Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/08/2023, 11:41

General

  • Target

    d85b36b4e1f727f8587c87faef4376d4207d8d967e19cc3e41d956ea8ce8badf.exe

  • Size

    1.4MB

  • MD5

    8855384d9e0e706cf69a543ceaff1c91

  • SHA1

    bc8495df28a57ec8783201bd4f3ac8dac8a364ad

  • SHA256

    d85b36b4e1f727f8587c87faef4376d4207d8d967e19cc3e41d956ea8ce8badf

  • SHA512

    29983ae90e1e4132413dd8b9e70cdd74e74ea4f628c69785dfc25bd522fc20447d9845dac9cb9e7123013f22cffec052b5d9d78e109dfd94955c10c4f024a598

  • SSDEEP

    24576:UyhQQAaNpG4iIda8KKhVX3mFUHIYFGbCHeMXCj0Kt2c2Jxh4DdMiUQskNkYG:jhAwpUUKKhVNuCHSARJx2BMzQSY

Malware Config

Extracted

Family

amadey

Version

3.87

C2

77.91.68.18/nice/index.php

Extracted

Family

redline

Botnet

nrava

C2

77.91.124.82:19071

Attributes
  • auth_value

    43fe50e9ee6afb85588e03ac9676e2f7

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d85b36b4e1f727f8587c87faef4376d4207d8d967e19cc3e41d956ea8ce8badf.exe
    "C:\Users\Admin\AppData\Local\Temp\d85b36b4e1f727f8587c87faef4376d4207d8d967e19cc3e41d956ea8ce8badf.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3272
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1702881.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1702881.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1408
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3799878.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3799878.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4408
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y7998060.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y7998060.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4924
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l5196614.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l5196614.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3800
            • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
              "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:3696
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:1860
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:3168
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:5108
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "saves.exe" /P "Admin:N"
                    8⤵
                      PID:3716
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "saves.exe" /P "Admin:R" /E
                      8⤵
                        PID:412
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:3316
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\b40d11255d" /P "Admin:N"
                          8⤵
                            PID:3668
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\b40d11255d" /P "Admin:R" /E
                            8⤵
                              PID:348
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:3752
                      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m2203924.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m2203924.exe
                        5⤵
                        • Executes dropped EXE
                        PID:988
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n4284828.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n4284828.exe
                      4⤵
                      • Executes dropped EXE
                      PID:3112
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:820
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:1968
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:2588

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1702881.exe

                Filesize

                1.3MB

                MD5

                b2d15f05387e5c33e75a9edc999c44c1

                SHA1

                cbcc5d5120001f4954e7868c4565f4127f8d5232

                SHA256

                b65de615713729d2116ca42ebdb27dd24f1767b1de7c3f744ab3330a0df75b8f

                SHA512

                113d36821a055188ed31fcdc9954913ff44ce7a7b60bf71baaf2e28a664d41fa0163a99b73cee58a2c38aaa020be2569a8f76d206f87374d219205a121328ff2

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1702881.exe

                Filesize

                1.3MB

                MD5

                b2d15f05387e5c33e75a9edc999c44c1

                SHA1

                cbcc5d5120001f4954e7868c4565f4127f8d5232

                SHA256

                b65de615713729d2116ca42ebdb27dd24f1767b1de7c3f744ab3330a0df75b8f

                SHA512

                113d36821a055188ed31fcdc9954913ff44ce7a7b60bf71baaf2e28a664d41fa0163a99b73cee58a2c38aaa020be2569a8f76d206f87374d219205a121328ff2

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3799878.exe

                Filesize

                476KB

                MD5

                76b4b475e309e60a39e055773bf4e5e2

                SHA1

                96a98f283d65bda5640fde4836e5cca8430a69c5

                SHA256

                1f9f27bc73b19605fc973ba2d08ff4dc054fc4985c6c5fe024c4c41f470decc2

                SHA512

                06700b0a75b9d1ee99b94b195ea468395b8fb42db8eab00f8688099e6950dfb0394866594f06524c33c50bf4502182b5d04b8c93d72b87bb59a930d077b45291

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3799878.exe

                Filesize

                476KB

                MD5

                76b4b475e309e60a39e055773bf4e5e2

                SHA1

                96a98f283d65bda5640fde4836e5cca8430a69c5

                SHA256

                1f9f27bc73b19605fc973ba2d08ff4dc054fc4985c6c5fe024c4c41f470decc2

                SHA512

                06700b0a75b9d1ee99b94b195ea468395b8fb42db8eab00f8688099e6950dfb0394866594f06524c33c50bf4502182b5d04b8c93d72b87bb59a930d077b45291

