Analysis

  • max time kernel
    160s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/05/2023, 19:20

General

  • Target

    f6478354f7a667fddf69e731ae55cd85e7f6184f1dd1cfc69a40783e981a4009.exe

  • Size

    940KB

  • MD5

    231fdea53ec0e1e7172ab1ff83e03845

  • SHA1

    206ec506f2ead2a0ed9a85f18fa5e9ab3227e26d

  • SHA256

    f6478354f7a667fddf69e731ae55cd85e7f6184f1dd1cfc69a40783e981a4009

  • SHA512

    c91cd6b8ea02a738c3a8061b5b36f53a86703f005fa69b00341f255097878f75b9a5a646a5d81fb9412c90986ef52500aaa2b89fa9eadc973ebf9931c7e6e92a

  • SSDEEP

    24576:XyCeY/kzwYqvNsBnabZhLJj+mayOQ8MFg18McPCecUH:iCD2qinMd+ma1EgKV31

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6478354f7a667fddf69e731ae55cd85e7f6184f1dd1cfc69a40783e981a4009.exe
    "C:\Users\Admin\AppData\Local\Temp\f6478354f7a667fddf69e731ae55cd85e7f6184f1dd1cfc69a40783e981a4009.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1480
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za410311.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za410311.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4848
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za249103.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za249103.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1156
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\47424315.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\47424315.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2416
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w75TM45.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w75TM45.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4372
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4372 -s 1044
            5⤵
            • Program crash
            PID:692
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xlxEh91.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xlxEh91.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4204
        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4416
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:4628
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys704951.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys704951.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4296
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4372 -ip 4372
    1⤵
      PID:3132
    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
      C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
      1⤵
      • Executes dropped EXE
      PID:2168

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

      Filesize

      229KB

      MD5

      3308051ded87b1863a8d92925202c4b3

      SHA1

      7834ddc23e7976b07118fb580ae38234466dbdfb

      SHA256

      13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

      SHA512

      f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

      Filesize

      229KB

      MD5

      3308051ded87b1863a8d92925202c4b3

      SHA1

      7834ddc23e7976b07118fb580ae38234466dbdfb

      SHA256

      13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

      SHA512

      f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

      Filesize

      229KB

      MD5

      3308051ded87b1863a8d92925202c4b3

      SHA1

      7834ddc23e7976b07118fb580ae38234466dbdfb

      SHA256

      13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

      SHA512

      f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

      Filesize

      229KB

      MD5

      3308051ded87b1863a8d92925202c4b3

      SHA1

      7834ddc23e7976b07118fb580ae38234466dbdfb

      SHA256

      13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

      SHA512

      f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys704951.exe

      Filesize

      340KB

      MD5

      ddcc5c15a027e422adc9e213cef06324

      SHA1

      48ecab7fdcb16fda9dd72ffe812b7109b4af7524

      SHA256

      83507bba25287d6fc94331d4ddb3ea9e0b862e412a3ebd5dba393e8bcbbeb2b1

      SHA512

      02f797491fe473f1a42929855c5e05e707afbf97de6e0566b20a44418a35e3001b0a314792a298f442c330c549d2273b690751c98f6e4ae5628303149a046ee5

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys704951.exe

      Filesize

      340KB

      MD5

      ddcc5c15a027e422adc9e213cef06324

      SHA1

      48ecab7fdcb16fda9dd72ffe812b7109b4af7524

      SHA256

      83507bba25287d6fc94331d4ddb3ea9e0b862e412a3ebd5dba393e8bcbbeb2b1

      SHA512

      02f797491fe473f1a42929855c5e05e707afbf97de6e0566b20a44418a35e3001b0a314792a298f442c330c549d2273b690751c98f6e4ae5628303149a046ee5

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za410311.exe

      Filesize

      588KB

      MD5

      f7a0d32b63e9e28a85d20daaf97ae014

      SHA1

      d11e2560abe28218206bf1c70c61c06c8beb3108

      SHA256

      321fbac14f48bd76c83ecedccb04ed84bd9679c3fe5782b4f4dc4e48ffe3d8f6

      SHA512

      b1345f1916d2baa48a9020d166e290fab9351b3de3f13e0ca5067249902bd99aba6047175e9edb210ba7f7f059a74807980b06130d03eb27638ebedf90a68026

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za410311.exe

      Filesize

      588KB

      MD5

      f7a0d32b63e9e28a85d20daaf97ae014

      SHA1

      d11e2560abe28218206bf1c70c61c06c8beb3108

      SHA256

      321fbac14f48bd76c83ecedccb04ed84bd9679c3fe5782b4f4dc4e48ffe3d8f6

      SHA512

      b1345f1916d2baa48a9020d166e290fab9351b3de3f13e0ca5067249902bd99aba6047175e9edb210ba7f7f059a74807980b06130d03eb27638ebedf90a68026

