Analysis

  • max time kernel
    142s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/08/2023, 17:35

General

  • Target

    fdcd52bdf608b6ee9c6a0d699ad312865767200e1883b17fdb64a379bc2825c5.exe

  • Size

    1.4MB

  • MD5

    a8253c8eb86b87ca39d4e3e0cadfaa7f

  • SHA1

    10d5713e1a941e7e31c5d0820fb9e22070480b6a

  • SHA256

    fdcd52bdf608b6ee9c6a0d699ad312865767200e1883b17fdb64a379bc2825c5

  • SHA512

    8e255cbc3bde43632c4d0250711266bb70ac47ef78234e07dc135dfd4202cb23ce2ad45af35708cde8ea14bf02613720ca8bcda7e9d352c761720d5e2e1fbea9

  • SSDEEP

    24576:ryVxog7wX5Vs5wh7w6KyPq196GG5L0bP9UZPuJDwTl97cMkDgqrrzvT+:eVSKeOwhU6KyPqDJG5wbPDJDwTlahgqH

Malware Config

Extracted

Family

amadey

Version

3.87

C2

77.91.68.18/nice/index.php

Extracted

Family

redline

Botnet

vaga

C2

77.91.124.73:19071

Attributes
  • auth_value

    393905212ded984248e8e000e612d4fe

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fdcd52bdf608b6ee9c6a0d699ad312865767200e1883b17fdb64a379bc2825c5.exe
    "C:\Users\Admin\AppData\Local\Temp\fdcd52bdf608b6ee9c6a0d699ad312865767200e1883b17fdb64a379bc2825c5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:316
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7489489.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7489489.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5032
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0276573.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0276573.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1684
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y4654341.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y4654341.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2676
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3770545.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3770545.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4232
            • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
              "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:3388
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:4740
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:5044
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:4576
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "saves.exe" /P "Admin:N"
                    8⤵
                      PID:2188
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "saves.exe" /P "Admin:R" /E
                      8⤵
                        PID:1632
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:3380
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\b40d11255d" /P "Admin:N"
                          8⤵
                            PID:984
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\b40d11255d" /P "Admin:R" /E
                            8⤵
                              PID:732
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:1236
                      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m9214854.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m9214854.exe
                        5⤵
                        • Executes dropped EXE
                        PID:2428
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n0005847.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n0005847.exe
                      4⤵
                      • Executes dropped EXE
                      PID:2424
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:4524
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:400

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7489489.exe

                Filesize

                1.3MB

                MD5

                8e0d02549f6366dee1c882976a52b6c6

                SHA1

                1609c70e137fb1865d332c90832ce7bf8c61eecb

                SHA256

                1cfc7cf6482bf8227c906dd34a26ced61c244ba66ee65f64dd5cf05f85f78d0b

                SHA512

                54fdb4261a8cadfde8fc3ca7149e3a4bdbfbaaf67b4b26c28a77a3830d6a3d17e0b3dd6c8a7b16c1a18e7997ba67bd6d81687d2d09fc034c53ed2bd856352ba6

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7489489.exe

                Filesize

                1.3MB

                MD5

                8e0d02549f6366dee1c882976a52b6c6

                SHA1

                1609c70e137fb1865d332c90832ce7bf8c61eecb

                SHA256

                1cfc7cf6482bf8227c906dd34a26ced61c244ba66ee65f64dd5cf05f85f78d0b

                SHA512

                54fdb4261a8cadfde8fc3ca7149e3a4bdbfbaaf67b4b26c28a77a3830d6a3d17e0b3dd6c8a7b16c1a18e7997ba67bd6d81687d2d09fc034c53ed2bd856352ba6

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0276573.exe

                Filesize

                475KB

                MD5

                b6fb2de897889e778f7a2fd9adc69e08

                SHA1

                8144facc1b9f9a28d5b0a15f110f090acd19d23c

                SHA256

                41ac8abc98c2076043a116febcd1c8f645480229548b4f72567b3dd189ab1efd

                SHA512

                3e701692ad3476b37e12d5b43e1e183ebeeee67eebdc7bb8669e27518c26b05600fe57aead13315c2d3e14cbb87bf7ed5b3f11b29be1e132f2a4779d678035da

