Analysis

  • max time kernel
    138s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/08/2023, 10:59

General

  • Target

    3ee059dc4251d4ef5f6baa7a6f764e988187c82bd66d4101685f1f1aed2bb6a6.exe

  • Size

    517KB

  • MD5

    9bb68dc0aebdf0d8a2a4119e6ff4feec

  • SHA1

    d0c551ff0215ea4a71557a8abe8d785e498fd8d8

  • SHA256

    3ee059dc4251d4ef5f6baa7a6f764e988187c82bd66d4101685f1f1aed2bb6a6

  • SHA512

    2128c3cd93fe0ae8a4c6f4ecb8b5c1c62ee195ad7f679f4e65eaa2793f765713235779a622abdf67c1aec842ca544dbc423c036617b0397d2c77911c49e022ef

  • SSDEEP

    12288:vMrjy90+wSvdw+ZA/GcBuySYDOO1jdh0c+Q:wyX2LBGAX1BC2

Malware Config

Extracted

Family

amadey

Version

3.86

C2

5.42.92.67/norm/index.php

Extracted

Family

redline

Botnet

maxik

C2

77.91.124.156:19071

Attributes
  • auth_value

    a7714e1bc167c67e3fc8f9e368352269

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 8 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ee059dc4251d4ef5f6baa7a6f764e988187c82bd66d4101685f1f1aed2bb6a6.exe
    "C:\Users\Admin\AppData\Local\Temp\3ee059dc4251d4ef5f6baa7a6f764e988187c82bd66d4101685f1f1aed2bb6a6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1156
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9044854.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9044854.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2184
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2092668.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2092668.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4992
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1330071.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1330071.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3040
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r1524681.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r1524681.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2588
          • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe
            "C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4796
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legola.exe /TR "C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:824
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legola.exe" /P "Admin:N"&&CACLS "legola.exe" /P "Admin:R" /E&&echo Y|CACLS "..\ebb444342c" /P "Admin:N"&&CACLS "..\ebb444342c" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1100
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:3080
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "legola.exe" /P "Admin:N"
                  7⤵
                    PID:4872
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "legola.exe" /P "Admin:R" /E
                    7⤵
                      PID:2700
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:4768
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\ebb444342c" /P "Admin:N"
                        7⤵
                          PID:4288
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\ebb444342c" /P "Admin:R" /E
                          7⤵
                            PID:3032
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s8731778.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s8731778.exe
                    3⤵
                    • Executes dropped EXE
                    PID:724
              • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe
                C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe
                1⤵
                • Executes dropped EXE
                PID:1492
              • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe
                C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe
                1⤵
                • Executes dropped EXE
                PID:2472

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9044854.exe

                Filesize

                390KB

                MD5

                27944c3056c8b872bf41916a4c122219

                SHA1

                ec7c8efcef24ed29ed6a2268fec5629279e3dd5a

                SHA256

                176095d093831f19a7e2d140527f0ddce926968a28011c4010dbbb7baeb45cbc

                SHA512

                d42eb45670a3910aaecd78339054047ce186738ef54d51556bd6071412d60a2e395f47304ed57da6869d37c7ca058716beb458f108b7ac63e1537ef58d774f6d

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9044854.exe

                Filesize

                390KB

                MD5

                27944c3056c8b872bf41916a4c122219

                SHA1

                ec7c8efcef24ed29ed6a2268fec5629279e3dd5a

                SHA256

                176095d093831f19a7e2d140527f0ddce926968a28011c4010dbbb7baeb45cbc

                SHA512

                d42eb45670a3910aaecd78339054047ce186738ef54d51556bd6071412d60a2e395f47304ed57da6869d37c7ca058716beb458f108b7ac63e1537ef58d774f6d

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s8731778.exe

                Filesize

                175KB

                MD5

                f3f007afa96ed445ae5ecbd3d15b8c68

                SHA1

                b90fc95c39744224515bdf3c8af0c2a11d9b98f8

                SHA256

                3f30433075dcc4caac745a56a853e576bd9817a520bb45fdcb636efe3ca505f8

                SHA512

                a8cabb8f383267906000b90e5bd77f8b44770b12e75bdca4781fcf9df5e90225d7cff9970af8d8e7571dbf15a3bd62e3a3021f5e6c8ab91f311f6697615c4934

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s8731778.exe

                Filesize

                175KB

                MD5

                f3f007afa96ed445ae5ecbd3d15b8c68

                SHA1

                b90fc95c39744224515bdf3c8af0c2a11d9b98f8

                SHA256

                3f30433075dcc4caac745a56a853e576bd9817a520bb45fdcb636efe3ca505f8

                SHA512

                a8cabb8f383267906000b90e5bd77f8b44770b12e75bdca4781fcf9df5e90225d7cff9970af8d8e7571dbf15a3bd62e3a3021f5e6c8ab91f311f6697615c4934

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2092668.exe

                Filesize

                234KB

                MD5

                3daa3d17b19e4a7bc1c7fbe21960ba32

                SHA1

                ceddd23b6b7c6fdf0f88b982924d6fba5457eb02

                SHA256

                3c85655bc7bdb5f7a71b62e37bd887031033fbae926b6b3919f12829a892f050

                SHA512

                828fbf589f64cff42572ea5266cd594b58b3e72ae74712d54fd51e74316a960bcf7aa7613963a6e30fd8b6ee74b3a44c088098ff9f6bdacafbf69dc0445ca197

