Analysis

  • max time kernel
    276s
  • max time network
    291s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27/08/2023, 04:49

General

  • Target

    b2417434ec0f47057c3b2ee6d9100361e85e3cb5eb98e5d7bfdcfceee817b5ed.exe

  • Size

    705KB

  • MD5

    096e0fb6fb14a6549d25433207e78be9

  • SHA1

    d7e97ea3172215d7c0b0b0a1bb602fc7a1308199

  • SHA256

    b2417434ec0f47057c3b2ee6d9100361e85e3cb5eb98e5d7bfdcfceee817b5ed

  • SHA512

    79308b713e6ee61fb3049e24f14b70688f0ee4cc52d5e3724f1810d31e2b6f6b34709a3754e5cfaf91ba2e7725905f8f3bdfa59a83f5437249f821268f9447ab

  • SSDEEP

    12288:RMrdy90FH2LitlS+USYiHgWyuPOgKYiegdRVSxmtjsshLw:wy+3tM+VbPOYwtph0

Malware Config

Extracted

Family

amadey

Version

3.87

C2

77.91.68.18/nice/index.php

Extracted

Family

redline

Botnet

jaja

C2

77.91.124.73:19071

Attributes
  • auth_value

    3670179d176ca399ed08e7914610b43c

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2417434ec0f47057c3b2ee6d9100361e85e3cb5eb98e5d7bfdcfceee817b5ed.exe
    "C:\Users\Admin\AppData\Local\Temp\b2417434ec0f47057c3b2ee6d9100361e85e3cb5eb98e5d7bfdcfceee817b5ed.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2304
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6728851.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6728851.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1144
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8989442.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8989442.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3004
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2244072.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2244072.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3292
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4271088.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4271088.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3936
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5961095.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5961095.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2560
            • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
              "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2420
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:4952
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2132
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:2612
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "saves.exe" /P "Admin:N"
                    8⤵
                      PID:4324
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "saves.exe" /P "Admin:R" /E
                      8⤵
                        PID:5060
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:4464
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\b40d11255d" /P "Admin:N"
                          8⤵
                            PID:4668
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\b40d11255d" /P "Admin:R" /E
                            8⤵
                              PID:5052
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:4340
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i3615382.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i3615382.exe
                      4⤵
                      • Executes dropped EXE
                      PID:4996
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:4716

              Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6728851.exe

                      Filesize

                      599KB

                      MD5

                      55774feb7d21d1a8b160af5366d85dee

                      SHA1

                      ea0b09b704aab794870645313f161f5bf1fd627a

                      SHA256

                      4b8efb81b85fd8f51b5439dea738987b7a07eb4ef2d9e225ddc7f497398c2d8b

                      SHA512

                      36587ea4412c9e2125066d77dab7d8cf3df97bb77f7490216f589584294cf6667f1f79fa2d7c6b03e7364462e08b0a1968a6548d64cf6b9eb2968649f2fd3d5d

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6728851.exe

                      Filesize

                      599KB

                      MD5

                      55774feb7d21d1a8b160af5366d85dee

                      SHA1

                      ea0b09b704aab794870645313f161f5bf1fd627a

                      SHA256

                      4b8efb81b85fd8f51b5439dea738987b7a07eb4ef2d9e225ddc7f497398c2d8b

                      SHA512

                      36587ea4412c9e2125066d77dab7d8cf3df97bb77f7490216f589584294cf6667f1f79fa2d7c6b03e7364462e08b0a1968a6548d64cf6b9eb2968649f2fd3d5d

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8989442.exe

                      Filesize

                      433KB

                      MD5

                      9c1a534885656247e94833e240709ba2

                      SHA1

                      6a26448c60aa5cfe4d8f7fef26a77b3e135c9c81

                      SHA256

                      daded14287befabdb83403db00c010f0bb79c4de5ddaec9acb8595331e8157c8

                      SHA512

                      9cc3977592cd87e56d6c03bcd6e6bf6d879fc72bdb20a7cf30beec6e9b4420302481e35648dbf0de6fe6ba7322369d0ccd3286df3f4fcb2b70625850007dfa81

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8989442.exe

                      Filesize

                      433KB

                      MD5

                      9c1a534885656247e94833e240709ba2

                      SHA1

                      6a26448c60aa5cfe4d8f7fef26a77b3e135c9c81

                      SHA256

                      daded14287befabdb83403db00c010f0bb79c4de5ddaec9acb8595331e8157c8

                      SHA512

                      9cc3977592cd87e56d6c03bcd6e6bf6d879fc72bdb20a7cf30beec6e9b4420302481e35648dbf0de6fe6ba7322369d0ccd3286df3f4fcb2b70625850007dfa81

