Analysis

  • max time kernel
    150s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/06/2023, 03:44

General

  • Target

    277f6a635d13a231cf547ad361e562869ee8325eb517a50339cf7fa87d17dc03.exe

  • Size

    577KB

  • MD5

    3cec9e99b470136bcf340534fa5c75af

  • SHA1

    830c9d80b34561798f9702ab492741885557f1dc

  • SHA256

    277f6a635d13a231cf547ad361e562869ee8325eb517a50339cf7fa87d17dc03

  • SHA512

    91aa551cdcc7eaf3478931f778f8731553b6ca694900cc57378dcd3b83ad0ce5f213b0c82d7b9c864d537a97e1b0d11a58420b7ec16e20cee4a1a72941d4f1b8

  • SSDEEP

    12288:EMr9y90v1wVh3JWv69dRMLXzmiMsGKC8C2iJ46J07DHlsGLadZ:Rya1CPWv65Qzn7ZZCTJOkdZ

Malware Config

Extracted

Family

redline

Botnet

dana

C2

83.97.73.130:19061

Attributes
  • auth_value

    da2d1691db653e49676d799e1eae2673

Extracted

Family

amadey

Version

3.84

C2

77.91.68.63/doma/net/index.php

Extracted

Family

redline

Botnet

joker

C2

83.97.73.130:19061

Attributes
  • auth_value

    a98d303cc28bb3b32a23c59214ae3bc0

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\277f6a635d13a231cf547ad361e562869ee8325eb517a50339cf7fa87d17dc03.exe
    "C:\Users\Admin\AppData\Local\Temp\277f6a635d13a231cf547ad361e562869ee8325eb517a50339cf7fa87d17dc03.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3444
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7268229.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7268229.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4768
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1454097.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1454097.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4288
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9180793.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9180793.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3372
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6899398.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6899398.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:228
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8360671.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8360671.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3284
        • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
          "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1224
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:2756
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3932
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:1044
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "rugen.exe" /P "Admin:N"
                6⤵
                  PID:4724
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "rugen.exe" /P "Admin:R" /E
                  6⤵
                    PID:4472
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:4812
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\200f691d32" /P "Admin:N"
                      6⤵
                        PID:3824
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\200f691d32" /P "Admin:R" /E
                        6⤵
                          PID:1092
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:4132
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5492821.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5492821.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:376
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k netsvcs -p
                1⤵
                • Drops file in System32 directory
                • Checks processor information in registry
                • Enumerates system info in registry
                PID:2668
              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                1⤵
                • Executes dropped EXE
                PID:3740
              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                1⤵
                • Executes dropped EXE
                PID:3976

              Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                      Filesize

                      205KB

                      MD5

                      ff4a408c7d5409249a4c907398c554c4

                      SHA1

                      b4b42a58918b96745458e1ada5b3596fdf8d15f6

                      SHA256

                      5894a2b83176eb0f76d6ceee518aa6833b34ad1a238ab1674abaface1f0686f2

                      SHA512

                      9dc58b5abd386b2d0fc1b23dbb579482d14cc99a62490bf8ec0716154684e8a95c168e1b1ba185cd100bf906ef20607a9fa1b2f709e94f615d080a71e2d33d48

                    • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                      Filesize

                      205KB

                      MD5

                      ff4a408c7d5409249a4c907398c554c4

                      SHA1

                      b4b42a58918b96745458e1ada5b3596fdf8d15f6

                      SHA256

                      5894a2b83176eb0f76d6ceee518aa6833b34ad1a238ab1674abaface1f0686f2

                      SHA512

                      9dc58b5abd386b2d0fc1b23dbb579482d14cc99a62490bf8ec0716154684e8a95c168e1b1ba185cd100bf906ef20607a9fa1b2f709e94f615d080a71e2d33d48

                    • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                      Filesize

                      205KB

                      MD5

                      ff4a408c7d5409249a4c907398c554c4

                      SHA1

                      b4b42a58918b96745458e1ada5b3596fdf8d15f6

                      SHA256

                      5894a2b83176eb0f76d6ceee518aa6833b34ad1a238ab1674abaface1f0686f2

                      SHA512

                      9dc58b5abd386b2d0fc1b23dbb579482d14cc99a62490bf8ec0716154684e8a95c168e1b1ba185cd100bf906ef20607a9fa1b2f709e94f615d080a71e2d33d48

                    • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                      Filesize

                      205KB

                      MD5

                      ff4a408c7d5409249a4c907398c554c4

                      SHA1

                      b4b42a58918b96745458e1ada5b3596fdf8d15f6

                      SHA256

                      5894a2b83176eb0f76d6ceee518aa6833b34ad1a238ab1674abaface1f0686f2

                      SHA512

                      9dc58b5abd386b2d0fc1b23dbb579482d14cc99a62490bf8ec0716154684e8a95c168e1b1ba185cd100bf906ef20607a9fa1b2f709e94f615d080a71e2d33d48

                    • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                      Filesize

