Analysis

  • max time kernel
    146s
  • max time network
    154s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26/08/2023, 20:16

General

  • Target

    0102b97ccd8e059258f969c908b2b5ad8bc6eb274a03f38599b2e0d72444174f.exe

  • Size

    705KB

  • MD5

    32505df5c436762d8419cc99b5dc87c3

  • SHA1

    dcbb5a5e1a7257197e6f6dc16cc27fcb1d2a5387

  • SHA256

    0102b97ccd8e059258f969c908b2b5ad8bc6eb274a03f38599b2e0d72444174f

  • SHA512

    829cad0ea95caee5aabcfa87f2d245cbe84afa0cdbe4ef5843ace91f1a1ee0d42da0364a6d2a10c2300a01d081157491804a42fd07e6d9b4e5b6be7c9da64bf7

  • SSDEEP

    12288:5Mr7y907six8LjD+no+YujT08D9cm48YBl9SiQDQHk+D+PKbAT9BKg:OyJiijMdYf8Km5Wl9WMBaPKb7g

Malware Config

Extracted

Family

amadey

Version

3.87

C2

77.91.68.18/nice/index.php

Extracted

Family

redline

Botnet

jaja

C2

77.91.124.73:19071

Attributes
  • auth_value

    3670179d176ca399ed08e7914610b43c

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0102b97ccd8e059258f969c908b2b5ad8bc6eb274a03f38599b2e0d72444174f.exe
    "C:\Users\Admin\AppData\Local\Temp\0102b97ccd8e059258f969c908b2b5ad8bc6eb274a03f38599b2e0d72444174f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4112
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7362345.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7362345.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1380
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1393033.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1393033.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:5024
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6291656.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6291656.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1008
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8617631.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8617631.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5056
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h2331448.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h2331448.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3720
            • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
              "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2088
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:1216
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:4508
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:2392
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "saves.exe" /P "Admin:N"
                    8⤵
                      PID:2040
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "saves.exe" /P "Admin:R" /E
                      8⤵
                        PID:2264
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:2072
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\b40d11255d" /P "Admin:N"
                          8⤵
                            PID:3788
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\b40d11255d" /P "Admin:R" /E
                            8⤵
                              PID:1004
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:5112
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i2660627.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i2660627.exe
                      4⤵
                      • Executes dropped EXE
                      PID:5108
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:700
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:4060

              Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7362345.exe

                      Filesize

                      599KB

                      MD5

                      ea7cb3eb9dbd6d2f1992359ed08bd397

                      SHA1

                      2d533e2e0a8bdd6cd821124261edc982176d5904

                      SHA256

                      6739bb3f9e97b9bc98d9ab12d6b993ec84ecbfb16a48f2200e9365a17e5ba0fc

                      SHA512

                      6650852ee8698426162c0760f785d385a85f845ddecf4f51624008bc0e54f200e3760cc2cba5b2b8d5b1adc84c89bacf9a337620122a27427376adbf2973776a

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7362345.exe

                      Filesize

                      599KB

                      MD5

                      ea7cb3eb9dbd6d2f1992359ed08bd397

                      SHA1

                      2d533e2e0a8bdd6cd821124261edc982176d5904

                      SHA256

                      6739bb3f9e97b9bc98d9ab12d6b993ec84ecbfb16a48f2200e9365a17e5ba0fc

                      SHA512

                      6650852ee8698426162c0760f785d385a85f845ddecf4f51624008bc0e54f200e3760cc2cba5b2b8d5b1adc84c89bacf9a337620122a27427376adbf2973776a

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1393033.exe

                      Filesize

                      432KB

                      MD5

                      99f13ebc021d0c06d64f3446358c89d4

                      SHA1

                      12aab6b0a53efd09dde6d216fcb7897e861c1257

                      SHA256

                      5b119f0dcff9d578cc18e6b450f6fedda68c4a715543e883e408d9572047eeb0

                      SHA512

                      3f4843b67e8a4a0e35267fad1da498a94d7096b4b7792003b2bafd5afe90a23b17b4ea39c0a5fd289935583ed21b9f419513f3c33f44b3d783496b5e90480fa3

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1393033.exe

                      Filesize

                      432KB

                      MD5

                      99f13ebc021d0c06d64f3446358c89d4

                      SHA1

                      12aab6b0a53efd09dde6d216fcb7897e861c1257

                      SHA256

                      5b119f0dcff9d578cc18e6b450f6fedda68c4a715543e883e408d9572047eeb0

                      SHA512

                      3f4843b67e8a4a0e35267fad1da498a94d7096b4b7792003b2bafd5afe90a23b17b4ea39c0a5fd289935583ed21b9f419513f3c33f44b3d783496b5e90480fa3

