Analysis

  • max time kernel
    149s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-05-2023 20:42

General

  • Target

    191dba2cf2f2d168ce09b434100e65aaa004049f4bc1b5e1251b9fb9d9218f94.exe

  • Size

    1.1MB

  • MD5

    7e390b2404ce2fbcb4f41acd87c065d2

  • SHA1

    1e7a162c9db0215db81343ad72156ecb4200ab8e

  • SHA256

    191dba2cf2f2d168ce09b434100e65aaa004049f4bc1b5e1251b9fb9d9218f94

  • SHA512

    aaa216545c1c00af292250431575cca50db5a372b906a1de5fe2efd28bf85be6658e5ce19a70777f50e41153828db8483e6dc7236c05f5f64ade639f2786f897

  • SSDEEP

    24576:7y5aK6IVQ2bRRHW2Uv2tRyoAFZC7UhPWLYEn4cvm8WnUDiFSI:uxjVNbRTtnmZC7CPWxnPCw4S

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\191dba2cf2f2d168ce09b434100e65aaa004049f4bc1b5e1251b9fb9d9218f94.exe
    "C:\Users\Admin\AppData\Local\Temp\191dba2cf2f2d168ce09b434100e65aaa004049f4bc1b5e1251b9fb9d9218f94.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4728
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za346178.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za346178.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2576
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za947778.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za947778.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2012
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za625552.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za625552.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:5044
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\51343283.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\51343283.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3660
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u97835410.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u97835410.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1868
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1868 -s 1080
              6⤵
              • Program crash
              PID:648
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w26PM03.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w26PM03.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:3380
          • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4460
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:3852
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xmXxk31.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xmXxk31.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4320
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1868 -ip 1868
    1⤵
      PID:4828
    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
      C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
      1⤵
      • Executes dropped EXE
      PID:4500

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

      Filesize

      229KB

      MD5

      9152b845d85d678602b380b7c8ccc36d

      SHA1

      5a453647332e0bbbfd13d28336fdf90eb1f68e69

      SHA256

      815b6bac4b35765d26c2ec7dccc97b2e4b56bc8616616a5f2fdca7e481244c43

      SHA512

      fb965770827299d62f4c19536b611923c57201ce3b9d6915851c6118549891146a3135aebfd4f577062fc44ae8fa07e2d71c06df7268a2ad69d8a8bf7dea6f81

    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

      Filesize

      229KB

      MD5

      9152b845d85d678602b380b7c8ccc36d

      SHA1

      5a453647332e0bbbfd13d28336fdf90eb1f68e69

      SHA256

      815b6bac4b35765d26c2ec7dccc97b2e4b56bc8616616a5f2fdca7e481244c43

      SHA512

      fb965770827299d62f4c19536b611923c57201ce3b9d6915851c6118549891146a3135aebfd4f577062fc44ae8fa07e2d71c06df7268a2ad69d8a8bf7dea6f81

    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

      Filesize

      229KB

      MD5

      9152b845d85d678602b380b7c8ccc36d

      SHA1

      5a453647332e0bbbfd13d28336fdf90eb1f68e69

      SHA256

      815b6bac4b35765d26c2ec7dccc97b2e4b56bc8616616a5f2fdca7e481244c43

      SHA512

      fb965770827299d62f4c19536b611923c57201ce3b9d6915851c6118549891146a3135aebfd4f577062fc44ae8fa07e2d71c06df7268a2ad69d8a8bf7dea6f81

    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

      Filesize

      229KB

      MD5

      9152b845d85d678602b380b7c8ccc36d

      SHA1

      5a453647332e0bbbfd13d28336fdf90eb1f68e69

      SHA256

      815b6bac4b35765d26c2ec7dccc97b2e4b56bc8616616a5f2fdca7e481244c43

      SHA512

      fb965770827299d62f4c19536b611923c57201ce3b9d6915851c6118549891146a3135aebfd4f577062fc44ae8fa07e2d71c06df7268a2ad69d8a8bf7dea6f81

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za346178.exe

      Filesize

      1005KB

      MD5

      2c33cd5fa39082cb27dfb7649f11ac31

      SHA1

      eb87a38f3bddd20fafb91fc3a6af92f577a61a69

      SHA256

      f74ef6c80c02594276d7d01da0faf501082824317e1acf7af6825401d1c5991d

      SHA512

      de50ccee4403df82a178a01f99e78d8bcb944cf0c75a819d981896ee0c0555d97c456724f713550616ed1682bf859faf4283051114de09286344ebb44b094a79

