Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2023, 16:16

General

  • Target

    e84ef6395eab2d593c5c3593fb885fad597448252f975c5c64ab7d66bb2dcc1c.exe

  • Size

    704KB

  • MD5

    a1b06a4a7387d3d9a7d8f075116e7e91

  • SHA1

    87be406ef247f33209447e72db4e58187aeeeba3

  • SHA256

    e84ef6395eab2d593c5c3593fb885fad597448252f975c5c64ab7d66bb2dcc1c

  • SHA512

    d10a3508e5bc61dd6c5adcd7226477fe9c0ac309cc43ec047ab10d70a6624e1bd7aa7a543cebd75d4cceb7e5baec9d3f4d27a9c6b44cad32c635fb88cd3f8043

  • SSDEEP

    12288:0Mrgy90iYcO+QsYl+JeOkIpb5891fNmBDqHkkZU6jNMmZzS99er3:ky9YAQsC+JeO1pNq7mBDekmYizC9er3

Malware Config

Extracted

Family

amadey

Version

3.87

C2

77.91.68.18/nice/index.php

Extracted

Family

redline

Botnet

gogi

C2

77.91.124.73:19071

Attributes
  • auth_value

    c7dbabcf1eff128a595c7532cb5489a8

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e84ef6395eab2d593c5c3593fb885fad597448252f975c5c64ab7d66bb2dcc1c.exe
    "C:\Users\Admin\AppData\Local\Temp\e84ef6395eab2d593c5c3593fb885fad597448252f975c5c64ab7d66bb2dcc1c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2284
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1006247.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1006247.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:892
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9633931.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9633931.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1444
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4331824.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4331824.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1888
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6975068.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6975068.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5048
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6529542.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6529542.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4508
            • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
              "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1648
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:4952
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2368
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:3356
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "saves.exe" /P "Admin:N"
                    8⤵
                      PID:3528
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "saves.exe" /P "Admin:R" /E
                      8⤵
                        PID:1992
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\b40d11255d" /P "Admin:N"
                        8⤵
                          PID:2492
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                          8⤵
                            PID:2864
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\b40d11255d" /P "Admin:R" /E
                            8⤵
                              PID:1052
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:3160
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i8602503.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i8602503.exe
                      4⤵
                      • Executes dropped EXE
                      PID:4376
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:4960
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:5092
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:4212

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1006247.exe

                Filesize

                598KB

                MD5

                1be742f829f61e9c1e1ef562e47489c4

                SHA1

                4474ffa0aa69dec053638fa666bc0d88eb0556e9

                SHA256

                61f1efb155a094af5cc5cbf9eddf998ac8fa89154ad9c165249ec40dd28cf6b2

                SHA512

                de207726bab56e0b0b6902eb5c708f7467ff3b095cf815c4ef0195b465ba39afb8d71319a491df151c073d1c2b01a94274d99faefe8983caef18557920173bd6

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1006247.exe

                Filesize

                598KB

                MD5

                1be742f829f61e9c1e1ef562e47489c4

                SHA1

                4474ffa0aa69dec053638fa666bc0d88eb0556e9

                SHA256

                61f1efb155a094af5cc5cbf9eddf998ac8fa89154ad9c165249ec40dd28cf6b2

                SHA512

                de207726bab56e0b0b6902eb5c708f7467ff3b095cf815c4ef0195b465ba39afb8d71319a491df151c073d1c2b01a94274d99faefe8983caef18557920173bd6

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9633931.exe

                Filesize

                433KB

                MD5

                915efbde711499ade3221245bc2ad4c2

                SHA1

                13c24c093b3786ec169a0bf4b74f558fba74d443

                SHA256

                6f29cd5d654b9426656ef00d0386b799818158a1d55a23e825e1eacc5cee3234

                SHA512

                86a04b82ef91d69adfe94c783483e6662e27289285aa2710df0635e40d441450bf5399bd78c6fead82f55028d64a16f99ef0d60393a6e8111a73b91ba80328c0

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9633931.exe

                Filesize

                433KB

                MD5

                915efbde711499ade3221245bc2ad4c2

                SHA1

                13c24c093b3786ec169a0bf4b74f558fba74d443

                SHA256

                6f29cd5d654b9426656ef00d0386b799818158a1d55a23e825e1eacc5cee3234

                SHA512

                86a04b82ef91d69adfe94c783483e6662e27289285aa2710df0635e40d441450bf5399bd78c6fead82f55028d64a16f99ef0d60393a6e8111a73b91ba80328c0

