Analysis

  • max time kernel
    133s
  • max time network
    172s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 21:25

General

  • Target

    470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e.exe

  • Size

    244KB

  • MD5

    0906eebf6f5fd1f9029e4bc6f81a636d

  • SHA1

    938df93f0f7ebb8f31a2d2e57c2447d17a0737b8

  • SHA256

    470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e

  • SHA512

    dad5fbcb96ebfb5c29d3fc3f46528ad46dce70acd67ee257b288ad58224117f90919ebce2693b4df9db7ba86f79fa417ff6b6b21c27a837e4d36d7c2b8ef7af6

  • SSDEEP

    6144:wuh1kLkzOqq8CW1V8Hcc9JOkbztWp4vW677CNZwVLL:wuh1kxqq8HrIDvHfCNW

Malware Config

Extracted

Family

amadey

Version

3.50

C2

193.56.146.174/g84kvj4jck/index.php

185.246.221.126/i4kvjd3xc/index.php

Extracted

Family

redline

Botnet

@REDLINEVIP Cloud (TG: @FATHEROFCARDERS)

C2

151.80.89.233:13553

Attributes
  • auth_value

    fbee175162920530e6bf470c8003fa1a

Extracted

Family

netwire

C2

alice2019.myftp.biz:3360

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    Fs_Spread_0001

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • NetWire RAT payload 3 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 4 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e.exe
    "C:\Users\Admin\AppData\Local\Temp\470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
      "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1764
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:1340
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rovwer.exe" /P "Admin:N"&&CACLS "rovwer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\99e342142d" /P "Admin:N"&&CACLS "..\99e342142d" /P "Admin:R" /E&&Exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1468
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          4⤵
            PID:1640
          • C:\Windows\SysWOW64\cacls.exe
            CACLS "rovwer.exe" /P "Admin:N"
            4⤵
              PID:592
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "rovwer.exe" /P "Admin:R" /E
              4⤵
                PID:588
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                4⤵
                  PID:608
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\99e342142d" /P "Admin:N"
                  4⤵
                    PID:896
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\99e342142d" /P "Admin:R" /E
                    4⤵
                      PID:324
                  • C:\Users\Admin\AppData\Local\Temp\1000199001\40Kdfdf.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000199001\40Kdfdf.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1668
                  • C:\Users\Admin\AppData\Roaming\1000205000\stub.exe
                    "C:\Users\Admin\AppData\Roaming\1000205000\stub.exe"
                    3⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of WriteProcessMemory
                    PID:780
                    • C:\Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exe
                      "C:\Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exe"
                      4⤵
                      • Executes dropped EXE
                      • Suspicious use of WriteProcessMemory
                      PID:1704
                      • C:\Windows\SysWOW64\schtasks.exe
                        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exe" /F
                        5⤵
                        • Creates scheduled task(s)
                        PID:1860
                  • C:\Users\Admin\AppData\Local\Temp\1000206001\Stub1.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000206001\Stub1.exe"
                    3⤵
                    • Executes dropped EXE
                    PID:1912
              • C:\Windows\system32\taskeng.exe
                taskeng.exe {62E386AF-282E-4331-AA87-23C79B7E485A} S-1-5-21-3385717845-2518323428-350143044-1000:SABDUHNY\Admin:Interactive:[1]
                1⤵
                • Suspicious use of WriteProcessMemory
                PID:852
                • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                  C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                  2⤵
                  • Executes dropped EXE
                  PID:776
                • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                  C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                  2⤵
                  • Executes dropped EXE
                  PID:1336
                • C:\Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exe
                  C:\Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exe
                  2⤵
                  • Executes dropped EXE
                  PID:268

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Execution

              Scheduled Task

              1
              T1053

              Persistence

              Registry Run Keys / Startup Folder

              1
              T1060

              Scheduled Task

              1
              T1053

              Privilege Escalation

              Scheduled Task

              1
              T1053

              Defense Evasion

              Modify Registry

              1
              T1112

              Credential Access

              Credentials in Files

              2
              T1081

              Discovery

              Query Registry

              1
              T1012

              System Information Discovery

              1
              T1082

              Collection

              Data from Local System

              2
              T1005

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\1000199001\40Kdfdf.exe
                Filesize