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xlxEh91.exe

      Filesize

      229KB

      MD5

      3308051ded87b1863a8d92925202c4b3

      SHA1

      7834ddc23e7976b07118fb580ae38234466dbdfb

      SHA256

      13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

      SHA512

      f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xlxEh91.exe

      Filesize

      229KB

      MD5

      3308051ded87b1863a8d92925202c4b3

      SHA1

      7834ddc23e7976b07118fb580ae38234466dbdfb

      SHA256

      13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

      SHA512

      f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za249103.exe

      Filesize

      405KB

      MD5

      433c756046b4df08ba6f316ecde0f2c1

      SHA1

      6d723a4ef35249c7731837164bafaf09c82a16f1

      SHA256

      6c083e403a22bbe5126ff3a3d8803a952ec3c52a6264e3a929f2c9113ad1ab75

      SHA512

      c133935d3f6012d853bfdd978a49c420625c1ba7ba832de53116ce886f1cab12ea8e373b898a53793fba28f4dabf677cdb6fa0b1f501ab0ee732ff8f98eb42b3

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za249103.exe

      Filesize

      405KB

      MD5

      433c756046b4df08ba6f316ecde0f2c1

      SHA1

      6d723a4ef35249c7731837164bafaf09c82a16f1

      SHA256

      6c083e403a22bbe5126ff3a3d8803a952ec3c52a6264e3a929f2c9113ad1ab75

      SHA512

      c133935d3f6012d853bfdd978a49c420625c1ba7ba832de53116ce886f1cab12ea8e373b898a53793fba28f4dabf677cdb6fa0b1f501ab0ee732ff8f98eb42b3

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\47424315.exe

      Filesize

      176KB

      MD5

      2b71f4b18ac8214a2bff547b6ce2f64f

      SHA1

      b8f2f25139a7b2e8d5e8fbc024eb5cac518bc6a5

      SHA256

      f7eedf3aec775a62c265d1652686b30a8a45a953523e2fb3cfc1fac3c6a66fbc

      SHA512

      33518eff768610bf54f9888d9d0d746b0c3500dc5f2b8fd5f1641d5a264f657a8311b40364f70932512581183b244fec3feb535e21c13e0ec8adec9994175177

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\47424315.exe

      Filesize

      176KB

      MD5

      2b71f4b18ac8214a2bff547b6ce2f64f

      SHA1

      b8f2f25139a7b2e8d5e8fbc024eb5cac518bc6a5

      SHA256

      f7eedf3aec775a62c265d1652686b30a8a45a953523e2fb3cfc1fac3c6a66fbc

      SHA512

      33518eff768610bf54f9888d9d0d746b0c3500dc5f2b8fd5f1641d5a264f657a8311b40364f70932512581183b244fec3feb535e21c13e0ec8adec9994175177

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w75TM45.exe

      Filesize

      258KB

      MD5

      1e23aeca44827bc60f18097e59dcf833

      SHA1

      06fde5b66b7f5369c6de1508e704e859510b2962

      SHA256

      aa83f604a184f168a987c41f0f0095009827ab9498bee0f3cc77f258ec4a277f

      SHA512

      b07e55f169b435b701ac4b9cff363aaf4ce80810fd4b4d8ce70c997eb3f0b1df4e44acb27f9e627abb2865f0e9b5bba5396d8c6ddab7a18e5eb4accbeaaaaa72

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w75TM45.exe

      Filesize

      258KB

      MD5

      1e23aeca44827bc60f18097e59dcf833

      SHA1

      06fde5b66b7f5369c6de1508e704e859510b2962

      SHA256

      aa83f604a184f168a987c41f0f0095009827ab9498bee0f3cc77f258ec4a277f

      SHA512

      b07e55f169b435b701ac4b9cff363aaf4ce80810fd4b4d8ce70c997eb3f0b1df4e44acb27f9e627abb2865f0e9b5bba5396d8c6ddab7a18e5eb4accbeaaaaa72