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i8602503.exe

                Filesize

                173KB

                MD5

                bd614f30c50b1f457ffac2bb98f62a62

                SHA1

                490954d5108c35d8d23fd15af3797409f03e3321

                SHA256

                e70869618fd4d7ec396622c848cea9706e987edf0b16e12aa7bc1f389cd9b4da

                SHA512

                d8fdd03e1573f73e20d38199e3a98d3a01d0748a8a9c417c0e2d98932517a12100659809d0a56a0f8766e4ee40ef599facde26b4bf2224546ebb033b8547790a

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i8602503.exe

                Filesize

                173KB

                MD5

                bd614f30c50b1f457ffac2bb98f62a62

                SHA1

                490954d5108c35d8d23fd15af3797409f03e3321

                SHA256

                e70869618fd4d7ec396622c848cea9706e987edf0b16e12aa7bc1f389cd9b4da

                SHA512

                d8fdd03e1573f73e20d38199e3a98d3a01d0748a8a9c417c0e2d98932517a12100659809d0a56a0f8766e4ee40ef599facde26b4bf2224546ebb033b8547790a

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4331824.exe

                Filesize

                277KB

                MD5

                4556237689852de07596519dd0a58827

                SHA1

                b1ae811a9acd16617347e4928615b1ad2fece7f4

                SHA256

                f8262574c98acf490d361fdc8f598812a880c8c5862410d6c18461a40dbdefaf

                SHA512

                60b190200f00859803101bb74b85841b4a2deede888c077733f1bd4ba9747a80aa481033868e9f9660d0ed7d88401d438ff0146d107a81325138df3cfe229132

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4331824.exe

                Filesize

                277KB

                MD5

                4556237689852de07596519dd0a58827

                SHA1

                b1ae811a9acd16617347e4928615b1ad2fece7f4

                SHA256

                f8262574c98acf490d361fdc8f598812a880c8c5862410d6c18461a40dbdefaf

                SHA512

                60b190200f00859803101bb74b85841b4a2deede888c077733f1bd4ba9747a80aa481033868e9f9660d0ed7d88401d438ff0146d107a81325138df3cfe229132

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6975068.exe

                Filesize

                12KB

                MD5

                35225e35bb66d6d221219f630377f4d0

                SHA1

                19b768b4e0ed4c030b237061a438bcb50dfd1764

                SHA256

                6297f3181176baba78fd39d1e8707cf0dac0d5e3113e26c2c8cd3f0d97da82b9

                SHA512

                b64530db2dea20fd4bac770564543eb5a798e9f6155ad3a12f6e0d4339027a9d0c84c97414e679ef776398802bc14c77e33fc8011989bccd12235a93ad740414

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6975068.exe

                Filesize

                12KB

                MD5

                35225e35bb66d6d221219f630377f4d0

                SHA1

                19b768b4e0ed4c030b237061a438bcb50dfd1764

                SHA256

                6297f3181176baba78fd39d1e8707cf0dac0d5e3113e26c2c8cd3f0d97da82b9

                SHA512

                b64530db2dea20fd4bac770564543eb5a798e9f6155ad3a12f6e0d4339027a9d0c84c97414e679ef776398802bc14c77e33fc8011989bccd12235a93ad740414

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6529542.exe

                Filesize

                317KB

                MD5

                426644069ae8b770a6501812563db135

                SHA1

                36bd6717a107013a394bc83f6e60b270dae207d8

                SHA256

                f79f5e50bb3c8926dc8262e30029dbe3b4f837b5ae9fb1ef0e59349b274f1549

                SHA512

                9d94c5337cd9e8c711ac40d7747a28b2b05da70715bf79c13c6ae4845e9ee82049c1d3005c1a4b51fb710b85f9d14c6e82967cdd80b25d7e4ef0638324448e39

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6529542.exe

                Filesize

                317KB

                MD5

                426644069ae8b770a6501812563db135

                SHA1

                36bd6717a107013a394bc83f6e60b270dae207d8

                SHA256

                f79f5e50bb3c8926dc8262e30029dbe3b4f837b5ae9fb1ef0e59349b274f1549

                SHA512

                9d94c5337cd9e8c711ac40d7747a28b2b05da70715bf79c13c6ae4845e9ee82049c1d3005c1a4b51fb710b85f9d14c6e82967cdd80b25d7e4ef0638324448e39

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                317KB

                MD5

                426644069ae8b770a6501812563db135

                SHA1

                36bd6717a107013a394bc83f6e60b270dae207d8

                SHA256

                f79f5e50bb3c8926dc8262e30029dbe3b4f837b5ae9fb1ef0e59349b274f1549

                SHA512

                9d94c5337cd9e8c711ac40d7747a28b2b05da70715bf79c13c6ae4845e9ee82049c1d3005c1a4b51fb710b85f9d14c6e82967cdd80b25d7e4ef0638324448e39