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0276573.exe

                Filesize

                475KB

                MD5

                b6fb2de897889e778f7a2fd9adc69e08

                SHA1

                8144facc1b9f9a28d5b0a15f110f090acd19d23c

                SHA256

                41ac8abc98c2076043a116febcd1c8f645480229548b4f72567b3dd189ab1efd

                SHA512

                3e701692ad3476b37e12d5b43e1e183ebeeee67eebdc7bb8669e27518c26b05600fe57aead13315c2d3e14cbb87bf7ed5b3f11b29be1e132f2a4779d678035da

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n0005847.exe

                Filesize

                174KB

                MD5

                63e681eb5020348bbc4041e9ca7d171b

                SHA1

                8132ff4962857237c5bbbe0d53fcd1bf41b3de3e

                SHA256

                fd966702d9e7b229fd3e370b89d52c9806261d95e7e816587a4eddb3574b8f28

                SHA512

                a541ca168387c6da682cc40713e75e5dc087a4ce04a000a16cdf95ae5f10267237b1359b7d1018a75634a5db2bed6e817758549b9cc136d88072d98f748e909d

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n0005847.exe

                Filesize

                174KB

                MD5

                63e681eb5020348bbc4041e9ca7d171b

                SHA1

                8132ff4962857237c5bbbe0d53fcd1bf41b3de3e

                SHA256

                fd966702d9e7b229fd3e370b89d52c9806261d95e7e816587a4eddb3574b8f28

                SHA512

                a541ca168387c6da682cc40713e75e5dc087a4ce04a000a16cdf95ae5f10267237b1359b7d1018a75634a5db2bed6e817758549b9cc136d88072d98f748e909d

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y4654341.exe

                Filesize

                319KB

                MD5

                ef48697aa97d43b71eb350c86b835499

                SHA1

                1ae0fbecdaea495b61c743792a0d965126168def

                SHA256

                0bb7e18a08f95c98b8594163a3199913b2decd01186783c2bebc85b9756f572f

                SHA512

                93b9419f339449fe6bce3d1d6bbccc1263fd600f6159b49bdf4aa0be2155aa46ccb8938d4f47ae1c19fa14639bf3cdb0072fdc21ab2e959d1b0605cf08d87185

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y4654341.exe

                Filesize

                319KB

                MD5

                ef48697aa97d43b71eb350c86b835499

                SHA1

                1ae0fbecdaea495b61c743792a0d965126168def

                SHA256

                0bb7e18a08f95c98b8594163a3199913b2decd01186783c2bebc85b9756f572f

                SHA512

                93b9419f339449fe6bce3d1d6bbccc1263fd600f6159b49bdf4aa0be2155aa46ccb8938d4f47ae1c19fa14639bf3cdb0072fdc21ab2e959d1b0605cf08d87185

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3770545.exe

                Filesize

                319KB

                MD5

                19132d6c9e8625a03b26f8533e5b235b

                SHA1

                59ba55a2731869f81bfc998a05b1f6a03aab43dc

                SHA256

                d62d4d56d50cadfd38f49cbd35c820099161cbabc29439a365065100283b4515

                SHA512

                ffba9a58687b433334284e838073085cb3623e228a7ad70e963b9fbb2299cb320c0e515c0897c3be81b26cde30218ed6876d7b2ddf0ed045e6fda84dc9a6c2fa

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3770545.exe

                Filesize

                319KB

                MD5

                19132d6c9e8625a03b26f8533e5b235b

                SHA1

                59ba55a2731869f81bfc998a05b1f6a03aab43dc

                SHA256

                d62d4d56d50cadfd38f49cbd35c820099161cbabc29439a365065100283b4515

                SHA512

                ffba9a58687b433334284e838073085cb3623e228a7ad70e963b9fbb2299cb320c0e515c0897c3be81b26cde30218ed6876d7b2ddf0ed045e6fda84dc9a6c2fa

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m9214854.exe

                Filesize

                140KB

                MD5

                e98c02c7c4f9ac7d8119da1347cec988

                SHA1

                b2df1c8f21fe65e823b7a3fb8ca6052924f16308

                SHA256

                ddc46fdfe00e57b47bb5771cf2a09df4cfd2b350b8ee969419be821ef65db875

                SHA512

                0f123bb65d38f5cc60adc7b93a8fe5be0118fa2efe65f43dcfeef6d6d08072549027b3d760ded57d11c7d60eab01ef33e213867a84fc76829e8358b15bc8f781

