Analysis

  • max time kernel
    144s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16-06-2023 08:22

General

  • Target

    3b6f17342090f44be7d1fd05b7e1f3ef2e5233dfb9d43f0cc8024974f9fdcf97.exe

  • Size

    583KB

  • MD5

    dbc82f099be9a0747d44630883c94500

  • SHA1

    748c029778c9245a30728e7dc3f61db1f1d5dc04

  • SHA256

    3b6f17342090f44be7d1fd05b7e1f3ef2e5233dfb9d43f0cc8024974f9fdcf97

  • SHA512

    232845072cf7b804f7a2abee2b64807ddac7621de95856502e922544dc64d45ae30192703b6be030f744c753a311e71da48e0fa771cd382c539caacb4c329e8f

  • SSDEEP

    12288:oMr3yy901vjuj1GZGDMNqmmHUOb9d2lyD1Wz9vG:Pyyevjuj1GQl8yD1Wzk

Malware Config

Extracted

Family

redline

Botnet

dana

C2

83.97.73.130:19061

Attributes
  • auth_value

    da2d1691db653e49676d799e1eae2673

Extracted

Family

amadey

Version

3.84

C2

77.91.68.63/doma/net/index.php

Extracted

Family

redline

Botnet

joker

C2

83.97.73.130:19061

Attributes
  • auth_value

    a98d303cc28bb3b32a23c59214ae3bc0

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b6f17342090f44be7d1fd05b7e1f3ef2e5233dfb9d43f0cc8024974f9fdcf97.exe
    "C:\Users\Admin\AppData\Local\Temp\3b6f17342090f44be7d1fd05b7e1f3ef2e5233dfb9d43f0cc8024974f9fdcf97.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4294390.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4294390.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4684
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8043632.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8043632.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4064
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8882049.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8882049.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4176
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6209844.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6209844.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2196
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1117802.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1117802.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3740
        • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
          "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4764
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:5056
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4880
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "rugen.exe" /P "Admin:N"
              6⤵
                PID:3136
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                6⤵
                  PID:3428
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "rugen.exe" /P "Admin:R" /E
                  6⤵
                    PID:4048
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:3976
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\200f691d32" /P "Admin:N"
                      6⤵
                        PID:4428
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\200f691d32" /P "Admin:R" /E
                        6⤵
                          PID:4392
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:2060
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0073534.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0073534.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4812
              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                1⤵
                • Executes dropped EXE
                PID:4412
              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                1⤵
                • Executes dropped EXE
                PID:4028

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                697c16582fe681a2ea92635170d82587

                SHA1

                12d56f5efebaad959b401c2e425e8c1dd535545d

                SHA256

                ecf91dc9390e0dfddced0241e41cb757d0e07472cca8e11fb04364ffbcbe8cc1

                SHA512

                52d14e878b7232a20d543a639be8984bfed33ab0db6df335c7644cf7c353741397ec65539d2ca622e81cbafcb6cdc67843d0486ea10a95da8c9a9659423c499b

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                697c16582fe681a2ea92635170d82587

                SHA1

                12d56f5efebaad959b401c2e425e8c1dd535545d

                SHA256

                ecf91dc9390e0dfddced0241e41cb757d0e07472cca8e11fb04364ffbcbe8cc1

                SHA512

                52d14e878b7232a20d543a639be8984bfed33ab0db6df335c7644cf7c353741397ec65539d2ca622e81cbafcb6cdc67843d0486ea10a95da8c9a9659423c499b

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                697c16582fe681a2ea92635170d82587

                SHA1

                12d56f5efebaad959b401c2e425e8c1dd535545d

                SHA256

                ecf91dc9390e0dfddced0241e41cb757d0e07472cca8e11fb04364ffbcbe8cc1

                SHA512

                52d14e878b7232a20d543a639be8984bfed33ab0db6df335c7644cf7c353741397ec65539d2ca622e81cbafcb6cdc67843d0486ea10a95da8c9a9659423c499b

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                697c16582fe681a2ea92635170d82587

                SHA1

                12d56f5efebaad959b401c2e425e8c1dd535545d

                SHA256

                ecf91dc9390e0dfddced0241e41cb757d0e07472cca8e11fb04364ffbcbe8cc1

                SHA512

                52d14e878b7232a20d543a639be8984bfed33ab0db6df335c7644cf7c353741397ec65539d2ca622e81cbafcb6cdc67843d0486ea10a95da8c9a9659423c499b

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                697c16582fe681a2ea92635170d82587

                SHA1

                12d56f5efebaad959b401c2e425e8c1dd535545d

                SHA256

                ecf91dc9390e0dfddced0241e41cb757d0e07472cca8e11fb04364ffbcbe8cc1

                SHA512

                52d14e878b7232a20d543a639be8984bfed33ab0db6df335c7644cf7c353741397ec65539d2ca622e81cbafcb6cdc67843d0486ea10a95da8c9a9659423c499b