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                317KB

                MD5

                426644069ae8b770a6501812563db135

                SHA1

                36bd6717a107013a394bc83f6e60b270dae207d8

                SHA256

                f79f5e50bb3c8926dc8262e30029dbe3b4f837b5ae9fb1ef0e59349b274f1549

                SHA512

                9d94c5337cd9e8c711ac40d7747a28b2b05da70715bf79c13c6ae4845e9ee82049c1d3005c1a4b51fb710b85f9d14c6e82967cdd80b25d7e4ef0638324448e39

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                317KB

                MD5

                426644069ae8b770a6501812563db135

                SHA1

                36bd6717a107013a394bc83f6e60b270dae207d8

                SHA256

                f79f5e50bb3c8926dc8262e30029dbe3b4f837b5ae9fb1ef0e59349b274f1549

                SHA512

                9d94c5337cd9e8c711ac40d7747a28b2b05da70715bf79c13c6ae4845e9ee82049c1d3005c1a4b51fb710b85f9d14c6e82967cdd80b25d7e4ef0638324448e39

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                317KB

                MD5

                426644069ae8b770a6501812563db135

                SHA1

                36bd6717a107013a394bc83f6e60b270dae207d8

                SHA256

                f79f5e50bb3c8926dc8262e30029dbe3b4f837b5ae9fb1ef0e59349b274f1549

                SHA512

                9d94c5337cd9e8c711ac40d7747a28b2b05da70715bf79c13c6ae4845e9ee82049c1d3005c1a4b51fb710b85f9d14c6e82967cdd80b25d7e4ef0638324448e39

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                317KB

                MD5

                426644069ae8b770a6501812563db135

                SHA1

                36bd6717a107013a394bc83f6e60b270dae207d8

                SHA256

                f79f5e50bb3c8926dc8262e30029dbe3b4f837b5ae9fb1ef0e59349b274f1549

                SHA512

                9d94c5337cd9e8c711ac40d7747a28b2b05da70715bf79c13c6ae4845e9ee82049c1d3005c1a4b51fb710b85f9d14c6e82967cdd80b25d7e4ef0638324448e39

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                317KB

                MD5

                426644069ae8b770a6501812563db135

                SHA1

                36bd6717a107013a394bc83f6e60b270dae207d8

                SHA256

                f79f5e50bb3c8926dc8262e30029dbe3b4f837b5ae9fb1ef0e59349b274f1549

                SHA512

                9d94c5337cd9e8c711ac40d7747a28b2b05da70715bf79c13c6ae4845e9ee82049c1d3005c1a4b51fb710b85f9d14c6e82967cdd80b25d7e4ef0638324448e39

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                374bfdcfcf19f4edfe949022092848d2

                SHA1

                df5ee40497e98efcfba30012452d433373d287d4

                SHA256

                224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f

                SHA512

                bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7

              • memory/4376-53-0x0000000004E40000-0x0000000004E7C000-memory.dmp

                Filesize

                240KB

              • memory/4376-52-0x0000000004CF0000-0x0000000004D00000-memory.dmp

                Filesize

                64KB

              • memory/4376-51-0x0000000004CB0000-0x0000000004CC2000-memory.dmp

                Filesize

                72KB

              • memory/4376-54-0x00000000730A0000-0x0000000073850000-memory.dmp

                Filesize

                7.7MB

              • memory/4376-55-0x0000000004CF0000-0x0000000004D00000-memory.dmp

                Filesize

                64KB

              • memory/4376-50-0x0000000004F10000-0x000000000501A000-memory.dmp

                Filesize

                1.0MB

              • memory/4376-49-0x0000000005420000-0x0000000005A38000-memory.dmp

                Filesize

                6.1MB

              • memory/4376-48-0x00000000730A0000-0x0000000073850000-memory.dmp

                Filesize

                7.7MB

              • memory/4376-47-0x00000000002F0000-0x0000000000320000-memory.dmp

                Filesize

                192KB

              • memory/5048-31-0x00007FFB34520000-0x00007FFB34FE1000-memory.dmp

                Filesize

                10.8MB

              • memory/5048-29-0x00007FFB34520000-0x00007FFB34FE1000-memory.dmp

                Filesize

                10.8MB

              • memory/5048-28-0x0000000000390000-0x000000000039A000-memory.dmp

                Filesize

                40KB