                      205KB

                      MD5

                      ff4a408c7d5409249a4c907398c554c4

                      SHA1

                      b4b42a58918b96745458e1ada5b3596fdf8d15f6

                      SHA256

                      5894a2b83176eb0f76d6ceee518aa6833b34ad1a238ab1674abaface1f0686f2

                      SHA512

                      9dc58b5abd386b2d0fc1b23dbb579482d14cc99a62490bf8ec0716154684e8a95c168e1b1ba185cd100bf906ef20607a9fa1b2f709e94f615d080a71e2d33d48

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5492821.exe

                      Filesize

                      256KB

                      MD5

                      f9217c39bf017d6555485c4b91c3fcd4

                      SHA1

                      373fa9b64fa998b1910f09854754fd34cfd6377f

                      SHA256

                      4a65282558872b21092bb5b884fa5470a70686f0af24971c4e0402c8717671a3

                      SHA512

                      cd44b243191a7a106c997f4448cda7647ee7be46a6551826c596894faf978a0a1d762e7bb3fb2177376f1755a7d993ff9651497aa352f9f3b86205bed35c5a0c

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5492821.exe

                      Filesize

                      256KB

                      MD5

                      f9217c39bf017d6555485c4b91c3fcd4

                      SHA1

                      373fa9b64fa998b1910f09854754fd34cfd6377f

                      SHA256

                      4a65282558872b21092bb5b884fa5470a70686f0af24971c4e0402c8717671a3

                      SHA512

                      cd44b243191a7a106c997f4448cda7647ee7be46a6551826c596894faf978a0a1d762e7bb3fb2177376f1755a7d993ff9651497aa352f9f3b86205bed35c5a0c

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7268229.exe

                      Filesize

                      377KB

                      MD5

                      76bbf040eb5484fc80ea562226fa4f6d

                      SHA1

                      c1559d91d5e58b3cad6002cbffd02656b91a181a

                      SHA256

                      df737d9db235ec3ca323515c75896446c07a6607a72ba65f4727ff6445d77a8f

                      SHA512

                      e52a18d7039936de28643faf518eb9b1b2ddbefa3d6099a7efb3934d83bce669ef15c1c3df000c7e5b9ebdfd12c3e35dac3ff7a0cb0c950e92158b164bbdf4f2

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7268229.exe

                      Filesize

                      377KB

                      MD5

                      76bbf040eb5484fc80ea562226fa4f6d

                      SHA1

                      c1559d91d5e58b3cad6002cbffd02656b91a181a

                      SHA256

                      df737d9db235ec3ca323515c75896446c07a6607a72ba65f4727ff6445d77a8f

                      SHA512

                      e52a18d7039936de28643faf518eb9b1b2ddbefa3d6099a7efb3934d83bce669ef15c1c3df000c7e5b9ebdfd12c3e35dac3ff7a0cb0c950e92158b164bbdf4f2

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8360671.exe

                      Filesize

                      205KB

                      MD5

                      ff4a408c7d5409249a4c907398c554c4

                      SHA1

                      b4b42a58918b96745458e1ada5b3596fdf8d15f6

                      SHA256

                      5894a2b83176eb0f76d6ceee518aa6833b34ad1a238ab1674abaface1f0686f2

                      SHA512

                      9dc58b5abd386b2d0fc1b23dbb579482d14cc99a62490bf8ec0716154684e8a95c168e1b1ba185cd100bf906ef20607a9fa1b2f709e94f615d080a71e2d33d48

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8360671.exe

                      Filesize

                      205KB

                      MD5

                      ff4a408c7d5409249a4c907398c554c4

                      SHA1

                      b4b42a58918b96745458e1ada5b3596fdf8d15f6

                      SHA256

                      5894a2b83176eb0f76d6ceee518aa6833b34ad1a238ab1674abaface1f0686f2

                      SHA512

                      9dc58b5abd386b2d0fc1b23dbb579482d14cc99a62490bf8ec0716154684e8a95c168e1b1ba185cd100bf906ef20607a9fa1b2f709e94f615d080a71e2d33d48

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1454097.exe

                      Filesize

                      206KB

                      MD5

                      43e9e8e5d921565d04eb4277e8b3bf98

                      SHA1

                      64b409362ccfda793da06a2e92f429e0ce65e346

                      SHA256

                      3789b95a2f4899c45a2f921a748cec9f89b38c8fc100d3d9f033e5eabc114ea7

                      SHA512

                      1ddb3d245775b456f3ad9e8b66fc035ff59da36cd29c217a8ba6589a2dbf3d4eb7358e6d699e627d1c96f3b0af9207ce30f441921662c3ccc31144623badb583

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1454097.exe

                      Filesize

                      206KB

                      MD5

                      43e9e8e5d921565d04eb4277e8b3bf98

                      SHA1

                      64b409362ccfda793da06a2e92f429e0ce65e346

                      SHA256

                      3789b95a2f4899c45a2f921a748cec9f89b38c8fc100d3d9f033e5eabc114ea7

                      SHA512

                      1ddb3d245775b456f3ad9e8b66fc035ff59da36cd29c217a8ba6589a2dbf3d4eb7358e6d699e627d1c96f3b0af9207ce30f441921662c3ccc31144623badb583