    • memory/2416-169-0x0000000004950000-0x0000000004963000-memory.dmp

      Filesize

      76KB

    • memory/2416-165-0x0000000004950000-0x0000000004963000-memory.dmp

      Filesize

      76KB

    • memory/2416-175-0x0000000004950000-0x0000000004963000-memory.dmp

      Filesize

      76KB

    • memory/2416-177-0x0000000004950000-0x0000000004963000-memory.dmp

      Filesize

      76KB

    • memory/2416-179-0x0000000004950000-0x0000000004963000-memory.dmp

      Filesize

      76KB

    • memory/2416-181-0x0000000004950000-0x0000000004963000-memory.dmp

      Filesize

      76KB

    • memory/2416-183-0x0000000004950000-0x0000000004963000-memory.dmp

      Filesize

      76KB

    • memory/2416-184-0x00000000049C0000-0x00000000049D0000-memory.dmp

      Filesize

      64KB

    • memory/2416-185-0x00000000049C0000-0x00000000049D0000-memory.dmp

      Filesize

      64KB

    • memory/2416-186-0x00000000049C0000-0x00000000049D0000-memory.dmp

      Filesize

      64KB

    • memory/2416-187-0x00000000049C0000-0x00000000049D0000-memory.dmp

      Filesize

      64KB

    • memory/2416-188-0x00000000049C0000-0x00000000049D0000-memory.dmp

      Filesize

      64KB

    • memory/2416-171-0x0000000004950000-0x0000000004963000-memory.dmp

      Filesize

      76KB

    • memory/2416-167-0x0000000004950000-0x0000000004963000-memory.dmp

      Filesize

      76KB

    • memory/2416-154-0x00000000049C0000-0x00000000049D0000-memory.dmp

      Filesize

      64KB

    • memory/2416-173-0x0000000004950000-0x0000000004963000-memory.dmp

      Filesize

      76KB

    • memory/2416-155-0x00000000049D0000-0x0000000004F74000-memory.dmp

      Filesize

      5.6MB

    • memory/2416-156-0x0000000004950000-0x0000000004963000-memory.dmp

      Filesize

      76KB

    • memory/2416-157-0x0000000004950000-0x0000000004963000-memory.dmp

      Filesize

      76KB

    • memory/2416-159-0x0000000004950000-0x0000000004963000-memory.dmp

      Filesize

      76KB

    • memory/2416-161-0x0000000004950000-0x0000000004963000-memory.dmp

      Filesize

      76KB

    • memory/2416-163-0x0000000004950000-0x0000000004963000-memory.dmp

      Filesize

      76KB

    • memory/4296-333-0x0000000002CF0000-0x0000000002D36000-memory.dmp

      Filesize

      280KB

    • memory/4296-1052-0x000000000A300000-0x000000000A312000-memory.dmp

      Filesize

      72KB

    • memory/4296-1058-0x00000000071D0000-0x00000000071E0000-memory.dmp

      Filesize

      64KB

    • memory/4296-1056-0x00000000071D0000-0x00000000071E0000-memory.dmp

      Filesize

      64KB

    • memory/4296-1055-0x000000000A440000-0x000000000A47C000-memory.dmp

      Filesize

      240KB

    • memory/4296-1053-0x000000000A320000-0x000000000A42A000-memory.dmp

      Filesize

      1.0MB

    • memory/4296-1051-0x0000000009C50000-0x000000000A268000-memory.dmp

      Filesize

      6.1MB

    • memory/4296-1050-0x00000000071D0000-0x00000000071E0000-memory.dmp

      Filesize

      64KB

    • memory/4296-1049-0x00000000071D0000-0x00000000071E0000-memory.dmp

      Filesize

      64KB

    • memory/4296-252-0x0000000007160000-0x0000000007195000-memory.dmp

      Filesize

      212KB

    • memory/4296-253-0x0000000007160000-0x0000000007195000-memory.dmp

      Filesize

      212KB

    • memory/4296-255-0x0000000007160000-0x0000000007195000-memory.dmp

      Filesize

      212KB

    • memory/4296-1048-0x00000000071D0000-0x00000000071E0000-memory.dmp

      Filesize

      64KB

    • memory/4296-335-0x00000000071D0000-0x00000000071E0000-memory.dmp

      Filesize

      64KB

    • memory/4296-337-0x00000000071D0000-0x00000000071E0000-memory.dmp

      Filesize

      64KB

    • memory/4372-223-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/4372-224-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/4372-225-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/4372-226-0x0000000000400000-0x0000000002B9B000-memory.dmp

      Filesize

      39.6MB

    • memory/4372-232-0x0000000000400000-0x0000000002B9B000-memory.dmp

      Filesize

      39.6MB

    • memory/4372-227-0x0000000004680000-0x00000000046AD000-memory.dmp

      Filesize

      180KB

    • memory/4372-230-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/4372-229-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/4372-231-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/4372-194-0x0000000004680000-0x00000000046AD000-memory.dmp

      Filesize

      180KB