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n4284828.exe

                Filesize

                173KB

                MD5

                fe2bc370582b8c68ef1ca9e735a35bbe

                SHA1

                99b4e9d136be4837ed89f3faca68c5acdf582938

                SHA256

                e6b07d7f8d7dc647f70bf959af5dd79770d37c092b89ebd2150f5c5a7100c265

                SHA512

                c6acb19246a3377264c260acf31fe633164d6087eda9e133ac78e52ed780e7e36d8202e546710aa2090db5b6d7031957c5ab1220eee4ecf15bd32c7dc3654099

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n4284828.exe

                Filesize

                173KB

                MD5

                fe2bc370582b8c68ef1ca9e735a35bbe

                SHA1

                99b4e9d136be4837ed89f3faca68c5acdf582938

                SHA256

                e6b07d7f8d7dc647f70bf959af5dd79770d37c092b89ebd2150f5c5a7100c265

                SHA512

                c6acb19246a3377264c260acf31fe633164d6087eda9e133ac78e52ed780e7e36d8202e546710aa2090db5b6d7031957c5ab1220eee4ecf15bd32c7dc3654099

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y7998060.exe

                Filesize

                320KB

                MD5

                91535195f1b719c91d579ae86116a093

                SHA1

                73fa7e41e9e3b4377680b291642ed1e3de07ce7f

                SHA256

                ebde086405902f01d29777baaa23cbd5f3ea993af7a07bb36a4f2a0b904d72ec

                SHA512

                55af790aa72fdefb3230b683df2f46de604e28243ea63f148ef1c36ed456486abe73011e4ad8c2e02bebba00a2c1e97020afce9bdc3d65a704e82fd0ce63bad4

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y7998060.exe

                Filesize

                320KB

                MD5

                91535195f1b719c91d579ae86116a093

                SHA1

                73fa7e41e9e3b4377680b291642ed1e3de07ce7f

                SHA256

                ebde086405902f01d29777baaa23cbd5f3ea993af7a07bb36a4f2a0b904d72ec

                SHA512

                55af790aa72fdefb3230b683df2f46de604e28243ea63f148ef1c36ed456486abe73011e4ad8c2e02bebba00a2c1e97020afce9bdc3d65a704e82fd0ce63bad4

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l5196614.exe

                Filesize

                322KB

                MD5

                8eb06a677c89b31eed7d48dd02b1e670

                SHA1

                63d855b50b8e1353b92e063cfebb79b8a4af68b4

                SHA256

                73b633df3d76103eeb6b271b6969c469d9e1c56498e5c35dd98e9fb07ecc35e9

                SHA512

                93cff6e85311a324dad5a25c5697dffd7eee2ef44add6d89990bb57b088e5b0d22d82f82b4394526ca26878be378bcd10f5629dcbaa67d390aef950b26d897b1

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l5196614.exe

                Filesize

                322KB

                MD5

                8eb06a677c89b31eed7d48dd02b1e670

                SHA1

                63d855b50b8e1353b92e063cfebb79b8a4af68b4

                SHA256

                73b633df3d76103eeb6b271b6969c469d9e1c56498e5c35dd98e9fb07ecc35e9

                SHA512

                93cff6e85311a324dad5a25c5697dffd7eee2ef44add6d89990bb57b088e5b0d22d82f82b4394526ca26878be378bcd10f5629dcbaa67d390aef950b26d897b1

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m2203924.exe

                Filesize

                140KB

                MD5

                94490c84e5258bc7bd90b5142e511ade

                SHA1

                7700adbf2eecdabd0558471b37d7aa2b5578d494

                SHA256

                c868390476e014736b806e4c644287c9a8114b775525cac4f776560f871c7593

                SHA512

                a660f01d95332cbec1a9adac63533b563aa0ef7546a64e8dbabcc553a1230accae4f8a6863383179ca2231ec94b629361f48cbccfcec3b5ca352db541074efcf

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m2203924.exe

                Filesize

                140KB

                MD5

                94490c84e5258bc7bd90b5142e511ade

                SHA1

                7700adbf2eecdabd0558471b37d7aa2b5578d494

                SHA256

                c868390476e014736b806e4c644287c9a8114b775525cac4f776560f871c7593

                SHA512

                a660f01d95332cbec1a9adac63533b563aa0ef7546a64e8dbabcc553a1230accae4f8a6863383179ca2231ec94b629361f48cbccfcec3b5ca352db541074efcf