                137KB

                MD5

                87ef06885fd221a86bba9e5b86a7ea7d

                SHA1

                6644db86f2d557167f442a5fe72a82de3fe943ba

                SHA256

                ab5026bf6fe5d692faaf86752b4c9fa226ec49ba54cfb625579287b498eab20f

                SHA512

                c65b38856d4995b01454754044ae7373363a02b8e228c249fee3c1c2222f2348473f0bba5a5f2e4a280cd183e57dc13423bb09f86919ccb8968c8229310c5ad0

              • C:\Users\Admin\AppData\Local\Temp\1000199001\40Kdfdf.exe
                Filesize

                137KB

                MD5

                87ef06885fd221a86bba9e5b86a7ea7d

                SHA1

                6644db86f2d557167f442a5fe72a82de3fe943ba

                SHA256

                ab5026bf6fe5d692faaf86752b4c9fa226ec49ba54cfb625579287b498eab20f

                SHA512

                c65b38856d4995b01454754044ae7373363a02b8e228c249fee3c1c2222f2348473f0bba5a5f2e4a280cd183e57dc13423bb09f86919ccb8968c8229310c5ad0

              • C:\Users\Admin\AppData\Local\Temp\1000206001\Stub1.exe
                Filesize

                160KB

                MD5

                5816d94bf51f3d6b6d8fa68809a05a57

                SHA1

                2f90c3c153bedd60af34e9748ddce2a67fe103e6

                SHA256

                ec9e73dd34c006df5b695379fd2fefe4a98e3aafa505c03e4c8bff42272b515b

                SHA512

                c6b0053037aaf062b5b862bea2b1a1f8d9eb9583ebf77727f7e9c7c821bd194db9adb21012186f5c46cb399bce10d23a7b53f866f51d2fe1c706ddbd02bdcd70

              • C:\Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exe
                Filesize

                241KB

                MD5

                71f206a09c6a316713fe5710090bb595

                SHA1

                3499f16371e584129f2d4d1171b35f1d456e0455

                SHA256

                5a41339569b08e820f423ab113dd2e0f66fa24184b6cd365c40265393800fffc

                SHA512

                55718b1aaaeaf2e769f7520edfaafe9a43a9599556e63b649c838308fd25964a217b09a5d46a7a7c62dd4aa0ffcce58ca5ccaabd9c9212f4b46104d35c4ec544

              • C:\Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exe
                Filesize

                241KB

                MD5

                71f206a09c6a316713fe5710090bb595

                SHA1

                3499f16371e584129f2d4d1171b35f1d456e0455

                SHA256

                5a41339569b08e820f423ab113dd2e0f66fa24184b6cd365c40265393800fffc

                SHA512

                55718b1aaaeaf2e769f7520edfaafe9a43a9599556e63b649c838308fd25964a217b09a5d46a7a7c62dd4aa0ffcce58ca5ccaabd9c9212f4b46104d35c4ec544

              • C:\Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exe
                Filesize

                241KB

                MD5

                71f206a09c6a316713fe5710090bb595

                SHA1

                3499f16371e584129f2d4d1171b35f1d456e0455

                SHA256

                5a41339569b08e820f423ab113dd2e0f66fa24184b6cd365c40265393800fffc

                SHA512

                55718b1aaaeaf2e769f7520edfaafe9a43a9599556e63b649c838308fd25964a217b09a5d46a7a7c62dd4aa0ffcce58ca5ccaabd9c9212f4b46104d35c4ec544

              • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                Filesize

                244KB

                MD5

                0906eebf6f5fd1f9029e4bc6f81a636d

                SHA1

                938df93f0f7ebb8f31a2d2e57c2447d17a0737b8

                SHA256

                470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e

                SHA512

                dad5fbcb96ebfb5c29d3fc3f46528ad46dce70acd67ee257b288ad58224117f90919ebce2693b4df9db7ba86f79fa417ff6b6b21c27a837e4d36d7c2b8ef7af6

              • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                Filesize

                244KB

                MD5

                0906eebf6f5fd1f9029e4bc6f81a636d

                SHA1

                938df93f0f7ebb8f31a2d2e57c2447d17a0737b8

                SHA256

                470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e

                SHA512

                dad5fbcb96ebfb5c29d3fc3f46528ad46dce70acd67ee257b288ad58224117f90919ebce2693b4df9db7ba86f79fa417ff6b6b21c27a837e4d36d7c2b8ef7af6

              • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                Filesize

                244KB

                MD5

                0906eebf6f5fd1f9029e4bc6f81a636d

                SHA1

                938df93f0f7ebb8f31a2d2e57c2447d17a0737b8

                SHA256

                470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e

                SHA512

                dad5fbcb96ebfb5c29d3fc3f46528ad46dce70acd67ee257b288ad58224117f90919ebce2693b4df9db7ba86f79fa417ff6b6b21c27a837e4d36d7c2b8ef7af6

              • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                Filesize

                244KB

                MD5

                0906eebf6f5fd1f9029e4bc6f81a636d

                SHA1

                938df93f0f7ebb8f31a2d2e57c2447d17a0737b8

                SHA256

                470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e

                SHA512

                dad5fbcb96ebfb5c29d3fc3f46528ad46dce70acd67ee257b288ad58224117f90919ebce2693b4df9db7ba86f79fa417ff6b6b21c27a837e4d36d7c2b8ef7af6

              • C:\Users\Admin\AppData\Roaming\1000205000\stub.exe
                Filesize

                241KB

                MD5

                71f206a09c6a316713fe5710090bb595

                SHA1

                3499f16371e584129f2d4d1171b35f1d456e0455

                SHA256

                5a41339569b08e820f423ab113dd2e0f66fa24184b6cd365c40265393800fffc

                SHA512

                55718b1aaaeaf2e769f7520edfaafe9a43a9599556e63b649c838308fd25964a217b09a5d46a7a7c62dd4aa0ffcce58ca5ccaabd9c9212f4b46104d35c4ec544

              • C:\Users\Admin\AppData\Roaming\1000205000\stub.exe
                Filesize

                241KB

                MD5

                71f206a09c6a316713fe5710090bb595

                SHA1

                3499f16371e584129f2d4d1171b35f1d456e0455

                SHA256

                5a41339569b08e820f423ab113dd2e0f66fa24184b6cd365c40265393800fffc

                SHA512

                55718b1aaaeaf2e769f7520edfaafe9a43a9599556e63b649c838308fd25964a217b09a5d46a7a7c62dd4aa0ffcce58ca5ccaabd9c9212f4b46104d35c4ec544

              • \Users\Admin\AppData\Local\Temp\1000199001\40Kdfdf.exe
                Filesize

                137KB

                MD5

                87ef06885fd221a86bba9e5b86a7ea7d

                SHA1

                6644db86f2d557167f442a5fe72a82de3fe943ba

                SHA256

                ab5026bf6fe5d692faaf86752b4c9fa226ec49ba54cfb625579287b498eab20f

                SHA512

                c65b38856d4995b01454754044ae7373363a02b8e228c249fee3c1c2222f2348473f0bba5a5f2e4a280cd183e57dc13423bb09f86919ccb8968c8229310c5ad0

              • \Users\Admin\AppData\Local\Temp\1000206001\Stub1.exe
                Filesize

                160KB

                MD5

                5816d94bf51f3d6b6d8fa68809a05a57

                SHA1

                2f90c3c153bedd60af34e9748ddce2a67fe103e6

                SHA256

                ec9e73dd34c006df5b695379fd2fefe4a98e3aafa505c03e4c8bff42272b515b

                SHA512

                c6b0053037aaf062b5b862bea2b1a1f8d9eb9583ebf77727f7e9c7c821bd194db9adb21012186f5c46cb399bce10d23a7b53f866f51d2fe1c706ddbd02bdcd70

              • \Users\Admin\AppData\Local\Temp\1000206001\Stub1.exe
                Filesize

                160KB

                MD5

                5816d94bf51f3d6b6d8fa68809a05a57

                SHA1

                2f90c3c153bedd60af34e9748ddce2a67fe103e6

                SHA256

                ec9e73dd34c006df5b695379fd2fefe4a98e3aafa505c03e4c8bff42272b515b

                SHA512

                c6b0053037aaf062b5b862bea2b1a1f8d9eb9583ebf77727f7e9c7c821bd194db9adb21012186f5c46cb399bce10d23a7b53f866f51d2fe1c706ddbd02bdcd70

              • \Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exe
                Filesize

                241KB

                MD5

                71f206a09c6a316713fe5710090bb595

                SHA1

                3499f16371e584129f2d4d1171b35f1d456e0455

                SHA256

                5a41339569b08e820f423ab113dd2e0f66fa24184b6cd365c40265393800fffc

                SHA512

                55718b1aaaeaf2e769f7520edfaafe9a43a9599556e63b649c838308fd25964a217b09a5d46a7a7c62dd4aa0ffcce58ca5ccaabd9c9212f4b46104d35c4ec544

