Analysis

  • max time kernel
    136s
  • max time network
    156s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27/08/2023, 15:44

General

  • Target

    06836b2c03b5d3d3b69d4994b7c0719a504391088cdced3b16149be84b6acf86.exe

  • Size

    1.4MB

  • MD5

    634693e0c2a452728996b180e33eeb23

  • SHA1

    dc8117d3a29ad1136aa59b7c7b30dbf6537a3260

  • SHA256

    06836b2c03b5d3d3b69d4994b7c0719a504391088cdced3b16149be84b6acf86

  • SHA512

    5f0cb270848962ae04e1bd3ab61ecea6ec9de89d9ff0ff6036de0f375582e0814e3f48ccff036cc180fae4ac7cfb52d73fc455eaf31e7b48c583f0f785f8f0e9

  • SSDEEP

    24576:4ywF0YblCgfy4TSiKGhyve9eZTMufESI+fcOlsXN5BArZkj2XZ1YfJ9sx:/FHgfy4uiKGhyvesZgufdIGc8INP4ZkJ

Malware Config

Extracted

Family

amadey

Version

3.87

C2

77.91.68.18/nice/index.php

Extracted

Family

redline

Botnet

nrava

C2

77.91.124.82:19071

Attributes
  • auth_value

    43fe50e9ee6afb85588e03ac9676e2f7

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06836b2c03b5d3d3b69d4994b7c0719a504391088cdced3b16149be84b6acf86.exe
    "C:\Users\Admin\AppData\Local\Temp\06836b2c03b5d3d3b69d4994b7c0719a504391088cdced3b16149be84b6acf86.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3396
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0067418.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0067418.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5052
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y1921372.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y1921372.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1472
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y3663832.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y3663832.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3928
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3829381.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3829381.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4756
            • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
              "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:928
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:64
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1616
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:3444
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "saves.exe" /P "Admin:N"
                    8⤵
                      PID:4748
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "saves.exe" /P "Admin:R" /E
                      8⤵
                        PID:4264
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:4828
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\b40d11255d" /P "Admin:N"
                          8⤵
                            PID:4764
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\b40d11255d" /P "Admin:R" /E
                            8⤵
                              PID:4744
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:2516
                      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m6872086.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m6872086.exe
                        5⤵
                        • Executes dropped EXE
                        PID:4980
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n3793436.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n3793436.exe
                      4⤵
                      • Executes dropped EXE
                      PID:4808
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:1352
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:3268

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0067418.exe

                Filesize

                1.3MB

                MD5

                f62765168c16aec05c082ecdd4c215cc

                SHA1

                720a3ee10dc7b227934eb7b72c915c65fa581499

                SHA256

                3cf83938870345b478ad52dd98619c76920b9d48c89c3b7619f98547e20e449d

                SHA512

                62210e1caf83513879609408af4fe951c51780499090fff9caa0f911542ea1de61c666d2a47d7673961967cfc536c087dca7730045a3915594d1ff6c1016a079

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0067418.exe

                Filesize

                1.3MB

                MD5

                f62765168c16aec05c082ecdd4c215cc

                SHA1

                720a3ee10dc7b227934eb7b72c915c65fa581499

                SHA256

                3cf83938870345b478ad52dd98619c76920b9d48c89c3b7619f98547e20e449d

                SHA512

                62210e1caf83513879609408af4fe951c51780499090fff9caa0f911542ea1de61c666d2a47d7673961967cfc536c087dca7730045a3915594d1ff6c1016a079

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y1921372.exe

                Filesize

                475KB

                MD5

                18b2882812b6213cf74a8dc66f42fbea

                SHA1

                530e08727a5b63b0eebd7345a109f1ab194836bf

                SHA256

                f5f3c01cb6a0c645c56925bf0b21968e937942ae961b0fbfd52d559190e8b8f4

                SHA512

                eedb72a600dc899dba291fc56a64badb9126a0a1d95f3d6f6e007777d6831cffca030e499f9b27fd6b0aa8fedd340ec8890419f33c303089de6a7c919f9181dd

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y1921372.exe

                Filesize

                475KB

                MD5

                18b2882812b6213cf74a8dc66f42fbea

                SHA1

                530e08727a5b63b0eebd7345a109f1ab194836bf

                SHA256

                f5f3c01cb6a0c645c56925bf0b21968e937942ae961b0fbfd52d559190e8b8f4

                SHA512

                eedb72a600dc899dba291fc56a64badb9126a0a1d95f3d6f6e007777d6831cffca030e499f9b27fd6b0aa8fedd340ec8890419f33c303089de6a7c919f9181dd