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                322KB

                MD5

                8eb06a677c89b31eed7d48dd02b1e670

                SHA1

                63d855b50b8e1353b92e063cfebb79b8a4af68b4

                SHA256

                73b633df3d76103eeb6b271b6969c469d9e1c56498e5c35dd98e9fb07ecc35e9

                SHA512

                93cff6e85311a324dad5a25c5697dffd7eee2ef44add6d89990bb57b088e5b0d22d82f82b4394526ca26878be378bcd10f5629dcbaa67d390aef950b26d897b1

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                322KB

                MD5

                8eb06a677c89b31eed7d48dd02b1e670

                SHA1

                63d855b50b8e1353b92e063cfebb79b8a4af68b4

                SHA256

                73b633df3d76103eeb6b271b6969c469d9e1c56498e5c35dd98e9fb07ecc35e9

                SHA512

                93cff6e85311a324dad5a25c5697dffd7eee2ef44add6d89990bb57b088e5b0d22d82f82b4394526ca26878be378bcd10f5629dcbaa67d390aef950b26d897b1

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                322KB

                MD5

                8eb06a677c89b31eed7d48dd02b1e670

                SHA1

                63d855b50b8e1353b92e063cfebb79b8a4af68b4

                SHA256

                73b633df3d76103eeb6b271b6969c469d9e1c56498e5c35dd98e9fb07ecc35e9

                SHA512

                93cff6e85311a324dad5a25c5697dffd7eee2ef44add6d89990bb57b088e5b0d22d82f82b4394526ca26878be378bcd10f5629dcbaa67d390aef950b26d897b1

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                322KB

                MD5

                8eb06a677c89b31eed7d48dd02b1e670

                SHA1

                63d855b50b8e1353b92e063cfebb79b8a4af68b4

                SHA256

                73b633df3d76103eeb6b271b6969c469d9e1c56498e5c35dd98e9fb07ecc35e9

                SHA512

                93cff6e85311a324dad5a25c5697dffd7eee2ef44add6d89990bb57b088e5b0d22d82f82b4394526ca26878be378bcd10f5629dcbaa67d390aef950b26d897b1

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                322KB

                MD5

                8eb06a677c89b31eed7d48dd02b1e670

                SHA1

                63d855b50b8e1353b92e063cfebb79b8a4af68b4

                SHA256

                73b633df3d76103eeb6b271b6969c469d9e1c56498e5c35dd98e9fb07ecc35e9

                SHA512

                93cff6e85311a324dad5a25c5697dffd7eee2ef44add6d89990bb57b088e5b0d22d82f82b4394526ca26878be378bcd10f5629dcbaa67d390aef950b26d897b1

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                322KB

                MD5

                8eb06a677c89b31eed7d48dd02b1e670

                SHA1

                63d855b50b8e1353b92e063cfebb79b8a4af68b4

                SHA256

                73b633df3d76103eeb6b271b6969c469d9e1c56498e5c35dd98e9fb07ecc35e9

                SHA512

                93cff6e85311a324dad5a25c5697dffd7eee2ef44add6d89990bb57b088e5b0d22d82f82b4394526ca26878be378bcd10f5629dcbaa67d390aef950b26d897b1

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                374bfdcfcf19f4edfe949022092848d2

                SHA1

                df5ee40497e98efcfba30012452d433373d287d4

                SHA256

                224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f

                SHA512

                bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7

              • memory/3112-43-0x0000000072A30000-0x00000000731E0000-memory.dmp

                Filesize

                7.7MB

              • memory/3112-51-0x0000000072A30000-0x00000000731E0000-memory.dmp

                Filesize

                7.7MB

              • memory/3112-52-0x0000000002E00000-0x0000000002E10000-memory.dmp

                Filesize

                64KB

              • memory/3112-50-0x0000000005530000-0x000000000556C000-memory.dmp

                Filesize

                240KB

              • memory/3112-49-0x00000000054D0000-0x00000000054E2000-memory.dmp

                Filesize

                72KB

              • memory/3112-48-0x0000000002E00000-0x0000000002E10000-memory.dmp

                Filesize

                64KB

              • memory/3112-47-0x00000000055A0000-0x00000000056AA000-memory.dmp

                Filesize

                1.0MB

              • memory/3112-46-0x0000000005AB0000-0x00000000060C8000-memory.dmp

                Filesize

                6.1MB

              • memory/3112-44-0x0000000000A00000-0x0000000000A30000-memory.dmp

                Filesize

                192KB