Analysis

  • max time kernel
    116s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    07-12-2022 03:20

General

  • Target

    976fc609d841717da80daa35279c65df2dc9d4f928483259b287208b86097a7b.exe

  • Size

    332KB

  • MD5

    933a85f92647e1d6ebc124fabb767475

  • SHA1

    cd5683be2cdcd5bab25b9eb2ce90a6926ced96f3

  • SHA256

    976fc609d841717da80daa35279c65df2dc9d4f928483259b287208b86097a7b

  • SHA512

    5f18a1f0261266e91ebbd88407397c8968302d683e92d4fdf420b65817f41003dc8df896ab8f7caa3e36916b1de7e516b12426fee34315920f62ec6151c77922

  • SSDEEP

    6144:ZQve+k+JZnNEfnxMQFUBVDl42is8Gs3fxSHdbqoWJzRIDceNVS:ZQWf+J/Ux/y542FVoo9GoWJaDceNVS

Malware Config

Extracted

Family

amadey

Version

3.50

C2

62.204.41.6/p9cWxH/index.php

Extracted

Family

redline

Botnet

wosh

C2

31.41.244.14:4683

Attributes
  • auth_value

    f0ec85e2aaa9e62929e2fb9e09d843f4

Extracted

Family

redline

Botnet

Newwww2023

C2

185.106.92.214:2515

Attributes
  • auth_value

    0e2250f24c7a34075db77aa6f56e856f

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Amadey credential stealer module 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 10 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\976fc609d841717da80daa35279c65df2dc9d4f928483259b287208b86097a7b.exe
    "C:\Users\Admin\AppData\Local\Temp\976fc609d841717da80daa35279c65df2dc9d4f928483259b287208b86097a7b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1228
    • C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
      "C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1036
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:1384
      • C:\Users\Admin\AppData\Local\Temp\1000041001\wish.exe
        "C:\Users\Admin\AppData\Local\Temp\1000041001\wish.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1676
      • C:\Users\Admin\AppData\Local\Temp\1000042001\linda5.exe
        "C:\Users\Admin\AppData\Local\Temp\1000042001\linda5.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1752
        • C:\Windows\SysWOW64\msiexec.exe
          "C:\Windows\System32\msiexec.exe" /Y .\XVSE.NYN
          4⤵
          • Loads dropped DLL
          PID:1692
      • C:\Users\Admin\AppData\Local\Temp\1000043001\anon.exe
        "C:\Users\Admin\AppData\Local\Temp\1000043001\anon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1668
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • outlook_win_path
        PID:1192
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {A8F9BD5E-9E02-4426-BF5D-483134BEED6D} S-1-5-21-4063495947-34355257-727531523-1000:RYNKSFQE\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
      C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
      2⤵
      • Executes dropped EXE
      PID:268
    • C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
      C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
      2⤵
      • Executes dropped EXE
      PID:1844

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1000041001\wish.exe
    Filesize

    175KB

    MD5

    3b6246132b7fb972ed877b79d700e32e

    SHA1

    af68ac119ccce9c7be5aeefa1e86102ee4019ebb

    SHA256

    4743bad8f6939aa7645a043208010c2a9e75fbbcbbc8ca597a0c2a74ce7b6cc0

    SHA512

    03573c63e3d03d89d2a2971d761d33e8d89895680ae8b7e5ceb3a78c8582666f8a300aad4c6c4a7c1cd118ac774ffce03053c96a57df9e66a02773111dbcfcca

  • C:\Users\Admin\AppData\Local\Temp\1000041001\wish.exe
    Filesize

    175KB

    MD5

    3b6246132b7fb972ed877b79d700e32e

    SHA1

    af68ac119ccce9c7be5aeefa1e86102ee4019ebb

    SHA256

    4743bad8f6939aa7645a043208010c2a9e75fbbcbbc8ca597a0c2a74ce7b6cc0

    SHA512

    03573c63e3d03d89d2a2971d761d33e8d89895680ae8b7e5ceb3a78c8582666f8a300aad4c6c4a7c1cd118ac774ffce03053c96a57df9e66a02773111dbcfcca

  • C:\Users\Admin\AppData\Local\Temp\1000042001\linda5.exe
    Filesize

    1.7MB

    MD5

    07b5fef70580dc56091ef9a880d51dd3

    SHA1

    2a107f072a11812ffeef7f6f4aff3018989f8288

    SHA256

    ffbdc78737d2ae71cb0e838ee7411055aac23eb995f6f47d5646d363cff91755

    SHA512

    a9d6882b3fc8def6d16c69925eeae589ed84ecc412878502ba38e5081d374b0d8acbbd41b78b7c260d35e77399d09c7226a3b77937d5ea4943e795d3e82ca1b1

