Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/08/2023, 10:17

General

  • Target

    d2b36ecb13bea5485e11c8391913b658.exe

  • Size

    705KB

  • MD5

    d2b36ecb13bea5485e11c8391913b658

  • SHA1

    bb4e2a2ce0fe32705a51a7a92f6b0cd85e57fa0d

  • SHA256

    a2ddc9a812ef124b685b33cd064ce6e5cbacaff71fe3cce0bf3a511a20eee0b7

  • SHA512

    c1a4ab5cd7534b84d6c3b750dbe4e3055983e7e3a96bcf83aee594528aca4fe3e06fd1c3294eed74dbed1766e314d4c6589222d087e8d9b31fbc3d0828dcbc6e

  • SSDEEP

    12288:8Mrhy901dbBZyqUrJdhM2tT/dE8iKDwvO322slu2anXIzJoS:VyofrGR9tDdE8iywvjyWKS

Malware Config

Extracted

Family

amadey

Version

3.87

C2

77.91.68.18/nice/index.php

Extracted

Family

redline

Botnet

nrava

C2

77.91.124.82:19071

Attributes
  • auth_value

    43fe50e9ee6afb85588e03ac9676e2f7

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d2b36ecb13bea5485e11c8391913b658.exe
    "C:\Users\Admin\AppData\Local\Temp\d2b36ecb13bea5485e11c8391913b658.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:508
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4264242.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4264242.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4428
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1030990.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1030990.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1536
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0106409.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0106409.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2976
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2982623.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2982623.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3260
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5390250.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5390250.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1816
            • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
              "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1784
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:1180
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:3056
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:4108
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "saves.exe" /P "Admin:N"
                    8⤵
                      PID:1776
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "saves.exe" /P "Admin:R" /E
                      8⤵
                        PID:4788
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\b40d11255d" /P "Admin:N"
                        8⤵
                          PID:4932
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                          8⤵
                            PID:2924
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\b40d11255d" /P "Admin:R" /E
                            8⤵
                              PID:1164
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:4888
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i9195708.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i9195708.exe
                      4⤵
                      • Executes dropped EXE
                      PID:3892
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:2516
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:2684

              Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4264242.exe

                      Filesize

                      599KB

                      MD5

                      4daddd33eba427898fad87fe4b24466f

                      SHA1

                      d6745860c375f211a4d3d142bd97b2d4401ec80b

                      SHA256

                      72930d6b2be2e47d3d78ee79204d8a8b406293fa1100fb2a1370329274cb7aa1

                      SHA512

                      7476446623facef83698d04339ff3dc78fc72db09d06a9caa31f283b533fd18d81bec7ae229b267d8e1324e3290f048a52ebb3c082ef0042c117a4efbb5dd361

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4264242.exe

                      Filesize

                      599KB

                      MD5

                      4daddd33eba427898fad87fe4b24466f

                      SHA1

                      d6745860c375f211a4d3d142bd97b2d4401ec80b

                      SHA256

                      72930d6b2be2e47d3d78ee79204d8a8b406293fa1100fb2a1370329274cb7aa1

                      SHA512

                      7476446623facef83698d04339ff3dc78fc72db09d06a9caa31f283b533fd18d81bec7ae229b267d8e1324e3290f048a52ebb3c082ef0042c117a4efbb5dd361

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1030990.exe

                      Filesize

                      433KB

                      MD5

                      a4d799d267d2a4edc1b32ff64466daea

                      SHA1

                      17583a662c8698daaf7f11a034baad925b3a5003

                      SHA256

                      447ee6796d73407092cbbf5ac448dd6aa16b0ffc48dea8bb2cda3c2415e6211d

                      SHA512

                      16c0fb83e6b91b44bf2f8faec40e8686680e9577839c0b74cf1a29e200b31c1557d53668e8411ddef97c1ff1b34d6deb5b09ef8eaa1de49585528f7e1b514d09

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1030990.exe

                      Filesize

                      433KB

                      MD5

                      a4d799d267d2a4edc1b32ff64466daea

                      SHA1

                      17583a662c8698daaf7f11a034baad925b3a5003

                      SHA256

                      447ee6796d73407092cbbf5ac448dd6aa16b0ffc48dea8bb2cda3c2415e6211d

                      SHA512

                      16c0fb83e6b91b44bf2f8faec40e8686680e9577839c0b74cf1a29e200b31c1557d53668e8411ddef97c1ff1b34d6deb5b09ef8eaa1de49585528f7e1b514d09

