Analysis

  • max time kernel
    125s
  • max time network
    133s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25-11-2022 11:35

General

  • Target

    5ba7ff89a3887877e42f64edd509686f5e0920d5b5c2b1de219014b771810288.exe

  • Size

    233KB

  • MD5

    4149b7ced64c1cb7517446aab862ceed

  • SHA1

    aacbf47e0f15775f3c35b4c0cd39861534bb4559

  • SHA256

    5ba7ff89a3887877e42f64edd509686f5e0920d5b5c2b1de219014b771810288

  • SHA512

    cae9f023f97ee98d50fcd4d1a04f7c913c9e37bf85f1ee57f847dfcc3e11fce1c67dd74d571e0f9786150b55bc9ddecdbdba23efee50885815e142fa4f654170

  • SSDEEP

    6144:G5FBs/1/P03oPswvDwJwohllMN+bW3VCf:GzB+9P0YPsw7wxhjXbWlCf

Malware Config

Extracted

Family

amadey

Version

3.50

C2

193.56.146.174/g84kvj4jck/index.php

Extracted

Family

redline

Botnet

ritchshit

C2

94.103.183.33:80

Attributes
  • auth_value

    98c1a18edcc6e04afa19a0ee3b16a6e2

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ba7ff89a3887877e42f64edd509686f5e0920d5b5c2b1de219014b771810288.exe
    "C:\Users\Admin\AppData\Local\Temp\5ba7ff89a3887877e42f64edd509686f5e0920d5b5c2b1de219014b771810288.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3512
    • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
      "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:4984
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rovwer.exe" /P "Admin:N"&&CACLS "rovwer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\99e342142d" /P "Admin:N"&&CACLS "..\99e342142d" /P "Admin:R" /E&&Exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4544
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          4⤵
            PID:4580
          • C:\Windows\SysWOW64\cacls.exe
            CACLS "rovwer.exe" /P "Admin:N"
            4⤵
              PID:4492
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "rovwer.exe" /P "Admin:R" /E
              4⤵
                PID:4632
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                4⤵
                  PID:4224
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\99e342142d" /P "Admin:N"
                  4⤵
                    PID:2856
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\99e342142d" /P "Admin:R" /E
                    4⤵
                      PID:4680
                  • C:\Users\Admin\AppData\Local\Temp\1000221001\236.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000221001\236.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious use of WriteProcessMemory
                    PID:4052
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                      4⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:468
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 4052 -s 236
                      4⤵
                      • Program crash
                      PID:4448
              • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                1⤵
                • Executes dropped EXE
                PID:2336
              • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                1⤵
                • Executes dropped EXE
                PID:3960

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\1000221001\236.exe

                Filesize

                929KB

                MD5

                f159a709fd4cd800d0a1f766089c4318

                SHA1

                e2335ecebfc16d030d36183a5a1f1f61853dfea8

                SHA256

                f4dc5eedf8dd119d3b84eae34493e0b09e3bf2ff15d45e5f67266cf146f06d74

                SHA512

                4abb21862da9d34edb8a1827d5c19f050c6a7bb45a10fa81baa169703c2a914c6123313199292bc684ab098c7cab279680233fbc3446a100874ad68774adc354

              • C:\Users\Admin\AppData\Local\Temp\1000221001\236.exe

                Filesize

                929KB

                MD5

                f159a709fd4cd800d0a1f766089c4318

                SHA1

                e2335ecebfc16d030d36183a5a1f1f61853dfea8

                SHA256

                f4dc5eedf8dd119d3b84eae34493e0b09e3bf2ff15d45e5f67266cf146f06d74

                SHA512

                4abb21862da9d34edb8a1827d5c19f050c6a7bb45a10fa81baa169703c2a914c6123313199292bc684ab098c7cab279680233fbc3446a100874ad68774adc354

              • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe

                Filesize

                233KB

                MD5

                4149b7ced64c1cb7517446aab862ceed

                SHA1

                aacbf47e0f15775f3c35b4c0cd39861534bb4559

                SHA256

                5ba7ff89a3887877e42f64edd509686f5e0920d5b5c2b1de219014b771810288

                SHA512

                cae9f023f97ee98d50fcd4d1a04f7c913c9e37bf85f1ee57f847dfcc3e11fce1c67dd74d571e0f9786150b55bc9ddecdbdba23efee50885815e142fa4f654170

              • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe

                Filesize

                233KB

                MD5

                4149b7ced64c1cb7517446aab862ceed

                SHA1

                aacbf47e0f15775f3c35b4c0cd39861534bb4559

                SHA256

                5ba7ff89a3887877e42f64edd509686f5e0920d5b5c2b1de219014b771810288

                SHA512

                cae9f023f97ee98d50fcd4d1a04f7c913c9e37bf85f1ee57f847dfcc3e11fce1c67dd74d571e0f9786150b55bc9ddecdbdba23efee50885815e142fa4f654170

              • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe

                Filesize

                233KB

                MD5

                4149b7ced64c1cb7517446aab862ceed

                SHA1

                aacbf47e0f15775f3c35b4c0cd39861534bb4559

                SHA256

                5ba7ff89a3887877e42f64edd509686f5e0920d5b5c2b1de219014b771810288

                SHA512

                cae9f023f97ee98d50fcd4d1a04f7c913c9e37bf85f1ee57f847dfcc3e11fce1c67dd74d571e0f9786150b55bc9ddecdbdba23efee50885815e142fa4f654170

              • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe

                Filesize

                233KB

                MD5

                4149b7ced64c1cb7517446aab862ceed

                SHA1

                aacbf47e0f15775f3c35b4c0cd39861534bb4559

                SHA256

                5ba7ff89a3887877e42f64edd509686f5e0920d5b5c2b1de219014b771810288

                SHA512

                cae9f023f97ee98d50fcd4d1a04f7c913c9e37bf85f1ee57f847dfcc3e11fce1c67dd74d571e0f9786150b55bc9ddecdbdba23efee50885815e142fa4f654170

              • memory/468-449-0x000000000A720000-0x000000000AC1E000-memory.dmp

                Filesize

                5.0MB

              • memory/468-733-0x000000000C310000-0x000000000C83C000-memory.dmp

                Filesize

                5.2MB

              • memory/468-460-0x000000000A520000-0x000000000A5B2000-memory.dmp

                Filesize

                584KB

              • memory/468-452-0x000000000A2F0000-0x000000000A356000-memory.dmp

                Filesize

                408KB

              • memory/468-339-0x00000000005A218A-mapping.dmp

              • memory/468-474-0x000000000A4D0000-0x000000000A520000-memory.dmp

                Filesize

                320KB

              • memory/468-732-0x000000000BC10000-0x000000000BDD2000-memory.dmp

                Filesize

                1.8MB

              • memory/468-473-0x000000000A5C0000-0x000000000A636000-memory.dmp

                Filesize

                472KB

              • memory/468-403-0x0000000008FD0000-0x000000000901B000-memory.dmp

                Filesize

                300KB

              • memory/468-401-0x0000000008E70000-0x0000000008EAE000-memory.dmp

                Filesize

                248KB

              • memory/468-399-0x0000000008DF0000-0x0000000008E02000-memory.dmp

                Filesize

                72KB

              • memory/468-397-0x0000000008EC0000-0x0000000008FCA000-memory.dmp

                Filesize

                1.0MB

              • memory/468-396-0x0000000009340000-0x0000000009946000-memory.dmp

                Filesize

                6.0MB

              • memory/468-375-0x0000000000580000-0x00000000005A8000-memory.dmp

                Filesize

                160KB

              • memory/2044-413-0x0000000000400000-0x000000000071C000-memory.dmp

                Filesize

                3.1MB

              • memory/2044-185-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/2044-412-0x0000000000720000-0x000000000086A000-memory.dmp

                Filesize

                1.3MB

              • memory/2044-172-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/2044-240-0x0000000000400000-0x000000000071C000-memory.dmp

                Filesize

                3.1MB

              • memory/2044-238-0x0000000000720000-0x000000000086A000-memory.dmp

                Filesize

                1.3MB

              • memory/2044-235-0x0000000000A8A000-0x0000000000AA9000-memory.dmp

                Filesize

                124KB

              • memory/2044-187-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/2044-189-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/2044-188-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/2044-167-0x0000000000000000-mapping.dmp

              • memory/2044-169-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/2044-186-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/2044-411-0x0000000000A8A000-0x0000000000AA9000-memory.dmp

                Filesize

                124KB

              • memory/2044-184-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/2044-183-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/2044-170-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/2044-182-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/2044-181-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/2044-180-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/2044-178-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/2044-177-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/2044-176-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/2044-174-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/2336-859-0x0000000000400000-0x000000000071C000-memory.dmp

                Filesize

                3.1MB

              • memory/2856-293-0x0000000000000000-mapping.dmp

              • memory/3512-144-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-141-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-165-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-166-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-163-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-173-0x0000000002450000-0x000000000248E000-memory.dmp

                Filesize

                248KB

              • memory/3512-171-0x00000000008CA000-0x00000000008E9000-memory.dmp

                Filesize

                124KB

              • memory/3512-162-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-161-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-160-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-159-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-156-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-158-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-157-0x0000000000400000-0x000000000071C000-memory.dmp

                Filesize

                3.1MB

              • memory/3512-155-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-154-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-152-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-153-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-151-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-149-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-150-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-175-0x0000000000400000-0x000000000071C000-memory.dmp

                Filesize

                3.1MB

              • memory/3512-147-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-148-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-146-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-145-0x0000000002450000-0x000000000248E000-memory.dmp

                Filesize

                248KB

              • memory/3512-117-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-118-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-119-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-143-0x00000000008CA000-0x00000000008E9000-memory.dmp

                Filesize

                124KB

              • memory/3512-142-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-164-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-120-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-121-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-122-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-140-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-123-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-124-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-139-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-138-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-125-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-137-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-136-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-135-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-134-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-133-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-132-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-131-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-130-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-129-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-128-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-127-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-126-0x0000000077B00000-0x0000000077C8E000-memory.dmp

                Filesize

                1.6MB

              • memory/3960-901-0x0000000000860000-0x00000000009AA000-memory.dmp

                Filesize

                1.3MB

              • memory/3960-904-0x0000000000860000-0x00000000009AA000-memory.dmp

                Filesize

                1.3MB

              • memory/3960-906-0x0000000000400000-0x000000000071C000-memory.dmp

                Filesize

                3.1MB

              • memory/4052-294-0x0000000000000000-mapping.dmp

              • memory/4224-291-0x0000000000000000-mapping.dmp

              • memory/4492-248-0x0000000000000000-mapping.dmp

              • memory/4544-223-0x0000000000000000-mapping.dmp

              • memory/4580-244-0x0000000000000000-mapping.dmp

              • memory/4632-276-0x0000000000000000-mapping.dmp

              • memory/4680-320-0x0000000000000000-mapping.dmp

              • memory/4984-220-0x0000000000000000-mapping.dmp