  • C:\Users\Admin\AppData\Local\Temp\1000042001\linda5.exe
    Filesize

    1.7MB

    MD5

    07b5fef70580dc56091ef9a880d51dd3

    SHA1

    2a107f072a11812ffeef7f6f4aff3018989f8288

    SHA256

    ffbdc78737d2ae71cb0e838ee7411055aac23eb995f6f47d5646d363cff91755

    SHA512

    a9d6882b3fc8def6d16c69925eeae589ed84ecc412878502ba38e5081d374b0d8acbbd41b78b7c260d35e77399d09c7226a3b77937d5ea4943e795d3e82ca1b1

  • C:\Users\Admin\AppData\Local\Temp\1000043001\anon.exe
    Filesize

    175KB

    MD5

    1bd8bdf9b43e506fd12e79de2fb2dc6f

    SHA1

    7d1af5f2fb51cfe460615a0a37b8d6b187db0e19

    SHA256

    7e35de071bdb96517e6aa5eeb50e037f0f44ffb2dd3fc3971ac68bd2f211a7d2

    SHA512

    ba7df2ec2ed36e5216c0501c216a09e4844051054bc489099ae63647a0a802410243c60e56a83f5710dc6ff5636de34a0bea4f6f40bceb880d008940c6895571

  • C:\Users\Admin\AppData\Local\Temp\1000043001\anon.exe
    Filesize

    175KB

    MD5

    1bd8bdf9b43e506fd12e79de2fb2dc6f

    SHA1

    7d1af5f2fb51cfe460615a0a37b8d6b187db0e19

    SHA256

    7e35de071bdb96517e6aa5eeb50e037f0f44ffb2dd3fc3971ac68bd2f211a7d2

    SHA512

    ba7df2ec2ed36e5216c0501c216a09e4844051054bc489099ae63647a0a802410243c60e56a83f5710dc6ff5636de34a0bea4f6f40bceb880d008940c6895571

  • C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
    Filesize

    332KB

    MD5

    933a85f92647e1d6ebc124fabb767475

    SHA1

    cd5683be2cdcd5bab25b9eb2ce90a6926ced96f3

    SHA256

    976fc609d841717da80daa35279c65df2dc9d4f928483259b287208b86097a7b

    SHA512

    5f18a1f0261266e91ebbd88407397c8968302d683e92d4fdf420b65817f41003dc8df896ab8f7caa3e36916b1de7e516b12426fee34315920f62ec6151c77922

  • C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
    Filesize

    332KB

    MD5

    933a85f92647e1d6ebc124fabb767475

    SHA1

    cd5683be2cdcd5bab25b9eb2ce90a6926ced96f3

    SHA256

    976fc609d841717da80daa35279c65df2dc9d4f928483259b287208b86097a7b

    SHA512

    5f18a1f0261266e91ebbd88407397c8968302d683e92d4fdf420b65817f41003dc8df896ab8f7caa3e36916b1de7e516b12426fee34315920f62ec6151c77922

  • C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
    Filesize

    332KB

    MD5

    933a85f92647e1d6ebc124fabb767475

    SHA1

    cd5683be2cdcd5bab25b9eb2ce90a6926ced96f3

    SHA256

    976fc609d841717da80daa35279c65df2dc9d4f928483259b287208b86097a7b

    SHA512

    5f18a1f0261266e91ebbd88407397c8968302d683e92d4fdf420b65817f41003dc8df896ab8f7caa3e36916b1de7e516b12426fee34315920f62ec6151c77922

  • C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
    Filesize

    332KB

    MD5

    933a85f92647e1d6ebc124fabb767475

    SHA1

    cd5683be2cdcd5bab25b9eb2ce90a6926ced96f3

    SHA256

    976fc609d841717da80daa35279c65df2dc9d4f928483259b287208b86097a7b

    SHA512

    5f18a1f0261266e91ebbd88407397c8968302d683e92d4fdf420b65817f41003dc8df896ab8f7caa3e36916b1de7e516b12426fee34315920f62ec6151c77922

  • C:\Users\Admin\AppData\Local\Temp\XVSE.NYN
    Filesize

    2.7MB

    MD5

    f3933e8b8432fbcb6613cd547e81a736

    SHA1

    5b029c7a420f4b2008b17ac1ec665262e015d633

    SHA256

    196cb7c8f4b7e7f5f39a97fb851e4c82041d82d42ce9744d382d8055ff84d0f7

    SHA512

    0b950945e67665cfd34be4d4efd175fbd1c58b8da635bff398b94663fda82d91e76593c63aa4a10d5758c3ce556f4a6190af9edaf48d82537e8e6f6d1a73bbcf

