Analysis

  • max time kernel
    141s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    06-12-2022 04:05

General

  • Target

    dd0a0312e7659c011d98b9945019bf2b5a9b35e37777cdc1f1b11b1bfe77075c.exe

  • Size

    332KB

  • MD5

    d39b424ace8bcca3c76976f1be110845

  • SHA1

    5a9f6d6cd10690ab24163916efe6e5282bacf292

  • SHA256

    dd0a0312e7659c011d98b9945019bf2b5a9b35e37777cdc1f1b11b1bfe77075c

  • SHA512

    0514027d7bbde93e386e5c3142a70619477fc046b9d823760c7921aff7a7479509f89a4a228850aa43f2c6004a33cd80762a45f46867ed292f4bbd9298b542c9

  • SSDEEP

    6144:UklgdWNTdGCpZ9EmqSlMSJdo9vjIDcuT3ZVS:UkKwNVpZ9vqS3JOSDcudVS

Malware Config

Extracted

Family

amadey

Version

3.50

C2

77.73.133.72/hfk3vK9/index.php

Extracted

Family

redline

Botnet

@2023

C2

79.137.192.28:20723

Attributes
  • auth_value

    93b4b7d0dc8e9415e261a402587c6710

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Amadey credential stealer module 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd0a0312e7659c011d98b9945019bf2b5a9b35e37777cdc1f1b11b1bfe77075c.exe
    "C:\Users\Admin\AppData\Local\Temp\dd0a0312e7659c011d98b9945019bf2b5a9b35e37777cdc1f1b11b1bfe77075c.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4760
    • C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe
      "C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4600
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:3952
      • C:\Users\Admin\AppData\Local\Temp\1000014001\softx64.exe
        "C:\Users\Admin\AppData\Local\Temp\1000014001\softx64.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:5032
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 528
          4⤵
          • Program crash
          PID:4048
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4812
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\f49dfc5e4e2508\cred64.dll, Main
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • outlook_win_path
        PID:4928
  • C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe
    C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe
    1⤵
    • Executes dropped EXE
    PID:2584
  • C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe
    C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe
    1⤵
    • Executes dropped EXE
    PID:4184
  • C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe
    C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe
    1⤵
    • Executes dropped EXE
    PID:3572

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1000014001\softx64.exe
    Filesize

    277KB

    MD5

    75f4207637e56307389dfa82b3463690

    SHA1

    d7d51072a59f78314e90327a9f5f74004ae8b2a7

    SHA256

    c20188aeac3782469ac75c40911e5bae45d36f2208e286b51a5f6f5e878e371b

    SHA512

    1a634a4c84a6dd8304b15ad7e7e5010e347c21f9e9f23529f6f4945b00727df6084b1d7917977e1f4fed51b8fd3dc10f5dfa1627c756152a5c9c86089fe82b52

  • C:\Users\Admin\AppData\Local\Temp\1000014001\softx64.exe
    Filesize

    277KB

    MD5

    75f4207637e56307389dfa82b3463690

    SHA1

    d7d51072a59f78314e90327a9f5f74004ae8b2a7

    SHA256

    c20188aeac3782469ac75c40911e5bae45d36f2208e286b51a5f6f5e878e371b

    SHA512

    1a634a4c84a6dd8304b15ad7e7e5010e347c21f9e9f23529f6f4945b00727df6084b1d7917977e1f4fed51b8fd3dc10f5dfa1627c756152a5c9c86089fe82b52

  • C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe
    Filesize

    332KB

    MD5

    d39b424ace8bcca3c76976f1be110845

    SHA1

    5a9f6d6cd10690ab24163916efe6e5282bacf292

    SHA256

    dd0a0312e7659c011d98b9945019bf2b5a9b35e37777cdc1f1b11b1bfe77075c

    SHA512

    0514027d7bbde93e386e5c3142a70619477fc046b9d823760c7921aff7a7479509f89a4a228850aa43f2c6004a33cd80762a45f46867ed292f4bbd9298b542c9