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n3793436.exe

                Filesize

                174KB

                MD5

                0348b00e004f4d4ec2568841dc93bbf5

                SHA1

                953b0cb07dc5bffc5800b615f5fffe49e0819507

                SHA256

                1c66859650ff0f6172f9642318493831b1d2fa16332e68a042051dc83143cba1

                SHA512

                019e4e2f175974103ca972f60a645f6636028a98d3c454605e8be7c70cd80933ea5c4a9e66af45705de221a2a52861f8e45545c6325f5c0ce5647e94f87dcc4c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n3793436.exe

                Filesize

                174KB

                MD5

                0348b00e004f4d4ec2568841dc93bbf5

                SHA1

                953b0cb07dc5bffc5800b615f5fffe49e0819507

                SHA256

                1c66859650ff0f6172f9642318493831b1d2fa16332e68a042051dc83143cba1

                SHA512

                019e4e2f175974103ca972f60a645f6636028a98d3c454605e8be7c70cd80933ea5c4a9e66af45705de221a2a52861f8e45545c6325f5c0ce5647e94f87dcc4c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y3663832.exe

                Filesize

                319KB

                MD5

                84101162ae977a23e125ae98738c761f

                SHA1

                f38d2cd923bacb391d937d2ff0ba60765a77bc4b

                SHA256

                8f87630a5df1d9b8e0eb54e6acdcf2f76d00a2f727cc7d5af38c763c5b1c22a9

                SHA512

                6667535ea672e00f3c991c084f1927f0c804189b72704d8356d0945507c2f29376240c7fcec4b9e081d84010fecde31ab148fab637a81e2f457d3a83699ab55f

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y3663832.exe

                Filesize

                319KB

                MD5

                84101162ae977a23e125ae98738c761f

                SHA1

                f38d2cd923bacb391d937d2ff0ba60765a77bc4b

                SHA256

                8f87630a5df1d9b8e0eb54e6acdcf2f76d00a2f727cc7d5af38c763c5b1c22a9

                SHA512

                6667535ea672e00f3c991c084f1927f0c804189b72704d8356d0945507c2f29376240c7fcec4b9e081d84010fecde31ab148fab637a81e2f457d3a83699ab55f

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3829381.exe

                Filesize

                322KB

                MD5

                bff6d23aa2b901c8074670c009388900

                SHA1

                848585cd0d5abae71bde4bc019d41320afd61d05

                SHA256

                c3a3f661384822fa286fa847b569c021eb2dd7edeb5c4be2935eed4fd28de9e0

                SHA512

                42af833c67f9f1c4bcc3c8d95c3781303cce2f5eecb51ec13d5b807de19f4d24465d9bbafa13386493c2f51fc41b1a0c4db85b23ffd5a22e632aecdcaffc1b2e

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3829381.exe

                Filesize

                322KB

                MD5

                bff6d23aa2b901c8074670c009388900

                SHA1

                848585cd0d5abae71bde4bc019d41320afd61d05

                SHA256

                c3a3f661384822fa286fa847b569c021eb2dd7edeb5c4be2935eed4fd28de9e0

                SHA512

                42af833c67f9f1c4bcc3c8d95c3781303cce2f5eecb51ec13d5b807de19f4d24465d9bbafa13386493c2f51fc41b1a0c4db85b23ffd5a22e632aecdcaffc1b2e

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m6872086.exe

                Filesize

                140KB

                MD5

                00fccba6f569c5510922a4b64e9c1e13

                SHA1

                27c4ed461fedc5474f857e3797fe8603a094622f

                SHA256

                7f90f64b33b4cd7e164d775a3e0e57a05e6e453a40d882e6e05e485331c075c7

                SHA512

                a9a279f6677e346adc7ceff84603d95f80baa5cffb849473999386db8a2baa8780a95b5c712bfe9342a7cb85d60fb5be52e9697740ff50ac155f6ea31b704a4b