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za346178.exe

      Filesize

      1005KB

      MD5

      2c33cd5fa39082cb27dfb7649f11ac31

      SHA1

      eb87a38f3bddd20fafb91fc3a6af92f577a61a69

      SHA256

      f74ef6c80c02594276d7d01da0faf501082824317e1acf7af6825401d1c5991d

      SHA512

      de50ccee4403df82a178a01f99e78d8bcb944cf0c75a819d981896ee0c0555d97c456724f713550616ed1682bf859faf4283051114de09286344ebb44b094a79

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xmXxk31.exe

      Filesize

      415KB

      MD5

      2d979ce7f194301c36bc0206f825630e

      SHA1

      aa54d6a386fcff4cb46e23efb7e10c8d1e2c9936

      SHA256

      69ef8b0429c67cae17261d8f47e8b24b101ccb47056609aac58f28e16cbc8af9

      SHA512

      f766f5cba04a8ce3a29b01045120f8aaea55af384689886fb98095a1642448ddf4fdad7fbb605452501963bd9aaed434eafc8a858061257a40dd225140a370f9

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xmXxk31.exe

      Filesize

      415KB

      MD5

      2d979ce7f194301c36bc0206f825630e

      SHA1

      aa54d6a386fcff4cb46e23efb7e10c8d1e2c9936

      SHA256

      69ef8b0429c67cae17261d8f47e8b24b101ccb47056609aac58f28e16cbc8af9

      SHA512

      f766f5cba04a8ce3a29b01045120f8aaea55af384689886fb98095a1642448ddf4fdad7fbb605452501963bd9aaed434eafc8a858061257a40dd225140a370f9

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za947778.exe

      Filesize

      621KB

      MD5

      402c13ccb2e09269a4df63a8968867de

      SHA1

      fc32df834a4156c6ed61163f6aee6bd42278590a

      SHA256

      b03a901826a6af7443c5c67fd97599f41b267e83a24324546a7a043893ac66b4

      SHA512

      2bd781ac4a23efced4d99b8658365dfa6ad827e3861f9c00fddc05fcfd5634d88894b919ddf809457146805ce1875faa14b63df4f359aef6463049d7adccea96

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za947778.exe

      Filesize

      621KB

      MD5

      402c13ccb2e09269a4df63a8968867de

      SHA1

      fc32df834a4156c6ed61163f6aee6bd42278590a

      SHA256

      b03a901826a6af7443c5c67fd97599f41b267e83a24324546a7a043893ac66b4

      SHA512

      2bd781ac4a23efced4d99b8658365dfa6ad827e3861f9c00fddc05fcfd5634d88894b919ddf809457146805ce1875faa14b63df4f359aef6463049d7adccea96

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w26PM03.exe

      Filesize

      229KB

      MD5

      9152b845d85d678602b380b7c8ccc36d

      SHA1

      5a453647332e0bbbfd13d28336fdf90eb1f68e69

      SHA256

      815b6bac4b35765d26c2ec7dccc97b2e4b56bc8616616a5f2fdca7e481244c43

      SHA512

      fb965770827299d62f4c19536b611923c57201ce3b9d6915851c6118549891146a3135aebfd4f577062fc44ae8fa07e2d71c06df7268a2ad69d8a8bf7dea6f81

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w26PM03.exe

      Filesize

      229KB

      MD5

      9152b845d85d678602b380b7c8ccc36d

      SHA1

      5a453647332e0bbbfd13d28336fdf90eb1f68e69

      SHA256

      815b6bac4b35765d26c2ec7dccc97b2e4b56bc8616616a5f2fdca7e481244c43

      SHA512

      fb965770827299d62f4c19536b611923c57201ce3b9d6915851c6118549891146a3135aebfd4f577062fc44ae8fa07e2d71c06df7268a2ad69d8a8bf7dea6f81

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za625552.exe

      Filesize

      438KB

      MD5

      3645ab8df7bda6f6132e984626662328

      SHA1

      336d8ec4f5620acb12d8a313c763d9950e1db174

      SHA256

      7f995f68df3cbae039b8b1be25d80c058e406ce7abd881a4999c9a2c2f2dd6b4

      SHA512

      1d508d634388379aa39fe094a3dac9a7bb276801415a0e911046af65437dfceb4c13d525b5ebd0db075472299438b6cf595844ebe4266f9f31ff89e693bb5bb6

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za625552.exe

      Filesize

      438KB

      MD5

      3645ab8df7bda6f6132e984626662328

      SHA1

      336d8ec4f5620acb12d8a313c763d9950e1db174

      SHA256

      7f995f68df3cbae039b8b1be25d80c058e406ce7abd881a4999c9a2c2f2dd6b4

      SHA512

      1d508d634388379aa39fe094a3dac9a7bb276801415a0e911046af65437dfceb4c13d525b5ebd0db075472299438b6cf595844ebe4266f9f31ff89e693bb5bb6