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i9195708.exe

                      Filesize

                      173KB

                      MD5

                      37d0f8292e55fa289d5f95ab2895accc

                      SHA1

                      587b147de008f6ed0cda99f79bb14ff9792a44b9

                      SHA256

                      e1c0d77490fcf0474fc03c79fd1153318d65515f75fc0a79c703c3a0853344ce

                      SHA512

                      86cc1eb16172f6f3fc525816824fcd22925ceca428a579e2bbbadbc1e68c2d705e7250694bb60f52ee8d191be7fc5252f99eb31dacecd77f02f8a397b92c0530

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i9195708.exe

                      Filesize

                      173KB

                      MD5

                      37d0f8292e55fa289d5f95ab2895accc

                      SHA1

                      587b147de008f6ed0cda99f79bb14ff9792a44b9

                      SHA256

                      e1c0d77490fcf0474fc03c79fd1153318d65515f75fc0a79c703c3a0853344ce

                      SHA512

                      86cc1eb16172f6f3fc525816824fcd22925ceca428a579e2bbbadbc1e68c2d705e7250694bb60f52ee8d191be7fc5252f99eb31dacecd77f02f8a397b92c0530

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0106409.exe

                      Filesize

                      277KB

                      MD5

                      98fa321707eeaf4352d386184f344b69

                      SHA1

                      60ba9a015f18177f709fb6c087f16319de776d3b

                      SHA256

                      12d6c8eac59a3ec25f2c9ee6a2fb37fece37bffa8280d105090e42da94436739

                      SHA512

                      92f432ae50622bdebc00f1af2f42ef5eb223469e3c86cd1a3a747053ff9c218616c45b4de87047a7153d716208f4fa04a78e4b28b4d515ce2f799b13c84e171f

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0106409.exe

                      Filesize

                      277KB

                      MD5

                      98fa321707eeaf4352d386184f344b69

                      SHA1

                      60ba9a015f18177f709fb6c087f16319de776d3b

                      SHA256

                      12d6c8eac59a3ec25f2c9ee6a2fb37fece37bffa8280d105090e42da94436739

                      SHA512

                      92f432ae50622bdebc00f1af2f42ef5eb223469e3c86cd1a3a747053ff9c218616c45b4de87047a7153d716208f4fa04a78e4b28b4d515ce2f799b13c84e171f

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2982623.exe

                      Filesize

                      15KB

                      MD5

                      008abe44e16a7021e4fd78726ea7a321

                      SHA1

                      e57e9f4df9be39d2bb82755844c934d54c36b261

                      SHA256

                      08db5491e66d7696a463f50ed30d026e30af2f24847d4bc538337bc2606611b5

                      SHA512

                      3e3c2a8d5a14e8e2fdfcac9dd87e4cd32bbdbb6dd8f450cad3989d4768d586e98b70566f9505189dfa6d9704cd981a1f4dab750b6058b81b38699ca4de8e018d

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2982623.exe

                      Filesize

                      15KB

                      MD5

                      008abe44e16a7021e4fd78726ea7a321

                      SHA1

                      e57e9f4df9be39d2bb82755844c934d54c36b261

                      SHA256

                      08db5491e66d7696a463f50ed30d026e30af2f24847d4bc538337bc2606611b5

                      SHA512

                      3e3c2a8d5a14e8e2fdfcac9dd87e4cd32bbdbb6dd8f450cad3989d4768d586e98b70566f9505189dfa6d9704cd981a1f4dab750b6058b81b38699ca4de8e018d

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5390250.exe

                      Filesize

                      321KB

                      MD5

                      0f8933d4aa6a8295289029d267e07ee2

                      SHA1

                      04080ea073efb9a2983741ecbcc8d235889de59a

                      SHA256

                      79d0b39917eaa608e2e98de6f03f7a5ef505858e3d7e9719d3efd95d5c5b1996

                      SHA512

                      944a86baa5e4bb21fa4eed62a976ebd72754e455c245b3fd941337c47c3754cbd1c729c7022a509d8febbf1475776cd99c98b78d6560937463db37844ff021c5

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5390250.exe

                      Filesize

                      321KB

                      MD5

                      0f8933d4aa6a8295289029d267e07ee2

                      SHA1

                      04080ea073efb9a2983741ecbcc8d235889de59a

                      SHA256

                      79d0b39917eaa608e2e98de6f03f7a5ef505858e3d7e9719d3efd95d5c5b1996

                      SHA512

                      944a86baa5e4bb21fa4eed62a976ebd72754e455c245b3fd941337c47c3754cbd1c729c7022a509d8febbf1475776cd99c98b78d6560937463db37844ff021c5

                    • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                      Filesize

                      321KB

                      MD5

                      0f8933d4aa6a8295289029d267e07ee2

                      SHA1

                      04080ea073efb9a2983741ecbcc8d235889de59a

                      SHA256

                      79d0b39917eaa608e2e98de6f03f7a5ef505858e3d7e9719d3efd95d5c5b1996

                      SHA512

                      944a86baa5e4bb21fa4eed62a976ebd72754e455c245b3fd941337c47c3754cbd1c729c7022a509d8febbf1475776cd99c98b78d6560937463db37844ff021c5