  • C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe
    Filesize

    332KB

    MD5

    d39b424ace8bcca3c76976f1be110845

    SHA1

    5a9f6d6cd10690ab24163916efe6e5282bacf292

    SHA256

    dd0a0312e7659c011d98b9945019bf2b5a9b35e37777cdc1f1b11b1bfe77075c

    SHA512

    0514027d7bbde93e386e5c3142a70619477fc046b9d823760c7921aff7a7479509f89a4a228850aa43f2c6004a33cd80762a45f46867ed292f4bbd9298b542c9

  • C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe
    Filesize

    332KB

    MD5

    d39b424ace8bcca3c76976f1be110845

    SHA1

    5a9f6d6cd10690ab24163916efe6e5282bacf292

    SHA256

    dd0a0312e7659c011d98b9945019bf2b5a9b35e37777cdc1f1b11b1bfe77075c

    SHA512

    0514027d7bbde93e386e5c3142a70619477fc046b9d823760c7921aff7a7479509f89a4a228850aa43f2c6004a33cd80762a45f46867ed292f4bbd9298b542c9

  • C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe
    Filesize

    332KB

    MD5

    d39b424ace8bcca3c76976f1be110845

    SHA1

    5a9f6d6cd10690ab24163916efe6e5282bacf292

    SHA256

    dd0a0312e7659c011d98b9945019bf2b5a9b35e37777cdc1f1b11b1bfe77075c

    SHA512

    0514027d7bbde93e386e5c3142a70619477fc046b9d823760c7921aff7a7479509f89a4a228850aa43f2c6004a33cd80762a45f46867ed292f4bbd9298b542c9

  • C:\Users\Admin\AppData\Local\Temp\ecaac49691\gntuud.exe
    Filesize

    332KB

    MD5

    d39b424ace8bcca3c76976f1be110845

    SHA1

    5a9f6d6cd10690ab24163916efe6e5282bacf292

    SHA256

    dd0a0312e7659c011d98b9945019bf2b5a9b35e37777cdc1f1b11b1bfe77075c

    SHA512

    0514027d7bbde93e386e5c3142a70619477fc046b9d823760c7921aff7a7479509f89a4a228850aa43f2c6004a33cd80762a45f46867ed292f4bbd9298b542c9

  • C:\Users\Admin\AppData\Roaming\f49dfc5e4e2508\cred64.dll
    Filesize

    126KB

    MD5

    349b2b47fef50fa6a1fc19d0ee4b2db8

    SHA1

    077f4328b3f060a9f010b1a63d9e127d24ddafd4

    SHA256

    5cd41f164de6f783b7da82b5f6dbd49413eccd87cc7470f2004d58ca081fb0e0

    SHA512

    83fd58be4c0051ed05b7a03443d256d52f09206d2f433bd302c9e9e3780b9d472e823aed1db01b5052dc8fdc63a4352beac9e399858a8252c057f11cf2bd1773

  • \Users\Admin\AppData\Roaming\f49dfc5e4e2508\cred64.dll
    Filesize

    126KB

    MD5

    349b2b47fef50fa6a1fc19d0ee4b2db8

    SHA1

    077f4328b3f060a9f010b1a63d9e127d24ddafd4

    SHA256

    5cd41f164de6f783b7da82b5f6dbd49413eccd87cc7470f2004d58ca081fb0e0

    SHA512

    83fd58be4c0051ed05b7a03443d256d52f09206d2f433bd302c9e9e3780b9d472e823aed1db01b5052dc8fdc63a4352beac9e399858a8252c057f11cf2bd1773

  • memory/2584-433-0x000000000075C000-0x000000000077B000-memory.dmp
    Filesize

    124KB

  • memory/2584-434-0x0000000000400000-0x0000000000471000-memory.dmp
    Filesize

    452KB

  • memory/3572-678-0x0000000000480000-0x000000000052E000-memory.dmp
    Filesize

    696KB

  • memory/3572-683-0x0000000000400000-0x0000000000471000-memory.dmp
    Filesize

    452KB

  • memory/3952-225-0x0000000000000000-mapping.dmp
  • memory/4184-646-0x0000000000400000-0x0000000000471000-memory.dmp
    Filesize