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i2660627.exe

                      Filesize

                      175KB

                      MD5

                      2bdd13712cf68663506028caef4bf1a8

                      SHA1

                      00700ee766d53277466eaa60e3ea71225291ec67

                      SHA256

                      a78dedd3625131e5c40b0cde5f80b25fe1db256d063e53def5a8dcaa6f3349d7

                      SHA512

                      ebe9b9a4992f3f86fc65bb210991ec48b9d979c44a276a6656b164c1831e256acb329e70a1fbddc146b37019311d7789d5a540b1ce4520452a98069955cf119c

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i2660627.exe

                      Filesize

                      175KB

                      MD5

                      2bdd13712cf68663506028caef4bf1a8

                      SHA1

                      00700ee766d53277466eaa60e3ea71225291ec67

                      SHA256

                      a78dedd3625131e5c40b0cde5f80b25fe1db256d063e53def5a8dcaa6f3349d7

                      SHA512

                      ebe9b9a4992f3f86fc65bb210991ec48b9d979c44a276a6656b164c1831e256acb329e70a1fbddc146b37019311d7789d5a540b1ce4520452a98069955cf119c

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6291656.exe

                      Filesize

                      277KB

                      MD5

                      8d99ab64ff1901748662f9faed3afa61

                      SHA1

                      0f3727e7d647c6b0939a01750ac9f9e9ccf56cf1

                      SHA256

                      22dc86559bcce4e2644219696afc7906ec22e91ad6387b27c63bcb0f727d29d4

                      SHA512

                      52e1ef33f40a5a613175eaff2098d939eb49f5d9fdc1fd24d5c62d37a0d97ba58db255e7ede909b7786bd51f9d15c00f30afa98ed73d35f1f8f50e0fba3733ba

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6291656.exe

                      Filesize

                      277KB

                      MD5

                      8d99ab64ff1901748662f9faed3afa61

                      SHA1

                      0f3727e7d647c6b0939a01750ac9f9e9ccf56cf1

                      SHA256

                      22dc86559bcce4e2644219696afc7906ec22e91ad6387b27c63bcb0f727d29d4

                      SHA512

                      52e1ef33f40a5a613175eaff2098d939eb49f5d9fdc1fd24d5c62d37a0d97ba58db255e7ede909b7786bd51f9d15c00f30afa98ed73d35f1f8f50e0fba3733ba

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8617631.exe

                      Filesize

                      15KB

                      MD5

                      48c70eb127d5cde6865f001cc34b8247

                      SHA1

                      af63ef45c6e4b898fbc6b1f204d3941190cb8373

                      SHA256

                      98b503317cc836056dc5407979f619eb02803c663aaf9adfd87ae99122de189f

                      SHA512

                      0dc685bc492b97f6c5ed6c2fa5d68700aa9f2751055d5728b3bdb97fa4369433f8a541775bc4996a8fa066667dd470228c7314ac227598de5c769355e0ad1f3e

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8617631.exe

                      Filesize

                      15KB

                      MD5

                      48c70eb127d5cde6865f001cc34b8247

                      SHA1

                      af63ef45c6e4b898fbc6b1f204d3941190cb8373

                      SHA256

                      98b503317cc836056dc5407979f619eb02803c663aaf9adfd87ae99122de189f

                      SHA512

                      0dc685bc492b97f6c5ed6c2fa5d68700aa9f2751055d5728b3bdb97fa4369433f8a541775bc4996a8fa066667dd470228c7314ac227598de5c769355e0ad1f3e

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h2331448.exe

                      Filesize

                      321KB

                      MD5

                      3e90dacc5a8ee406ba5ae03b302c56b5

                      SHA1

                      dd206353eb25312430f5d8965aa4a51e13cdd9ca

                      SHA256

                      8a33bc9f9f9424609a7c3f9b551bc1a8dafbf606a66a9ab11616ddafbb1b00e3

                      SHA512

                      71e0e1a3986a15302da806126337e7918f51ab2da353cfa6b41b3ff9bf7351d8bc892dcc512904358d5587eb2d9e546d85157f31028911f04ac44f7db7c9032a

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h2331448.exe

                      Filesize

                      321KB

                      MD5

                      3e90dacc5a8ee406ba5ae03b302c56b5

                      SHA1

                      dd206353eb25312430f5d8965aa4a51e13cdd9ca

                      SHA256

                      8a33bc9f9f9424609a7c3f9b551bc1a8dafbf606a66a9ab11616ddafbb1b00e3

                      SHA512

                      71e0e1a3986a15302da806126337e7918f51ab2da353cfa6b41b3ff9bf7351d8bc892dcc512904358d5587eb2d9e546d85157f31028911f04ac44f7db7c9032a

                    • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                      Filesize