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m9214854.exe

                Filesize

                140KB

                MD5

                e98c02c7c4f9ac7d8119da1347cec988

                SHA1

                b2df1c8f21fe65e823b7a3fb8ca6052924f16308

                SHA256

                ddc46fdfe00e57b47bb5771cf2a09df4cfd2b350b8ee969419be821ef65db875

                SHA512

                0f123bb65d38f5cc60adc7b93a8fe5be0118fa2efe65f43dcfeef6d6d08072549027b3d760ded57d11c7d60eab01ef33e213867a84fc76829e8358b15bc8f781

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                319KB

                MD5

                19132d6c9e8625a03b26f8533e5b235b

                SHA1

                59ba55a2731869f81bfc998a05b1f6a03aab43dc

                SHA256

                d62d4d56d50cadfd38f49cbd35c820099161cbabc29439a365065100283b4515

                SHA512

                ffba9a58687b433334284e838073085cb3623e228a7ad70e963b9fbb2299cb320c0e515c0897c3be81b26cde30218ed6876d7b2ddf0ed045e6fda84dc9a6c2fa

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                319KB

                MD5

                19132d6c9e8625a03b26f8533e5b235b

                SHA1

                59ba55a2731869f81bfc998a05b1f6a03aab43dc

                SHA256

                d62d4d56d50cadfd38f49cbd35c820099161cbabc29439a365065100283b4515

                SHA512

                ffba9a58687b433334284e838073085cb3623e228a7ad70e963b9fbb2299cb320c0e515c0897c3be81b26cde30218ed6876d7b2ddf0ed045e6fda84dc9a6c2fa

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                319KB

                MD5

                19132d6c9e8625a03b26f8533e5b235b

                SHA1

                59ba55a2731869f81bfc998a05b1f6a03aab43dc

                SHA256

                d62d4d56d50cadfd38f49cbd35c820099161cbabc29439a365065100283b4515

                SHA512

                ffba9a58687b433334284e838073085cb3623e228a7ad70e963b9fbb2299cb320c0e515c0897c3be81b26cde30218ed6876d7b2ddf0ed045e6fda84dc9a6c2fa

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                319KB

                MD5

                19132d6c9e8625a03b26f8533e5b235b

                SHA1

                59ba55a2731869f81bfc998a05b1f6a03aab43dc

                SHA256

                d62d4d56d50cadfd38f49cbd35c820099161cbabc29439a365065100283b4515

                SHA512

                ffba9a58687b433334284e838073085cb3623e228a7ad70e963b9fbb2299cb320c0e515c0897c3be81b26cde30218ed6876d7b2ddf0ed045e6fda84dc9a6c2fa

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                319KB

                MD5

                19132d6c9e8625a03b26f8533e5b235b

                SHA1

                59ba55a2731869f81bfc998a05b1f6a03aab43dc

                SHA256

                d62d4d56d50cadfd38f49cbd35c820099161cbabc29439a365065100283b4515

                SHA512

                ffba9a58687b433334284e838073085cb3623e228a7ad70e963b9fbb2299cb320c0e515c0897c3be81b26cde30218ed6876d7b2ddf0ed045e6fda84dc9a6c2fa

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                374bfdcfcf19f4edfe949022092848d2

                SHA1

                df5ee40497e98efcfba30012452d433373d287d4

                SHA256

                224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f

                SHA512

                bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7

              • memory/2424-43-0x00000000002A0000-0x00000000002D0000-memory.dmp

                Filesize

                192KB

              • memory/2424-50-0x0000000073450000-0x0000000073C00000-memory.dmp

                Filesize

                7.7MB

              • memory/2424-51-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

                Filesize

                64KB

              • memory/2424-49-0x0000000004DF0000-0x0000000004E2C000-memory.dmp

                Filesize

                240KB

              • memory/2424-48-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

                Filesize

                64KB

              • memory/2424-47-0x0000000004C60000-0x0000000004C72000-memory.dmp

                Filesize

                72KB

              • memory/2424-46-0x0000000004EC0000-0x0000000004FCA000-memory.dmp

                Filesize

                1.0MB

              • memory/2424-45-0x00000000053D0000-0x00000000059E8000-memory.dmp

                Filesize

                6.1MB

              • memory/2424-44-0x0000000073450000-0x0000000073C00000-memory.dmp

                Filesize

                7.7MB