    452KB

  • memory/4600-206-0x00000000005D0000-0x000000000071A000-memory.dmp
    Filesize

    1.3MB

  • memory/4600-180-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4600-375-0x00000000005D0000-0x000000000071A000-memory.dmp
    Filesize

    1.3MB

  • memory/4600-175-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4600-207-0x0000000002070000-0x00000000020AE000-memory.dmp
    Filesize

    248KB

  • memory/4600-191-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4600-192-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4600-171-0x0000000000000000-mapping.dmp
  • memory/4600-376-0x0000000002070000-0x00000000020AE000-memory.dmp
    Filesize

    248KB

  • memory/4600-173-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4600-177-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4600-247-0x0000000000400000-0x0000000000471000-memory.dmp
    Filesize

    452KB

  • memory/4600-182-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4600-183-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4600-189-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4600-185-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4600-188-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4600-187-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4600-186-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4600-184-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4600-377-0x0000000000400000-0x0000000000471000-memory.dmp
    Filesize

    452KB

  • memory/4600-179-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4600-178-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4600-176-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-147-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-139-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-162-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-163-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-164-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-165-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-166-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-167-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-168-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-169-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-170-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-160-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-159-0x0000000000400000-0x0000000000471000-memory.dmp
    Filesize

    452KB

  • memory/4760-158-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-156-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-157-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-155-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-154-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-153-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-150-0x0000000000480000-0x000000000052E000-memory.dmp
    Filesize

    696KB

  • memory/4760-151-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-152-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-148-0x0000000000550000-0x000000000069A000-memory.dmp
    Filesize

    1.3MB

  • memory/4760-149-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-120-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-145-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-174-0x0000000000400000-0x0000000000471000-memory.dmp
    Filesize

    452KB

  • memory/4760-146-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-144-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-143-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-142-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-140-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-141-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-161-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-138-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-137-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-136-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-122-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-134-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-121-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-123-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-125-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-124-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-126-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-127-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-128-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-133-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-132-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-131-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-130-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4760-129-0x0000000077850000-0x00000000779DE000-memory.dmp
    Filesize

    1.6MB

  • memory/4812-356-0x000000000B640000-0x000000000B74A000-memory.dmp
    Filesize

    1.0MB

  • memory/4812-363-0x00000000099F0000-0x0000000009A02000-memory.dmp
    Filesize

    72KB

  • memory/4812-409-0x000000000C3D0000-0x000000000C592000-memory.dmp
    Filesize

    1.8MB

  • memory/4812-417-0x000000000CFF0000-0x000000000D51C000-memory.dmp
    Filesize

    5.2MB

  • memory/4812-393-0x000000000BF50000-0x000000000BFB6000-memory.dmp
    Filesize

    408KB

  • memory/4812-367-0x0000000009A90000-0x0000000009ADB000-memory.dmp
    Filesize

    300KB

  • memory/4812-403-0x000000000C160000-0x000000000C1F2000-memory.dmp
    Filesize

    584KB

  • memory/4812-293-0x000000000041B5D2-mapping.dmp
  • memory/4812-353-0x0000000009DE0000-0x000000000A3E6000-memory.dmp
    Filesize

    6.0MB

  • memory/4812-400-0x000000000C5C0000-0x000000000CABE000-memory.dmp
    Filesize

    5.0MB

  • memory/4812-365-0x0000000009A50000-0x0000000009A8E000-memory.dmp
    Filesize

    248KB

  • memory/4812-329-0x0000000000400000-0x0000000000432000-memory.dmp
    Filesize

    200KB

  • memory/4928-528-0x0000000000000000-mapping.dmp
  • memory/5032-254-0x0000000000000000-mapping.dmp