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\51343283.exe

      Filesize

      176KB

      MD5

      c08bf79020a02645f826ef0c451e0ea9

      SHA1

      10f9563bbf352dd63f255a18f8154b7d49c6107b

      SHA256

      5debd65cfab610307c174eadeda74f1d7fa78aa1c185a94a905caec5cc5f3a57

      SHA512

      d9b9844a817355fd17ae11db1445a32a36f15b01c2ac4bfe3981dee02b5f095b701156ee3a002ecccfad52bd161e650559d98bdaeb20d94be33f449a1568cad1

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\51343283.exe

      Filesize

      176KB

      MD5

      c08bf79020a02645f826ef0c451e0ea9

      SHA1

      10f9563bbf352dd63f255a18f8154b7d49c6107b

      SHA256

      5debd65cfab610307c174eadeda74f1d7fa78aa1c185a94a905caec5cc5f3a57

      SHA512

      d9b9844a817355fd17ae11db1445a32a36f15b01c2ac4bfe3981dee02b5f095b701156ee3a002ecccfad52bd161e650559d98bdaeb20d94be33f449a1568cad1

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u97835410.exe

      Filesize

      333KB

      MD5

      f07ff4d22ee8c9cfd5240e79ac305653

      SHA1

      967e24806bd926a9275f8cd7e60c9dd35ce916dc

      SHA256

      81983332688391af7c538494089cedc6756106de5643f51a39748bb1a539be8d

      SHA512

      5564a9f28e742b13f8f21e5f9c261d1a13e0658269538d095032b2f6da6cb9d06a341ae96a55291eb2943ff113125d0d0f61d63231c2744dbae2a93c6d2adbfd

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u97835410.exe

      Filesize

      333KB

      MD5

      f07ff4d22ee8c9cfd5240e79ac305653

      SHA1

      967e24806bd926a9275f8cd7e60c9dd35ce916dc

      SHA256

      81983332688391af7c538494089cedc6756106de5643f51a39748bb1a539be8d

      SHA512

      5564a9f28e742b13f8f21e5f9c261d1a13e0658269538d095032b2f6da6cb9d06a341ae96a55291eb2943ff113125d0d0f61d63231c2744dbae2a93c6d2adbfd