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0073534.exe

                Filesize

                267KB

                MD5

                53d79b24fb22fec3fba3d679576a8e86

                SHA1

                2124ee88a302311a9164fa98607703067c3dffa7

                SHA256

                f0e5bab0e24c4c959dfb6e7d0de85651ec9c905246142cbdb02dba64055f0eaa

                SHA512

                91190404be958131a918af17e25ecacad56055bb7b446932af7720d4a9e2de9536f9f27ba3c7f807529638a0e9e4440b3a8478c13cd18a8cec52ebc61718cb8c

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0073534.exe

                Filesize

                267KB

                MD5

                53d79b24fb22fec3fba3d679576a8e86

                SHA1

                2124ee88a302311a9164fa98607703067c3dffa7

                SHA256

                f0e5bab0e24c4c959dfb6e7d0de85651ec9c905246142cbdb02dba64055f0eaa

                SHA512

                91190404be958131a918af17e25ecacad56055bb7b446932af7720d4a9e2de9536f9f27ba3c7f807529638a0e9e4440b3a8478c13cd18a8cec52ebc61718cb8c

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4294390.exe

                Filesize

                377KB

                MD5

                6527bf539934514c690195f6dd5e2c08

                SHA1

                e304b26da4699d5429bca4fb10db3ebc1fb4e2e5

                SHA256

                2152c60bd46658b13c12789601cd8d984d4d886d8bb0d5a489a93e983292c343

                SHA512

                7ae58382a2e77490ff88cabbad98ef5ab8406031b75dc4a41dd2d7e3b471833cc880e1f8b03b5e542e85b2f4d4d20aa2971cda484f0aaccb129035c14315c7b2

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4294390.exe

                Filesize

                377KB

                MD5

                6527bf539934514c690195f6dd5e2c08

                SHA1

                e304b26da4699d5429bca4fb10db3ebc1fb4e2e5

                SHA256

                2152c60bd46658b13c12789601cd8d984d4d886d8bb0d5a489a93e983292c343

                SHA512

                7ae58382a2e77490ff88cabbad98ef5ab8406031b75dc4a41dd2d7e3b471833cc880e1f8b03b5e542e85b2f4d4d20aa2971cda484f0aaccb129035c14315c7b2

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1117802.exe

                Filesize

                205KB

                MD5

                697c16582fe681a2ea92635170d82587

                SHA1

                12d56f5efebaad959b401c2e425e8c1dd535545d

                SHA256

                ecf91dc9390e0dfddced0241e41cb757d0e07472cca8e11fb04364ffbcbe8cc1

                SHA512

                52d14e878b7232a20d543a639be8984bfed33ab0db6df335c7644cf7c353741397ec65539d2ca622e81cbafcb6cdc67843d0486ea10a95da8c9a9659423c499b

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1117802.exe

                Filesize

                205KB

                MD5

                697c16582fe681a2ea92635170d82587

                SHA1

                12d56f5efebaad959b401c2e425e8c1dd535545d

                SHA256

                ecf91dc9390e0dfddced0241e41cb757d0e07472cca8e11fb04364ffbcbe8cc1

                SHA512

                52d14e878b7232a20d543a639be8984bfed33ab0db6df335c7644cf7c353741397ec65539d2ca622e81cbafcb6cdc67843d0486ea10a95da8c9a9659423c499b

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8043632.exe

                Filesize

                206KB

                MD5

                ed883d11e51ae72425f6a2f304bb4161

                SHA1

                c6a4de7b7ef1354818515fb4f2015b12b21bd1b0

                SHA256

                b83bef4dfc290b7a78843fc648c3a1509e13a00d1693571b5a541bc711be64d3

                SHA512

                660ea7e6af28bb75aeaf24ebb2811dbbb6ab6fc9c8d7744222c7c6006b45aaa35dc8a5e3ae42cc58324be96c7897712274a715f1fdfd76b9111caa0aac031a87

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8043632.exe

                Filesize

                206KB

                MD5

                ed883d11e51ae72425f6a2f304bb4161

                SHA1

                c6a4de7b7ef1354818515fb4f2015b12b21bd1b0

                SHA256

                b83bef4dfc290b7a78843fc648c3a1509e13a00d1693571b5a541bc711be64d3

                SHA512

                660ea7e6af28bb75aeaf24ebb2811dbbb6ab6fc9c8d7744222c7c6006b45aaa35dc8a5e3ae42cc58324be96c7897712274a715f1fdfd76b9111caa0aac031a87

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8882049.exe

                Filesize

                173KB

                MD5

                5cba7dc418e8db2a08bce79e7625dccc

                SHA1

                9b1a2296f0a6a4faebf66388d228265924bb7985

                SHA256

                7a7917673ae7f2d407cf25e2682f247a07ee5342a6931a32c1aef78c1db5b4c7

                SHA512

                54c3a9c78e3a5583b7baca8b2583508e0ab49b301f38e05b97d3ec471b6fa633f3bca0d847824bc1cd3062636598c2e6a04b7d7097e6181790699a5cb06a1434