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i3615382.exe

                      Filesize

                      175KB

                      MD5

                      749eafc6127cf515e18e9398ef3ed88d

                      SHA1

                      75f0c35515db4cbf03ce09bb544281537680093e

                      SHA256

                      2d208da9fe2c015505ae7dfe2f9992899cabac1eae39aecdda2941aa452eacdd

                      SHA512

                      dee45038c65a9a239f63a1e21f5fe868bdf7019cd9676b8789d088c490abcd83bb845ee93e4215f44ea3145de28edf65f54efa085b8eabe1dbfb408568885b54

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i3615382.exe

                      Filesize

                      175KB

                      MD5

                      749eafc6127cf515e18e9398ef3ed88d

                      SHA1

                      75f0c35515db4cbf03ce09bb544281537680093e

                      SHA256

                      2d208da9fe2c015505ae7dfe2f9992899cabac1eae39aecdda2941aa452eacdd

                      SHA512

                      dee45038c65a9a239f63a1e21f5fe868bdf7019cd9676b8789d088c490abcd83bb845ee93e4215f44ea3145de28edf65f54efa085b8eabe1dbfb408568885b54

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2244072.exe

                      Filesize

                      277KB

                      MD5

                      6787e5f8a3ff1aac065e7eb4c05c771b

                      SHA1

                      f86acc9d1f8b26030b503de8341fa1cc0d10bfc9

                      SHA256

                      91cdbef701b1e0be1e5905d81bb9e0764e911b25d98760b94b1ded96bee37d0d

                      SHA512

                      188fdd1e2b39e928e1246c92804479df491f5aaa82e656f0259ef56167a7f6106b7d2e96134fa4f4bd0a63d662118767587daa64a2bd410abfcf4da510e5a5f6

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2244072.exe

                      Filesize

                      277KB

                      MD5

                      6787e5f8a3ff1aac065e7eb4c05c771b

                      SHA1

                      f86acc9d1f8b26030b503de8341fa1cc0d10bfc9

                      SHA256

                      91cdbef701b1e0be1e5905d81bb9e0764e911b25d98760b94b1ded96bee37d0d

                      SHA512

                      188fdd1e2b39e928e1246c92804479df491f5aaa82e656f0259ef56167a7f6106b7d2e96134fa4f4bd0a63d662118767587daa64a2bd410abfcf4da510e5a5f6

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4271088.exe

                      Filesize

                      14KB

                      MD5

                      4ad29a92a1bcc7ecf2bbe6121f0f6866

                      SHA1

                      8ea1fe5df778d21bd053f0f285c0aaa9fa7a316c

                      SHA256

                      a543fde09f7b81f936b05ad389c9576541d531183cfb1d6e809c3b95aabbae47

                      SHA512

                      ddbb0d86c3356488cfa330aac4e8746d1e8085c3ef36a74b03effb3a8875e2fe00c768bec33b08c94d529a42590d9808651f191c4520bf5366c786e0695f6a4b

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4271088.exe

                      Filesize

                      14KB

                      MD5

                      4ad29a92a1bcc7ecf2bbe6121f0f6866

                      SHA1

                      8ea1fe5df778d21bd053f0f285c0aaa9fa7a316c

                      SHA256

                      a543fde09f7b81f936b05ad389c9576541d531183cfb1d6e809c3b95aabbae47

                      SHA512

                      ddbb0d86c3356488cfa330aac4e8746d1e8085c3ef36a74b03effb3a8875e2fe00c768bec33b08c94d529a42590d9808651f191c4520bf5366c786e0695f6a4b

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5961095.exe

                      Filesize

                      321KB

                      MD5

                      1a3c3e15ed6ac1778fdc2e620de5cc50

                      SHA1

                      df628c751b184b7a5e9d38003b28e305db660358

                      SHA256

                      0021ae84a5764c2160a15fcd8745bb18ecc6724948a27507c5ca2017c37e7588

                      SHA512

                      5c98482fee20a24dca2f65b68efc434d9e9061ee57a84dc94b14cb41be3918872132c05bb60e560398a128e18798ea3a0bc8868e5846a02e09d6821597421063

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5961095.exe

                      Filesize

                      321KB

                      MD5

                      1a3c3e15ed6ac1778fdc2e620de5cc50

                      SHA1

                      df628c751b184b7a5e9d38003b28e305db660358

                      SHA256

                      0021ae84a5764c2160a15fcd8745bb18ecc6724948a27507c5ca2017c37e7588

                      SHA512

                      5c98482fee20a24dca2f65b68efc434d9e9061ee57a84dc94b14cb41be3918872132c05bb60e560398a128e18798ea3a0bc8868e5846a02e09d6821597421063

