afe63826f1ca05515ba88c8ca358.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3796
    • C:\Users\Admin\AppData\Local\Temp\4138c3b3168b4cf2846b18945a5b575c0f17afe63826f1ca05515ba88c8ca358.exe
      "C:\Users\Admin\AppData\Local\Temp\4138c3b3168b4cf2846b18945a5b575c0f17afe63826f1ca05515ba88c8ca358.exe"
      2⤵
        PID:3704
      • C:\Users\Admin\AppData\Local\Temp\4138c3b3168b4cf2846b18945a5b575c0f17afe63826f1ca05515ba88c8ca358.exe
        "C:\Users\Admin\AppData\Local\Temp\4138c3b3168b4cf2846b18945a5b575c0f17afe63826f1ca05515ba88c8ca358.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3552
        • C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe
          "C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Modifies system certificate store
          • Suspicious use of WriteProcessMemory
          PID:1312
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe"
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3540
          • C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe
            "C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe"
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2136
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\603c0340b4\
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:1300
              • C:\Windows\SysWOW64\reg.exe
                REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\603c0340b4\
                6⤵
                  PID:1440
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN sqtvvs.exe /TR "C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe" /F
                5⤵
                • Creates scheduled task(s)
                PID:812
              • C:\Users\Admin\AppData\Local\Temp\309151772\309151772.exe
                "C:\Users\Admin\AppData\Local\Temp\309151772\309151772.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:844
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\309151772\309151772.exe"
                  6⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3408
                • C:\Users\Admin\AppData\Local\Temp\309151772\309151772.exe
                  "C:\Users\Admin\AppData\Local\Temp\309151772\309151772.exe"
                  6⤵
                  • Executes dropped EXE
                  PID:3864
      • C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe
        C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe
        1⤵
        • Executes dropped EXE
        PID:3876

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/844-663-0x0000000004EA0000-0x0000000004F32000-memory.dmp

        Filesize

        584KB

      • memory/1312-149-0x0000000004CB0000-0x0000000004D42000-memory.dmp

        Filesize

        584KB

      • memory/1608-119-0x00000000049B0000-0x00000000049B1000-memory.dmp

        Filesize

        4KB

      • memory/1608-122-0x0000000004FB0000-0x0000000004FBA000-memory.dmp

        Filesize

        40KB

      • memory/1608-120-0x00000000049A0000-0x0000000004A32000-memory.dmp

        Filesize

        584KB

      • memory/1608-117-0x0000000004FF0000-0x0000000004FF1000-memory.dmp

        Filesize

        4KB

      • memory/1608-121-0x0000000005FC0000-0x0000000005FC1000-memory.dmp

        Filesize

        4KB

      • memory/1608-118-0x0000000004A40000-0x0000000004A41000-memory.dmp

        Filesize

        4KB

      • memory/1608-115-0x00000000000D0000-0x00000000000D1000-memory.dmp

        Filesize

        4KB

      • memory/1608-123-0x0000000006140000-0x0000000006196000-memory.dmp

        Filesize

        344KB

      • memory/2136-410-0x0000000000400000-0x0000000000439000-memory.dmp

        Filesize

        228KB

      • memory/3408-820-0x0000000004103000-0x0000000004104000-memory.dmp

        Filesize

        4KB

      • memory/3408-688-0x0000000004100000-0x0000000004101000-memory.dmp

        Filesize

        4KB

      • memory/3408-689-0x0000000004102000-0x0000000004103000-memory.dmp

        Filesize

        4KB

      • memory/3540-411-0x0000000002D60000-0x0000000002D61000-memory.dmp

        Filesize

        4KB

      • memory/3540-412-0x0000000002D62000-0x0000000002D63000-memory.dmp

        Filesize

        4KB

      • memory/3540-507-0x0000000002D63000-0x0000000002D64000-memory.dmp

        Filesize

        4KB

      • memory/3540-506-0x000000007EEE0000-0x000000007EEE1000-memory.dmp

        Filesize

        4KB

      • memory/3540-436-0x0000000009060000-0x0000000009061000-memory.dmp

        Filesize

        4KB

      • memory/3540-408-0x00000000078C0000-0x00000000078C1000-memory.dmp

        Filesize

        4KB

      • memory/3540-415-0x0000000008240000-0x0000000008241000-memory.dmp

        Filesize

        4KB

      • memory/3552-127-0x0000000000400000-0x0000000000439000-memory.dmp

        Filesize

        228KB

      • memory/3552-133-0x0000000000400000-0x0000000000439000-memory.dmp

        Filesize

        228KB

      • memory/3796-170-0x00000000097D0000-0x00000000097D1000-memory.dmp

        Filesize

        4KB

      • memory/3796-147-0x00000000079A0000-0x00000000079A1000-memory.dmp

        Filesize

        4KB

      • memory/3796-154-0x0000000008B90000-0x0000000008B91000-memory.dmp

        Filesize

        4KB

      • memory/3796-163-0x00000000097F0000-0x0000000009823000-memory.dmp

        Filesize

        204KB

      • memory/3796-175-0x0000000009B40000-0x0000000009B41000-memory.dmp

        Filesize

        4KB

      • memory/3796-176-0x000000007F260000-0x000000007F261000-memory.dmp

        Filesize

        4KB

      • memory/3796-177-0x0000000005083000-0x0000000005084000-memory.dmp

        Filesize

        4KB

      • memory/3796-153-0x0000000008760000-0x0000000008761000-memory.dmp

        Filesize

        4KB

      • memory/3796-152-0x00000000083D0000-0x00000000083D1000-memory.dmp

        Filesize

        4KB

      • memory/3796-150-0x0000000008360000-0x0000000008361000-memory.dmp

        Filesize

        4KB

      • memory/3796-148-0x0000000008260000-0x0000000008261000-memory.dmp

        Filesize

        4KB

      • memory/3796-155-0x0000000008A60000-0x0000000008A61000-memory.dmp

        Filesize

        4KB

      • memory/3796-178-0x0000000009D60000-0x0000000009D61000-memory.dmp

        Filesize

        4KB

      • memory/3796-131-0x0000000005080000-0x0000000005081000-memory.dmp

        Filesize

        4KB

      • memory/3796-132-0x0000000005082000-0x0000000005083000-memory.dmp

        Filesize

        4KB

      • memory/3796-130-0x0000000007A50000-0x0000000007A51000-memory.dmp

        Filesize

        4KB

      • memory/3796-129-0x0000000004F40000-0x0000000004F41000-memory.dmp

        Filesize

        4KB

      • memory/3796-377-0x0000000009CA0000-0x0000000009CA1000-memory.dmp

        Filesize

        4KB

      • memory/3796-371-0x0000000009CC0000-0x0000000009CC1000-memory.dmp

        Filesize

        4KB

      • memory/3864-690-0x0000000004CF0000-0x00000000052F6000-memory.dmp

        Filesize

        6.0MB