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8882049.exe

                Filesize

                173KB

                MD5

                5cba7dc418e8db2a08bce79e7625dccc

                SHA1

                9b1a2296f0a6a4faebf66388d228265924bb7985

                SHA256

                7a7917673ae7f2d407cf25e2682f247a07ee5342a6931a32c1aef78c1db5b4c7

                SHA512

                54c3a9c78e3a5583b7baca8b2583508e0ab49b301f38e05b97d3ec471b6fa633f3bca0d847824bc1cd3062636598c2e6a04b7d7097e6181790699a5cb06a1434

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6209844.exe

                Filesize

                11KB

                MD5

                b9f89ca21fc45c0239c76c0bac696b49

                SHA1

                b12e5a9bd464c047d29238d4b0133cb30a31fec3

                SHA256

                c062738aa4da925f248d4a3556928b30862eda3d71590afb6a467741753561e2

                SHA512

                0dd8c8622f9ffbb72107e6d6a74ae9448f69706fc61940a3d956aad7679b124ea43c2dad440e78e5f82f55e9817192ab057717bcd8d2ca4ee986e97f55ec7309

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6209844.exe

                Filesize

                11KB

                MD5

                b9f89ca21fc45c0239c76c0bac696b49

                SHA1

                b12e5a9bd464c047d29238d4b0133cb30a31fec3

                SHA256

                c062738aa4da925f248d4a3556928b30862eda3d71590afb6a467741753561e2

                SHA512

                0dd8c8622f9ffbb72107e6d6a74ae9448f69706fc61940a3d956aad7679b124ea43c2dad440e78e5f82f55e9817192ab057717bcd8d2ca4ee986e97f55ec7309

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                83fc14fb36516facb19e0e96286f7f48

                SHA1

                40082ca06de4c377585cd164fb521bacadb673da

                SHA256

                08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                SHA512

                ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                83fc14fb36516facb19e0e96286f7f48

                SHA1

                40082ca06de4c377585cd164fb521bacadb673da

                SHA256

                08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                SHA512

                ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                83fc14fb36516facb19e0e96286f7f48

                SHA1

                40082ca06de4c377585cd164fb521bacadb673da

                SHA256

                08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                SHA512

                ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

              • memory/2196-162-0x00000000001C0000-0x00000000001CA000-memory.dmp

                Filesize

                40KB

              • memory/4176-146-0x00000000055A0000-0x00000000055B2000-memory.dmp

                Filesize

                72KB

              • memory/4176-149-0x0000000005750000-0x000000000579B000-memory.dmp

                Filesize

                300KB

              • memory/4176-156-0x0000000005640000-0x0000000005650000-memory.dmp

                Filesize

                64KB

              • memory/4176-155-0x0000000007280000-0x0000000007442000-memory.dmp

                Filesize

                1.8MB

              • memory/4176-154-0x0000000006980000-0x00000000069D0000-memory.dmp

                Filesize

                320KB

              • memory/4176-153-0x0000000005BF0000-0x0000000005C56000-memory.dmp

                Filesize

                408KB

              • memory/4176-152-0x0000000006D80000-0x000000000727E000-memory.dmp

                Filesize

                5.0MB

              • memory/4176-151-0x0000000005B50000-0x0000000005BE2000-memory.dmp

                Filesize

                584KB

              • memory/4176-150-0x0000000005A30000-0x0000000005AA6000-memory.dmp

                Filesize

                472KB

              • memory/4176-157-0x0000000009000000-0x000000000952C000-memory.dmp

                Filesize

                5.2MB

              • memory/4176-142-0x0000000000DA0000-0x0000000000DD0000-memory.dmp

                Filesize

                192KB

              • memory/4176-143-0x0000000005550000-0x0000000005556000-memory.dmp

                Filesize

                24KB

              • memory/4176-144-0x0000000005D60000-0x0000000006366000-memory.dmp

                Filesize

                6.0MB

              • memory/4176-145-0x0000000005860000-0x000000000596A000-memory.dmp

                Filesize

                1.0MB

              • memory/4176-148-0x0000000005640000-0x0000000005650000-memory.dmp

                Filesize

                64KB

              • memory/4176-147-0x0000000005600000-0x000000000563E000-memory.dmp

                Filesize

                248KB

              • memory/4812-183-0x00000000049C0000-0x00000000049D0000-memory.dmp

                Filesize

                64KB

              • memory/4812-182-0x0000000004940000-0x000000000498B000-memory.dmp

                Filesize

                300KB

              • memory/4812-181-0x00000000022E0000-0x00000000022E6000-memory.dmp

                Filesize

                24KB

              • memory/4812-177-0x00000000001D0000-0x0000000000200000-memory.dmp

                Filesize

                192KB