                    • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                      Filesize

                      321KB

                      MD5

                      1a3c3e15ed6ac1778fdc2e620de5cc50

                      SHA1

                      df628c751b184b7a5e9d38003b28e305db660358

                      SHA256

                      0021ae84a5764c2160a15fcd8745bb18ecc6724948a27507c5ca2017c37e7588

                      SHA512

                      5c98482fee20a24dca2f65b68efc434d9e9061ee57a84dc94b14cb41be3918872132c05bb60e560398a128e18798ea3a0bc8868e5846a02e09d6821597421063

                    • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                      Filesize

                      321KB

                      MD5

                      1a3c3e15ed6ac1778fdc2e620de5cc50

                      SHA1

                      df628c751b184b7a5e9d38003b28e305db660358

                      SHA256

                      0021ae84a5764c2160a15fcd8745bb18ecc6724948a27507c5ca2017c37e7588

                      SHA512

                      5c98482fee20a24dca2f65b68efc434d9e9061ee57a84dc94b14cb41be3918872132c05bb60e560398a128e18798ea3a0bc8868e5846a02e09d6821597421063

                    • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                      Filesize

                      321KB

                      MD5

                      1a3c3e15ed6ac1778fdc2e620de5cc50

                      SHA1

                      df628c751b184b7a5e9d38003b28e305db660358

                      SHA256

                      0021ae84a5764c2160a15fcd8745bb18ecc6724948a27507c5ca2017c37e7588

                      SHA512

                      5c98482fee20a24dca2f65b68efc434d9e9061ee57a84dc94b14cb41be3918872132c05bb60e560398a128e18798ea3a0bc8868e5846a02e09d6821597421063

                    • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                      Filesize

                      321KB

                      MD5

                      1a3c3e15ed6ac1778fdc2e620de5cc50

                      SHA1

                      df628c751b184b7a5e9d38003b28e305db660358

                      SHA256

                      0021ae84a5764c2160a15fcd8745bb18ecc6724948a27507c5ca2017c37e7588

                      SHA512

                      5c98482fee20a24dca2f65b68efc434d9e9061ee57a84dc94b14cb41be3918872132c05bb60e560398a128e18798ea3a0bc8868e5846a02e09d6821597421063

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      5bc0153d2973241b72a38c51a2f72116

                      SHA1

                      cd9c689663557452631d9f8ff609208b01884a32

                      SHA256

                      68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                      SHA512

                      2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      5bc0153d2973241b72a38c51a2f72116

                      SHA1

                      cd9c689663557452631d9f8ff609208b01884a32

                      SHA256

                      68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                      SHA512

                      2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                      Filesize

                      273B

                      MD5

                      374bfdcfcf19f4edfe949022092848d2

                      SHA1

                      df5ee40497e98efcfba30012452d433373d287d4

                      SHA256

                      224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f

                      SHA512

                      bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7

                    • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      5bc0153d2973241b72a38c51a2f72116

                      SHA1

                      cd9c689663557452631d9f8ff609208b01884a32

                      SHA256

                      68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                      SHA512

                      2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

                    • memory/3936-28-0x00000000008C0000-0x00000000008CA000-memory.dmp

                      Filesize

                      40KB

                    • memory/3936-31-0x00007FFF6D9E0000-0x00007FFF6E3CC000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/3936-29-0x00007FFF6D9E0000-0x00007FFF6E3CC000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/4996-47-0x000000000AF40000-0x000000000B546000-memory.dmp

                      Filesize

                      6.0MB

                    • memory/4996-48-0x000000000AAB0000-0x000000000ABBA000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/4996-49-0x000000000A9E0000-0x000000000A9F2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4996-50-0x000000000AA40000-0x000000000AA7E000-memory.dmp

                      Filesize

                      248KB

                    • memory/4996-51-0x000000000ABC0000-0x000000000AC0B000-memory.dmp

                      Filesize

                      300KB

                    • memory/4996-52-0x0000000072FB0000-0x000000007369E000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/4996-46-0x00000000030D0000-0x00000000030D6000-memory.dmp

                      Filesize

                      24KB

                    • memory/4996-44-0x0000000000CA0000-0x0000000000CD0000-memory.dmp

                      Filesize

                      192KB

                    • memory/4996-45-0x0000000072FB0000-0x000000007369E000-memory.dmp

                      Filesize

                      6.9MB