                    • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                      Filesize

                      321KB

                      MD5

                      0f8933d4aa6a8295289029d267e07ee2

                      SHA1

                      04080ea073efb9a2983741ecbcc8d235889de59a

                      SHA256

                      79d0b39917eaa608e2e98de6f03f7a5ef505858e3d7e9719d3efd95d5c5b1996

                      SHA512

                      944a86baa5e4bb21fa4eed62a976ebd72754e455c245b3fd941337c47c3754cbd1c729c7022a509d8febbf1475776cd99c98b78d6560937463db37844ff021c5

                    • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                      Filesize

                      321KB

                      MD5

                      0f8933d4aa6a8295289029d267e07ee2

                      SHA1

                      04080ea073efb9a2983741ecbcc8d235889de59a

                      SHA256

                      79d0b39917eaa608e2e98de6f03f7a5ef505858e3d7e9719d3efd95d5c5b1996

                      SHA512

                      944a86baa5e4bb21fa4eed62a976ebd72754e455c245b3fd941337c47c3754cbd1c729c7022a509d8febbf1475776cd99c98b78d6560937463db37844ff021c5

                    • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                      Filesize

                      321KB

                      MD5

                      0f8933d4aa6a8295289029d267e07ee2

                      SHA1

                      04080ea073efb9a2983741ecbcc8d235889de59a

                      SHA256

                      79d0b39917eaa608e2e98de6f03f7a5ef505858e3d7e9719d3efd95d5c5b1996

                      SHA512

                      944a86baa5e4bb21fa4eed62a976ebd72754e455c245b3fd941337c47c3754cbd1c729c7022a509d8febbf1475776cd99c98b78d6560937463db37844ff021c5

                    • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                      Filesize

                      321KB

                      MD5

                      0f8933d4aa6a8295289029d267e07ee2

                      SHA1

                      04080ea073efb9a2983741ecbcc8d235889de59a

                      SHA256

                      79d0b39917eaa608e2e98de6f03f7a5ef505858e3d7e9719d3efd95d5c5b1996

                      SHA512

                      944a86baa5e4bb21fa4eed62a976ebd72754e455c245b3fd941337c47c3754cbd1c729c7022a509d8febbf1475776cd99c98b78d6560937463db37844ff021c5

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      5bc0153d2973241b72a38c51a2f72116

                      SHA1

                      cd9c689663557452631d9f8ff609208b01884a32

                      SHA256

                      68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                      SHA512

                      2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      5bc0153d2973241b72a38c51a2f72116

                      SHA1

                      cd9c689663557452631d9f8ff609208b01884a32

                      SHA256

                      68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                      SHA512

                      2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      5bc0153d2973241b72a38c51a2f72116

                      SHA1

                      cd9c689663557452631d9f8ff609208b01884a32

                      SHA256

                      68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                      SHA512

                      2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                      Filesize

                      273B

                      MD5

                      374bfdcfcf19f4edfe949022092848d2

                      SHA1

                      df5ee40497e98efcfba30012452d433373d287d4

                      SHA256

                      224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f

                      SHA512

                      bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7

                    • memory/3260-28-0x0000000000CA0000-0x0000000000CAA000-memory.dmp

                      Filesize

                      40KB

                    • memory/3260-31-0x00007FFA0AEC0000-0x00007FFA0B981000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/3260-29-0x00007FFA0AEC0000-0x00007FFA0B981000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/3892-52-0x00000000054B0000-0x00000000054C2000-memory.dmp

                      Filesize

                      72KB

                    • memory/3892-51-0x00000000054A0000-0x00000000054B0000-memory.dmp

                      Filesize

                      64KB

                    • memory/3892-53-0x0000000005510000-0x000000000554C000-memory.dmp

                      Filesize

                      240KB

                    • memory/3892-54-0x0000000073CD0000-0x0000000074480000-memory.dmp

                      Filesize

                      7.7MB

                    • memory/3892-55-0x00000000054A0000-0x00000000054B0000-memory.dmp

                      Filesize

                      64KB

                    • memory/3892-50-0x00000000055C0000-0x00000000056CA000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/3892-49-0x0000000005AD0000-0x00000000060E8000-memory.dmp

                      Filesize

                      6.1MB

                    • memory/3892-48-0x0000000073CD0000-0x0000000074480000-memory.dmp

                      Filesize

                      7.7MB

                    • memory/3892-47-0x0000000000B20000-0x0000000000B50000-memory.dmp

                      Filesize

                      192KB