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
    Filesize

    126KB

    MD5

    98cc0f811ad5ff43fedc262961002498

    SHA1

    37e48635fcef35c0b3db3c1f0c35833899eb53d8

    SHA256

    62d5b300b911a022c5c146ea010769cd0c2fdcc86aba7e5be25aff1f799220be

    SHA512

    d2ae90628acf92c6f7d176a4c866a0b6a6cfcfd722f0aec89cb48afead4318311c3ca95fe6865ac254b601b70ef5f289a35f4b26fba67a4c9b3cc5e68c7bf9c1

  • \Users\Admin\AppData\Local\Temp\1000041001\wish.exe
    Filesize

    175KB

    MD5

    3b6246132b7fb972ed877b79d700e32e

    SHA1

    af68ac119ccce9c7be5aeefa1e86102ee4019ebb

    SHA256

    4743bad8f6939aa7645a043208010c2a9e75fbbcbbc8ca597a0c2a74ce7b6cc0

    SHA512

    03573c63e3d03d89d2a2971d761d33e8d89895680ae8b7e5ceb3a78c8582666f8a300aad4c6c4a7c1cd118ac774ffce03053c96a57df9e66a02773111dbcfcca

  • \Users\Admin\AppData\Local\Temp\1000042001\linda5.exe
    Filesize

    1.7MB

    MD5

    07b5fef70580dc56091ef9a880d51dd3

    SHA1

    2a107f072a11812ffeef7f6f4aff3018989f8288

    SHA256

    ffbdc78737d2ae71cb0e838ee7411055aac23eb995f6f47d5646d363cff91755

    SHA512

    a9d6882b3fc8def6d16c69925eeae589ed84ecc412878502ba38e5081d374b0d8acbbd41b78b7c260d35e77399d09c7226a3b77937d5ea4943e795d3e82ca1b1

  • \Users\Admin\AppData\Local\Temp\1000043001\anon.exe
    Filesize

    175KB

    MD5

    1bd8bdf9b43e506fd12e79de2fb2dc6f

    SHA1

    7d1af5f2fb51cfe460615a0a37b8d6b187db0e19

    SHA256

    7e35de071bdb96517e6aa5eeb50e037f0f44ffb2dd3fc3971ac68bd2f211a7d2

    SHA512

    ba7df2ec2ed36e5216c0501c216a09e4844051054bc489099ae63647a0a802410243c60e56a83f5710dc6ff5636de34a0bea4f6f40bceb880d008940c6895571

  • \Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
    Filesize

    332KB

    MD5

    933a85f92647e1d6ebc124fabb767475

    SHA1

    cd5683be2cdcd5bab25b9eb2ce90a6926ced96f3

    SHA256

    976fc609d841717da80daa35279c65df2dc9d4f928483259b287208b86097a7b

    SHA512

    5f18a1f0261266e91ebbd88407397c8968302d683e92d4fdf420b65817f41003dc8df896ab8f7caa3e36916b1de7e516b12426fee34315920f62ec6151c77922

  • \Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
    Filesize

    332KB

    MD5

    933a85f92647e1d6ebc124fabb767475

    SHA1

    cd5683be2cdcd5bab25b9eb2ce90a6926ced96f3

    SHA256

    976fc609d841717da80daa35279c65df2dc9d4f928483259b287208b86097a7b

    SHA512

    5f18a1f0261266e91ebbd88407397c8968302d683e92d4fdf420b65817f41003dc8df896ab8f7caa3e36916b1de7e516b12426fee34315920f62ec6151c77922

  • \Users\Admin\AppData\Local\Temp\xVsE.nyN
    Filesize

    2.7MB

    MD5

    f3933e8b8432fbcb6613cd547e81a736

    SHA1

    5b029c7a420f4b2008b17ac1ec665262e015d633

    SHA256

    196cb7c8f4b7e7f5f39a97fb851e4c82041d82d42ce9744d382d8055ff84d0f7

    SHA512

    0b950945e67665cfd34be4d4efd175fbd1c58b8da635bff398b94663fda82d91e76593c63aa4a10d5758c3ce556f4a6190af9edaf48d82537e8e6f6d1a73bbcf

  • \Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
    Filesize

    126KB

    MD5

    98cc0f811ad5ff43fedc262961002498

    SHA1

    37e48635fcef35c0b3db3c1f0c35833899eb53d8

    SHA256

    62d5b300b911a022c5c146ea010769cd0c2fdcc86aba7e5be25aff1f799220be

    SHA512

    d2ae90628acf92c6f7d176a4c866a0b6a6cfcfd722f0aec89cb48afead4318311c3ca95fe6865ac254b601b70ef5f289a35f4b26fba67a4c9b3cc5e68c7bf9c1