    • memory/1868-215-0x00000000049D0000-0x00000000049E2000-memory.dmp

      Filesize

      72KB

    • memory/1868-229-0x0000000004B20000-0x0000000004B30000-memory.dmp

      Filesize

      64KB

    • memory/1868-235-0x0000000000400000-0x0000000000466000-memory.dmp

      Filesize

      408KB

    • memory/1868-233-0x0000000004B20000-0x0000000004B30000-memory.dmp

      Filesize

      64KB

    • memory/1868-232-0x0000000004B20000-0x0000000004B30000-memory.dmp

      Filesize

      64KB

    • memory/1868-231-0x0000000004B20000-0x0000000004B30000-memory.dmp

      Filesize

      64KB

    • memory/1868-230-0x0000000000400000-0x0000000000466000-memory.dmp

      Filesize

      408KB

    • memory/1868-228-0x0000000004B20000-0x0000000004B30000-memory.dmp

      Filesize

      64KB

    • memory/1868-227-0x0000000004B20000-0x0000000004B30000-memory.dmp

      Filesize

      64KB

    • memory/1868-226-0x0000000000520000-0x000000000054D000-memory.dmp

      Filesize

      180KB

    • memory/1868-225-0x00000000049D0000-0x00000000049E2000-memory.dmp

      Filesize

      72KB

    • memory/1868-207-0x00000000049D0000-0x00000000049E2000-memory.dmp

      Filesize

      72KB

    • memory/1868-205-0x00000000049D0000-0x00000000049E2000-memory.dmp

      Filesize

      72KB

    • memory/1868-203-0x00000000049D0000-0x00000000049E2000-memory.dmp

      Filesize

      72KB

    • memory/1868-201-0x00000000049D0000-0x00000000049E2000-memory.dmp

      Filesize

      72KB

    • memory/1868-199-0x00000000049D0000-0x00000000049E2000-memory.dmp

      Filesize

      72KB

    • memory/1868-198-0x00000000049D0000-0x00000000049E2000-memory.dmp

      Filesize

      72KB

    • memory/1868-209-0x00000000049D0000-0x00000000049E2000-memory.dmp

      Filesize

      72KB

    • memory/1868-211-0x00000000049D0000-0x00000000049E2000-memory.dmp

      Filesize

      72KB

    • memory/1868-213-0x00000000049D0000-0x00000000049E2000-memory.dmp

      Filesize

      72KB

    • memory/1868-223-0x00000000049D0000-0x00000000049E2000-memory.dmp

      Filesize

      72KB

    • memory/1868-217-0x00000000049D0000-0x00000000049E2000-memory.dmp

      Filesize

      72KB

    • memory/1868-219-0x00000000049D0000-0x00000000049E2000-memory.dmp

      Filesize

      72KB

    • memory/1868-221-0x00000000049D0000-0x00000000049E2000-memory.dmp

      Filesize

      72KB

    • memory/3660-163-0x0000000004B70000-0x0000000005114000-memory.dmp

      Filesize

      5.6MB

    • memory/3660-175-0x0000000002630000-0x0000000002643000-memory.dmp

      Filesize

      76KB

    • memory/3660-177-0x0000000002630000-0x0000000002643000-memory.dmp

      Filesize

      76KB

    • memory/3660-192-0x0000000004B60000-0x0000000004B70000-memory.dmp

      Filesize

      64KB

    • memory/3660-173-0x0000000002630000-0x0000000002643000-memory.dmp

      Filesize

      76KB

    • memory/3660-179-0x0000000002630000-0x0000000002643000-memory.dmp

      Filesize

      76KB

    • memory/3660-189-0x0000000002630000-0x0000000002643000-memory.dmp

      Filesize

      76KB

    • memory/3660-162-0x0000000004B60000-0x0000000004B70000-memory.dmp

      Filesize

      64KB

    • memory/3660-185-0x0000000002630000-0x0000000002643000-memory.dmp

      Filesize

      76KB

    • memory/3660-161-0x0000000004B60000-0x0000000004B70000-memory.dmp

      Filesize

      64KB

    • memory/3660-181-0x0000000002630000-0x0000000002643000-memory.dmp

      Filesize

      76KB

    • memory/3660-171-0x0000000002630000-0x0000000002643000-memory.dmp

      Filesize

      76KB

    • memory/3660-169-0x0000000002630000-0x0000000002643000-memory.dmp

      Filesize

      76KB

    • memory/3660-167-0x0000000002630000-0x0000000002643000-memory.dmp

      Filesize

      76KB

    • memory/3660-164-0x0000000002630000-0x0000000002643000-memory.dmp

      Filesize

      76KB

    • memory/3660-165-0x0000000002630000-0x0000000002643000-memory.dmp

      Filesize

      76KB

    • memory/3660-191-0x0000000002630000-0x0000000002643000-memory.dmp

      Filesize

      76KB

    • memory/3660-187-0x0000000002630000-0x0000000002643000-memory.dmp

      Filesize

      76KB

    • memory/3660-183-0x0000000002630000-0x0000000002643000-memory.dmp

      Filesize

      76KB

    • memory/4320-256-0x0000000002080000-0x00000000020C6000-memory.dmp

      Filesize

      280KB

    • memory/4320-257-0x0000000004C90000-0x0000000004CA0000-memory.dmp

      Filesize

      64KB

    • memory/4320-259-0x0000000004C90000-0x0000000004CA0000-memory.dmp

      Filesize

      64KB

    • memory/4320-258-0x00000000024C0000-0x00000000024F5000-memory.dmp

      Filesize

      212KB

    • memory/4320-261-0x00000000024C0000-0x00000000024F5000-memory.dmp

      Filesize

      212KB

    • memory/4320-1050-0x00000000075D0000-0x0000000007BE8000-memory.dmp

      Filesize

      6.1MB

    • memory/4320-1051-0x0000000007BF0000-0x0000000007C02000-memory.dmp

      Filesize

      72KB

    • memory/4320-1052-0x0000000007C10000-0x0000000007D1A000-memory.dmp

      Filesize

      1.0MB

    • memory/4320-1053-0x0000000007D20000-0x0000000007D5C000-memory.dmp

      Filesize

      240KB

    • memory/4320-1054-0x0000000004C90000-0x0000000004CA0000-memory.dmp

      Filesize

      64KB

    • memory/4320-1056-0x0000000004C90000-0x0000000004CA0000-memory.dmp

      Filesize

      64KB

    • memory/4320-1057-0x0000000004C90000-0x0000000004CA0000-memory.dmp

      Filesize

      64KB

    • memory/4320-1058-0x0000000004C90000-0x0000000004CA0000-memory.dmp

      Filesize

      64KB

    • memory/4320-1059-0x0000000004C90000-0x0000000004CA0000-memory.dmp

      Filesize

      64KB

    • memory/4320-255-0x00000000024C0000-0x00000000024F5000-memory.dmp

      Filesize

      212KB