              • \Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                Filesize

                244KB

                MD5

                0906eebf6f5fd1f9029e4bc6f81a636d

                SHA1

                938df93f0f7ebb8f31a2d2e57c2447d17a0737b8

                SHA256

                470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e

                SHA512

                dad5fbcb96ebfb5c29d3fc3f46528ad46dce70acd67ee257b288ad58224117f90919ebce2693b4df9db7ba86f79fa417ff6b6b21c27a837e4d36d7c2b8ef7af6

              • \Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                Filesize

                244KB

                MD5

                0906eebf6f5fd1f9029e4bc6f81a636d

                SHA1

                938df93f0f7ebb8f31a2d2e57c2447d17a0737b8

                SHA256

                470138ea67a6aafb0059bd41949d7052a9b9b3fef615acd880c6c29df3db083e

                SHA512

                dad5fbcb96ebfb5c29d3fc3f46528ad46dce70acd67ee257b288ad58224117f90919ebce2693b4df9db7ba86f79fa417ff6b6b21c27a837e4d36d7c2b8ef7af6

              • \Users\Admin\AppData\Roaming\1000205000\stub.exe
                Filesize

                241KB

                MD5

                71f206a09c6a316713fe5710090bb595

                SHA1

                3499f16371e584129f2d4d1171b35f1d456e0455

                SHA256

                5a41339569b08e820f423ab113dd2e0f66fa24184b6cd365c40265393800fffc

                SHA512

                55718b1aaaeaf2e769f7520edfaafe9a43a9599556e63b649c838308fd25964a217b09a5d46a7a7c62dd4aa0ffcce58ca5ccaabd9c9212f4b46104d35c4ec544

              • memory/268-105-0x0000000000000000-mapping.dmp
              • memory/324-75-0x0000000000000000-mapping.dmp
              • memory/588-72-0x0000000000000000-mapping.dmp
              • memory/592-68-0x0000000000000000-mapping.dmp
              • memory/608-73-0x0000000000000000-mapping.dmp
              • memory/776-100-0x0000000000000000-mapping.dmp
              • memory/776-103-0x00000000007FB000-0x000000000081A000-memory.dmp
                Filesize

                124KB

              • memory/776-104-0x0000000000400000-0x000000000065B000-memory.dmp
                Filesize

                2.4MB

              • memory/780-84-0x0000000000000000-mapping.dmp
              • memory/896-74-0x0000000000000000-mapping.dmp
              • memory/1336-106-0x0000000000000000-mapping.dmp
              • memory/1336-111-0x0000000000ABB000-0x0000000000ADA000-memory.dmp
                Filesize

                124KB

              • memory/1336-112-0x0000000000400000-0x000000000065B000-memory.dmp
                Filesize

                2.4MB

              • memory/1340-65-0x0000000000000000-mapping.dmp
              • memory/1468-66-0x0000000000000000-mapping.dmp
              • memory/1640-67-0x0000000000000000-mapping.dmp
              • memory/1668-77-0x0000000000000000-mapping.dmp
              • memory/1668-82-0x0000000001020000-0x0000000001048000-memory.dmp
                Filesize

                160KB

              • memory/1704-89-0x0000000000000000-mapping.dmp
              • memory/1764-69-0x000000000079B000-0x00000000007BA000-memory.dmp
                Filesize

                124KB

              • memory/1764-79-0x000000000079B000-0x00000000007BA000-memory.dmp
                Filesize

                124KB

              • memory/1764-70-0x0000000000400000-0x000000000065B000-memory.dmp
                Filesize

                2.4MB

              • memory/1764-80-0x0000000000400000-0x000000000065B000-memory.dmp
                Filesize

                2.4MB

              • memory/1764-59-0x0000000000000000-mapping.dmp
              • memory/1860-92-0x0000000000000000-mapping.dmp
              • memory/1912-97-0x0000000000000000-mapping.dmp
              • memory/2044-54-0x00000000767F1000-0x00000000767F3000-memory.dmp
                Filesize

                8KB

              • memory/2044-63-0x0000000000400000-0x000000000065B000-memory.dmp
                Filesize

                2.4MB

              • memory/2044-62-0x0000000000230000-0x000000000026E000-memory.dmp
                Filesize

                248KB

              • memory/2044-61-0x000000000081B000-0x000000000083A000-memory.dmp
                Filesize

                124KB

              • memory/2044-56-0x0000000000230000-0x000000000026E000-memory.dmp
                Filesize

                248KB

              • memory/2044-55-0x000000000081B000-0x000000000083A000-memory.dmp
                Filesize

                124KB