  • \Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
    Filesize

    126KB

    MD5

    98cc0f811ad5ff43fedc262961002498

    SHA1

    37e48635fcef35c0b3db3c1f0c35833899eb53d8

    SHA256

    62d5b300b911a022c5c146ea010769cd0c2fdcc86aba7e5be25aff1f799220be

    SHA512

    d2ae90628acf92c6f7d176a4c866a0b6a6cfcfd722f0aec89cb48afead4318311c3ca95fe6865ac254b601b70ef5f289a35f4b26fba67a4c9b3cc5e68c7bf9c1

  • \Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
    Filesize

    126KB

    MD5

    98cc0f811ad5ff43fedc262961002498

    SHA1

    37e48635fcef35c0b3db3c1f0c35833899eb53d8

    SHA256

    62d5b300b911a022c5c146ea010769cd0c2fdcc86aba7e5be25aff1f799220be

    SHA512

    d2ae90628acf92c6f7d176a4c866a0b6a6cfcfd722f0aec89cb48afead4318311c3ca95fe6865ac254b601b70ef5f289a35f4b26fba67a4c9b3cc5e68c7bf9c1

  • \Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
    Filesize

    126KB

    MD5

    98cc0f811ad5ff43fedc262961002498

    SHA1

    37e48635fcef35c0b3db3c1f0c35833899eb53d8

    SHA256

    62d5b300b911a022c5c146ea010769cd0c2fdcc86aba7e5be25aff1f799220be

    SHA512

    d2ae90628acf92c6f7d176a4c866a0b6a6cfcfd722f0aec89cb48afead4318311c3ca95fe6865ac254b601b70ef5f289a35f4b26fba67a4c9b3cc5e68c7bf9c1

  • memory/268-103-0x0000000000400000-0x0000000000471000-memory.dmp
    Filesize

    452KB

  • memory/268-99-0x0000000000000000-mapping.dmp
  • memory/1036-57-0x0000000000000000-mapping.dmp
  • memory/1036-75-0x0000000000400000-0x0000000000471000-memory.dmp
    Filesize

    452KB

  • memory/1036-64-0x0000000000230000-0x0000000000330000-memory.dmp
    Filesize

    1024KB

  • memory/1036-65-0x0000000000400000-0x0000000000471000-memory.dmp
    Filesize

    452KB

  • memory/1036-74-0x0000000000230000-0x0000000000330000-memory.dmp
    Filesize

    1024KB

  • memory/1192-104-0x0000000000000000-mapping.dmp
  • memory/1192-111-0x0000000000170000-0x0000000000194000-memory.dmp
    Filesize

    144KB

  • memory/1228-59-0x000000000050B000-0x000000000052A000-memory.dmp
    Filesize

    124KB

  • memory/1228-61-0x0000000000400000-0x0000000000471000-memory.dmp
    Filesize

    452KB

  • memory/1228-54-0x0000000074DE1000-0x0000000074DE3000-memory.dmp
    Filesize

    8KB

  • memory/1228-60-0x00000000002A0000-0x00000000002DE000-memory.dmp
    Filesize

    248KB

  • memory/1384-66-0x0000000000000000-mapping.dmp
  • memory/1668-92-0x0000000001130000-0x0000000001162000-memory.dmp
    Filesize

    200KB

  • memory/1668-89-0x0000000000000000-mapping.dmp
  • memory/1676-69-0x0000000000000000-mapping.dmp
  • memory/1676-72-0x0000000000E10000-0x0000000000E42000-memory.dmp
    Filesize

    200KB

  • memory/1692-85-0x00000000022C0000-0x0000000002582000-memory.dmp
    Filesize

    2.8MB

  • memory/1692-98-0x0000000002BC0000-0x0000000002CF0000-memory.dmp
    Filesize

    1.2MB

  • memory/1692-95-0x0000000002DD0000-0x0000000002E99000-memory.dmp
    Filesize

    804KB

  • memory/1692-94-0x0000000002CF0000-0x0000000002DCF000-memory.dmp
    Filesize

    892KB

  • memory/1692-87-0x0000000002BC0000-0x0000000002CF0000-memory.dmp
    Filesize

    1.2MB

  • memory/1692-86-0x0000000002810000-0x0000000002A84000-memory.dmp
    Filesize

    2.5MB

  • memory/1692-81-0x0000000000000000-mapping.dmp
  • memory/1752-77-0x0000000000000000-mapping.dmp
  • memory/1844-112-0x0000000000000000-mapping.dmp
  • memory/1844-116-0x0000000000400000-0x0000000000471000-memory.dmp
    Filesize

    452KB

  • memory/1844-115-0x00000000005BB000-0x00000000005DA000-memory.dmp
    Filesize

    124KB