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9180793.exe

                      Filesize

                      173KB

                      MD5

                      ff08673b00ca6e31f9bec6899d5e1ecc

                      SHA1

                      d3e3c674859b693d87d2a919791d7de533cc540a

                      SHA256

                      29a37f24ffa31a0a9377ace95ebfca3e1470a4f1d9f0e5daa20ffede50e1126d

                      SHA512

                      7639f5f9568ba7386fe34f53a506c61151857cc07958db7c228de4ce0c5a9ec6d3e6d416c1d38253e587e031697b1653f39d17c27ddb3b7006c697d227027140

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9180793.exe

                      Filesize

                      173KB

                      MD5

                      ff08673b00ca6e31f9bec6899d5e1ecc

                      SHA1

                      d3e3c674859b693d87d2a919791d7de533cc540a

                      SHA256

                      29a37f24ffa31a0a9377ace95ebfca3e1470a4f1d9f0e5daa20ffede50e1126d

                      SHA512

                      7639f5f9568ba7386fe34f53a506c61151857cc07958db7c228de4ce0c5a9ec6d3e6d416c1d38253e587e031697b1653f39d17c27ddb3b7006c697d227027140

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6899398.exe

                      Filesize

                      11KB

                      MD5

                      8af5a0b45c9f8bb2e7f0fab976697103

                      SHA1

                      5a48f42c586c5ac8b42afe8114de9ae3481f864f

                      SHA256

                      8169823840c271c76b5e69b3634f9f9dee6017589f32fbdb37f43a34b145cff9

                      SHA512

                      33a0ebe0727a276d94c176885f9c04c0026b1bad5dbee68ad11fff97455c2ba50381081f2df7bcb3d74576374d9e5c3872708ed4890aa716dde4a6e6e0b74847

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6899398.exe

                      Filesize

                      11KB

                      MD5

                      8af5a0b45c9f8bb2e7f0fab976697103

                      SHA1

                      5a48f42c586c5ac8b42afe8114de9ae3481f864f

                      SHA256

                      8169823840c271c76b5e69b3634f9f9dee6017589f32fbdb37f43a34b145cff9

                      SHA512

                      33a0ebe0727a276d94c176885f9c04c0026b1bad5dbee68ad11fff97455c2ba50381081f2df7bcb3d74576374d9e5c3872708ed4890aa716dde4a6e6e0b74847

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      83fc14fb36516facb19e0e96286f7f48

                      SHA1

                      40082ca06de4c377585cd164fb521bacadb673da

                      SHA256

                      08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                      SHA512

                      ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      83fc14fb36516facb19e0e96286f7f48

                      SHA1

                      40082ca06de4c377585cd164fb521bacadb673da

                      SHA256

                      08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                      SHA512

                      ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      83fc14fb36516facb19e0e96286f7f48

                      SHA1

                      40082ca06de4c377585cd164fb521bacadb673da

                      SHA256

                      08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                      SHA512

                      ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                      Filesize

                      162B

                      MD5

                      1b7c22a214949975556626d7217e9a39

                      SHA1

                      d01c97e2944166ed23e47e4a62ff471ab8fa031f

                      SHA256

                      340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                      SHA512

                      ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                    • memory/228-180-0x0000000000830000-0x000000000083A000-memory.dmp

                      Filesize

                      40KB

                    • memory/376-202-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

                      Filesize

                      64KB

                    • memory/376-198-0x0000000000440000-0x0000000000470000-memory.dmp

                      Filesize

                      192KB

                    • memory/3372-157-0x000000000A0E0000-0x000000000A0F2000-memory.dmp

                      Filesize

                      72KB

                    • memory/3372-175-0x000000000C1A0000-0x000000000C6CC000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/3372-172-0x000000000BAA0000-0x000000000BC62000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/3372-167-0x0000000004B00000-0x0000000004B10000-memory.dmp

                      Filesize

                      64KB

                    • memory/3372-166-0x000000000B880000-0x000000000B8D0000-memory.dmp

                      Filesize

                      320KB

                    • memory/3372-165-0x000000000A610000-0x000000000A676000-memory.dmp

                      Filesize

                      408KB

                    • memory/3372-164-0x000000000B280000-0x000000000B824000-memory.dmp

                      Filesize

                      5.6MB

                    • memory/3372-163-0x000000000A570000-0x000000000A602000-memory.dmp

                      Filesize

                      584KB

                    • memory/3372-162-0x000000000A450000-0x000000000A4C6000-memory.dmp

                      Filesize

                      472KB

                    • memory/3372-159-0x000000000A140000-0x000000000A17C000-memory.dmp

                      Filesize

                      240KB

                    • memory/3372-158-0x0000000004B00000-0x0000000004B10000-memory.dmp

                      Filesize

                      64KB

                    • memory/3372-156-0x000000000A1A0000-0x000000000A2AA000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/3372-155-0x000000000A6B0000-0x000000000ACC8000-memory.dmp

                      Filesize

                      6.1MB

                    • memory/3372-154-0x0000000000220000-0x0000000000250000-memory.dmp

                      Filesize

                      192KB