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m6872086.exe

                Filesize

                140KB

                MD5

                00fccba6f569c5510922a4b64e9c1e13

                SHA1

                27c4ed461fedc5474f857e3797fe8603a094622f

                SHA256

                7f90f64b33b4cd7e164d775a3e0e57a05e6e453a40d882e6e05e485331c075c7

                SHA512

                a9a279f6677e346adc7ceff84603d95f80baa5cffb849473999386db8a2baa8780a95b5c712bfe9342a7cb85d60fb5be52e9697740ff50ac155f6ea31b704a4b

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                322KB

                MD5

                bff6d23aa2b901c8074670c009388900

                SHA1

                848585cd0d5abae71bde4bc019d41320afd61d05

                SHA256

                c3a3f661384822fa286fa847b569c021eb2dd7edeb5c4be2935eed4fd28de9e0

                SHA512

                42af833c67f9f1c4bcc3c8d95c3781303cce2f5eecb51ec13d5b807de19f4d24465d9bbafa13386493c2f51fc41b1a0c4db85b23ffd5a22e632aecdcaffc1b2e

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                322KB

                MD5

                bff6d23aa2b901c8074670c009388900

                SHA1

                848585cd0d5abae71bde4bc019d41320afd61d05

                SHA256

                c3a3f661384822fa286fa847b569c021eb2dd7edeb5c4be2935eed4fd28de9e0

                SHA512

                42af833c67f9f1c4bcc3c8d95c3781303cce2f5eecb51ec13d5b807de19f4d24465d9bbafa13386493c2f51fc41b1a0c4db85b23ffd5a22e632aecdcaffc1b2e

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                322KB

                MD5

                bff6d23aa2b901c8074670c009388900

                SHA1

                848585cd0d5abae71bde4bc019d41320afd61d05

                SHA256

                c3a3f661384822fa286fa847b569c021eb2dd7edeb5c4be2935eed4fd28de9e0

                SHA512

                42af833c67f9f1c4bcc3c8d95c3781303cce2f5eecb51ec13d5b807de19f4d24465d9bbafa13386493c2f51fc41b1a0c4db85b23ffd5a22e632aecdcaffc1b2e

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                322KB

                MD5

                bff6d23aa2b901c8074670c009388900

                SHA1

                848585cd0d5abae71bde4bc019d41320afd61d05

                SHA256

                c3a3f661384822fa286fa847b569c021eb2dd7edeb5c4be2935eed4fd28de9e0

                SHA512

                42af833c67f9f1c4bcc3c8d95c3781303cce2f5eecb51ec13d5b807de19f4d24465d9bbafa13386493c2f51fc41b1a0c4db85b23ffd5a22e632aecdcaffc1b2e

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                322KB

                MD5

                bff6d23aa2b901c8074670c009388900

                SHA1

                848585cd0d5abae71bde4bc019d41320afd61d05

                SHA256

                c3a3f661384822fa286fa847b569c021eb2dd7edeb5c4be2935eed4fd28de9e0

                SHA512

                42af833c67f9f1c4bcc3c8d95c3781303cce2f5eecb51ec13d5b807de19f4d24465d9bbafa13386493c2f51fc41b1a0c4db85b23ffd5a22e632aecdcaffc1b2e

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                374bfdcfcf19f4edfe949022092848d2

                SHA1

                df5ee40497e98efcfba30012452d433373d287d4

                SHA256

                224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f

                SHA512

                bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • memory/4808-40-0x0000000000500000-0x0000000000530000-memory.dmp

                Filesize

                192KB

              • memory/4808-47-0x0000000004F20000-0x0000000004F6B000-memory.dmp

                Filesize

                300KB

              • memory/4808-46-0x0000000004EA0000-0x0000000004EDE000-memory.dmp

                Filesize

                248KB

              • memory/4808-49-0x0000000071B00000-0x00000000721EE000-memory.dmp

                Filesize

                6.9MB

              • memory/4808-45-0x00000000048D0000-0x00000000048E2000-memory.dmp

                Filesize

                72KB

              • memory/4808-44-0x0000000005030000-0x000000000513A000-memory.dmp

                Filesize

                1.0MB

              • memory/4808-43-0x0000000005530000-0x0000000005B36000-memory.dmp

                Filesize

                6.0MB

              • memory/4808-42-0x0000000000E20000-0x0000000000E26000-memory.dmp

                Filesize

                24KB

              • memory/4808-41-0x0000000071B00000-0x00000000721EE000-memory.dmp

                Filesize

                6.9MB