                      321KB

                      MD5

                      3e90dacc5a8ee406ba5ae03b302c56b5

                      SHA1

                      dd206353eb25312430f5d8965aa4a51e13cdd9ca

                      SHA256

                      8a33bc9f9f9424609a7c3f9b551bc1a8dafbf606a66a9ab11616ddafbb1b00e3

                      SHA512

                      71e0e1a3986a15302da806126337e7918f51ab2da353cfa6b41b3ff9bf7351d8bc892dcc512904358d5587eb2d9e546d85157f31028911f04ac44f7db7c9032a

                    • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                      Filesize

                      321KB

                      MD5

                      3e90dacc5a8ee406ba5ae03b302c56b5

                      SHA1

                      dd206353eb25312430f5d8965aa4a51e13cdd9ca

                      SHA256

                      8a33bc9f9f9424609a7c3f9b551bc1a8dafbf606a66a9ab11616ddafbb1b00e3

                      SHA512

                      71e0e1a3986a15302da806126337e7918f51ab2da353cfa6b41b3ff9bf7351d8bc892dcc512904358d5587eb2d9e546d85157f31028911f04ac44f7db7c9032a

                    • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                      Filesize

                      321KB

                      MD5

                      3e90dacc5a8ee406ba5ae03b302c56b5

                      SHA1

                      dd206353eb25312430f5d8965aa4a51e13cdd9ca

                      SHA256

                      8a33bc9f9f9424609a7c3f9b551bc1a8dafbf606a66a9ab11616ddafbb1b00e3

                      SHA512

                      71e0e1a3986a15302da806126337e7918f51ab2da353cfa6b41b3ff9bf7351d8bc892dcc512904358d5587eb2d9e546d85157f31028911f04ac44f7db7c9032a

                    • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                      Filesize

                      321KB

                      MD5

                      3e90dacc5a8ee406ba5ae03b302c56b5

                      SHA1

                      dd206353eb25312430f5d8965aa4a51e13cdd9ca

                      SHA256

                      8a33bc9f9f9424609a7c3f9b551bc1a8dafbf606a66a9ab11616ddafbb1b00e3

                      SHA512

                      71e0e1a3986a15302da806126337e7918f51ab2da353cfa6b41b3ff9bf7351d8bc892dcc512904358d5587eb2d9e546d85157f31028911f04ac44f7db7c9032a

                    • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                      Filesize

                      321KB

                      MD5

                      3e90dacc5a8ee406ba5ae03b302c56b5

                      SHA1

                      dd206353eb25312430f5d8965aa4a51e13cdd9ca

                      SHA256

                      8a33bc9f9f9424609a7c3f9b551bc1a8dafbf606a66a9ab11616ddafbb1b00e3

                      SHA512

                      71e0e1a3986a15302da806126337e7918f51ab2da353cfa6b41b3ff9bf7351d8bc892dcc512904358d5587eb2d9e546d85157f31028911f04ac44f7db7c9032a

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      5bc0153d2973241b72a38c51a2f72116

                      SHA1

                      cd9c689663557452631d9f8ff609208b01884a32

                      SHA256

                      68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                      SHA512

                      2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      5bc0153d2973241b72a38c51a2f72116

                      SHA1

                      cd9c689663557452631d9f8ff609208b01884a32

                      SHA256

                      68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                      SHA512

                      2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                      Filesize

                      273B

                      MD5

                      374bfdcfcf19f4edfe949022092848d2

                      SHA1

                      df5ee40497e98efcfba30012452d433373d287d4

                      SHA256

                      224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f

                      SHA512

                      bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7

                    • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      5bc0153d2973241b72a38c51a2f72116

                      SHA1

                      cd9c689663557452631d9f8ff609208b01884a32

                      SHA256

                      68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                      SHA512

                      2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

                    • memory/5056-28-0x0000000000990000-0x000000000099A000-memory.dmp

                      Filesize

                      40KB

                    • memory/5056-31-0x00007FF9532C0000-0x00007FF953CAC000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/5056-29-0x00007FF9532C0000-0x00007FF953CAC000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/5108-48-0x000000000A6E0000-0x000000000A7EA000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/5108-49-0x000000000A610000-0x000000000A622000-memory.dmp

                      Filesize

                      72KB

                    • memory/5108-50-0x000000000A670000-0x000000000A6AE000-memory.dmp

                      Filesize

                      248KB

                    • memory/5108-51-0x000000000A7F0000-0x000000000A83B000-memory.dmp

                      Filesize

                      300KB

                    • memory/5108-47-0x000000000ABE0000-0x000000000B1E6000-memory.dmp

                      Filesize

                      6.0MB

                    • memory/5108-53-0x0000000073770000-0x0000000073E5E000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/5108-46-0x00000000011E0000-0x00000000011E6000-memory.dmp

                      Filesize

                      24KB

                    • memory/5108-45-0x0000000073770000-0x0000000073E5E000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/5108-44-0x00000000008D0000-0x0000000000900000-memory.dmp

                      Filesize

                      192KB