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2092668.exe

                Filesize

                234KB

                MD5

                3daa3d17b19e4a7bc1c7fbe21960ba32

                SHA1

                ceddd23b6b7c6fdf0f88b982924d6fba5457eb02

                SHA256

                3c85655bc7bdb5f7a71b62e37bd887031033fbae926b6b3919f12829a892f050

                SHA512

                828fbf589f64cff42572ea5266cd594b58b3e72ae74712d54fd51e74316a960bcf7aa7613963a6e30fd8b6ee74b3a44c088098ff9f6bdacafbf69dc0445ca197

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1330071.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1330071.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r1524681.exe

                Filesize

                227KB

                MD5

                8756e341bdd883a6cbc413e566eb842b

                SHA1

                6cc66e41954ac094cca2c71ac9c318e93f954742

                SHA256

                b677174904b780d85978db2d0bc8370b4732a41aa3e6a97140a97e254830bbb8

                SHA512

                60371dec64a4e965719455dbd8e2e58ec8c434c0d51ed6aa2250620c75b47004268e40ec02a6acd72dbcc23d288307de70bf3cc0767acd63e08f76930291dd84

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r1524681.exe

                Filesize

                227KB

                MD5

                8756e341bdd883a6cbc413e566eb842b

                SHA1

                6cc66e41954ac094cca2c71ac9c318e93f954742

                SHA256

                b677174904b780d85978db2d0bc8370b4732a41aa3e6a97140a97e254830bbb8

                SHA512

                60371dec64a4e965719455dbd8e2e58ec8c434c0d51ed6aa2250620c75b47004268e40ec02a6acd72dbcc23d288307de70bf3cc0767acd63e08f76930291dd84

              • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe

                Filesize

                227KB

                MD5

                8756e341bdd883a6cbc413e566eb842b

                SHA1

                6cc66e41954ac094cca2c71ac9c318e93f954742

                SHA256

                b677174904b780d85978db2d0bc8370b4732a41aa3e6a97140a97e254830bbb8

                SHA512

                60371dec64a4e965719455dbd8e2e58ec8c434c0d51ed6aa2250620c75b47004268e40ec02a6acd72dbcc23d288307de70bf3cc0767acd63e08f76930291dd84

              • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe

                Filesize

                227KB

                MD5

                8756e341bdd883a6cbc413e566eb842b

                SHA1

                6cc66e41954ac094cca2c71ac9c318e93f954742

                SHA256

                b677174904b780d85978db2d0bc8370b4732a41aa3e6a97140a97e254830bbb8

                SHA512

                60371dec64a4e965719455dbd8e2e58ec8c434c0d51ed6aa2250620c75b47004268e40ec02a6acd72dbcc23d288307de70bf3cc0767acd63e08f76930291dd84

              • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe

                Filesize

                227KB

                MD5

                8756e341bdd883a6cbc413e566eb842b

                SHA1

                6cc66e41954ac094cca2c71ac9c318e93f954742

                SHA256

                b677174904b780d85978db2d0bc8370b4732a41aa3e6a97140a97e254830bbb8

                SHA512

                60371dec64a4e965719455dbd8e2e58ec8c434c0d51ed6aa2250620c75b47004268e40ec02a6acd72dbcc23d288307de70bf3cc0767acd63e08f76930291dd84

              • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe

                Filesize

                227KB

                MD5

                8756e341bdd883a6cbc413e566eb842b

                SHA1

                6cc66e41954ac094cca2c71ac9c318e93f954742

                SHA256

                b677174904b780d85978db2d0bc8370b4732a41aa3e6a97140a97e254830bbb8

                SHA512

                60371dec64a4e965719455dbd8e2e58ec8c434c0d51ed6aa2250620c75b47004268e40ec02a6acd72dbcc23d288307de70bf3cc0767acd63e08f76930291dd84

              • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe

                Filesize

                227KB

                MD5

                8756e341bdd883a6cbc413e566eb842b

                SHA1

                6cc66e41954ac094cca2c71ac9c318e93f954742

                SHA256

                b677174904b780d85978db2d0bc8370b4732a41aa3e6a97140a97e254830bbb8

                SHA512

                60371dec64a4e965719455dbd8e2e58ec8c434c0d51ed6aa2250620c75b47004268e40ec02a6acd72dbcc23d288307de70bf3cc0767acd63e08f76930291dd84

              • memory/724-176-0x00000000055F0000-0x0000000005C08000-memory.dmp

                Filesize

                6.1MB

              • memory/724-174-0x0000000072EE0000-0x0000000073690000-memory.dmp

                Filesize

                7.7MB

              • memory/724-175-0x0000000000640000-0x0000000000670000-memory.dmp

                Filesize

                192KB

              • memory/724-177-0x00000000050E0000-0x00000000051EA000-memory.dmp

                Filesize

                1.0MB

              • memory/724-178-0x0000000004FC0000-0x0000000004FD0000-memory.dmp

                Filesize

                64KB

              • memory/724-179-0x0000000004FD0000-0x0000000004FE2000-memory.dmp

                Filesize

                72KB

              • memory/724-180-0x0000000005030000-0x000000000506C000-memory.dmp

                Filesize

                240KB

              • memory/724-181-0x0000000072EE0000-0x0000000073690000-memory.dmp

                Filesize

                7.7MB

              • memory/724-182-0x0000000004FC0000-0x0000000004FD0000-memory.dmp

                Filesize

                64KB

              • memory/3040-157-0x00007FF8F50D0000-0x00007FF8F5B91000-memory.dmp

                Filesize

                10.8MB

              • memory/3040-155-0x00007FF8F50D0000-0x00007FF8F5B91000-memory.dmp

                Filesize

                10.8MB

              • memory/3040-154-0x0000000000730000-0x000000000073A000-memory.dmp

                Filesize

                40KB