Analysis

  • max time kernel
    140s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/08/2023, 03:57

General

  • Target

    8887ed6afcb734719bbdb27c896daf8fad6053610792dffc3521b8e6c18a4078.exe

  • Size

    1.4MB

  • MD5

    ff195a3b66ced613743f5892d1275d2b

  • SHA1

    75613125d04a6108396645c31dfe6acb51bfaa92

  • SHA256

    8887ed6afcb734719bbdb27c896daf8fad6053610792dffc3521b8e6c18a4078

  • SHA512

    e3addf652fa316acb414418bcc92570e888f2a63f48d43b5331fd85c2ea815684324d6311f2792aeb42ef3e43bb7c610595ccb48af034cd8098bb65e02e2484e

  • SSDEEP

    24576:Ryy27kNDChwtleXzYUVOKMEhNBQfkd5rJg4sJnRJuUSZA/kGeVS4fRyyqsh3hN57:E78iwtleXzRsKMEhNmcd5rJ6nfKJzHWG

Malware Config

Extracted

Family

amadey

Version

3.87

C2

77.91.68.18/nice/index.php

Extracted

Family

redline

Botnet

stas

C2

77.91.124.82:19071

Attributes
  • auth_value

    db6d96c4eade05afc28c31d9ad73a73c

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8887ed6afcb734719bbdb27c896daf8fad6053610792dffc3521b8e6c18a4078.exe
    "C:\Users\Admin\AppData\Local\Temp\8887ed6afcb734719bbdb27c896daf8fad6053610792dffc3521b8e6c18a4078.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1412
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1938265.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1938265.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3768
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6024484.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6024484.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4884
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y4257010.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y4257010.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4644
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l0586353.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l0586353.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4340
            • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
              "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:4648
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:5116
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:684
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:924
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "saves.exe" /P "Admin:N"
                    8⤵
                      PID:728
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "saves.exe" /P "Admin:R" /E
                      8⤵
                        PID:3796
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:1592
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\b40d11255d" /P "Admin:N"
                          8⤵
                            PID:1032
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\b40d11255d" /P "Admin:R" /E
                            8⤵
                              PID:3096
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:2276
                      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m3143299.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m3143299.exe
                        5⤵
                        • Executes dropped EXE
                        PID:4640
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n0284339.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n0284339.exe
                      4⤵
                      • Executes dropped EXE
                      PID:2708

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1938265.exe

                Filesize

                1.3MB

                MD5

                ec7a0574128a25db6b2fbc6e2533864c

                SHA1

                c907ce9c1a5bdc73bd076ddafdc5c7cc670e90e8

                SHA256

                e8db60a11afaa9dfb11729063bf49f799803296f952285b41ea05eb1cd43bde2

                SHA512

                1d309ac34f94803554ce0e182b11e626edaff0525a4b6774f7013f8e2b7db1ea43db30901237cb682c420101cf30efe8020d26ac5670efb683562a2269a5ec50

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1938265.exe

                Filesize

                1.3MB

                MD5

                ec7a0574128a25db6b2fbc6e2533864c

                SHA1

                c907ce9c1a5bdc73bd076ddafdc5c7cc670e90e8

                SHA256

                e8db60a11afaa9dfb11729063bf49f799803296f952285b41ea05eb1cd43bde2

                SHA512

                1d309ac34f94803554ce0e182b11e626edaff0525a4b6774f7013f8e2b7db1ea43db30901237cb682c420101cf30efe8020d26ac5670efb683562a2269a5ec50

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6024484.exe

                Filesize

                475KB

                MD5

                460630d2e00cde5ccb9fa160892fea9d

                SHA1

                7498b0acd8bade267f91fdb2d4f464f2bca54fb4

                SHA256

                76272a793d67e7a7d530e38ca1f4e8084b8fcbfe7140d6137ea9db278651e4d0

                SHA512

                da43640d01facd3a9fb1949eeb7284293f0fdebad357cb86e00f90f54a63302d3a3a5b4e46a84a7203443fa3097791936048bfd727a23a7d0b5dace0036808e5

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6024484.exe

                Filesize

                475KB

                MD5

                460630d2e00cde5ccb9fa160892fea9d

                SHA1

                7498b0acd8bade267f91fdb2d4f464f2bca54fb4

                SHA256

                76272a793d67e7a7d530e38ca1f4e8084b8fcbfe7140d6137ea9db278651e4d0

                SHA512

                da43640d01facd3a9fb1949eeb7284293f0fdebad357cb86e00f90f54a63302d3a3a5b4e46a84a7203443fa3097791936048bfd727a23a7d0b5dace0036808e5

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n0284339.exe

                Filesize

                174KB

                MD5

                d397d18d0890addd72ef8c55ecde6fcf

                SHA1

                17dcd92f8b92e49531c25356a4fd08ffba234a26

                SHA256

                f8b5328054fcc136596967bf880a33aef8a3a6b1f04e2797ad84cd9d21b9c1af

                SHA512

                ecffeff61f8490115494b10c99b5aef9c7bfd1ce8324b172bfa09a9e082723fb3a937601aba48f33023f929d4dd84661550435f001ef10e00421abe27c939b9c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n0284339.exe

                Filesize

                174KB

                MD5

                d397d18d0890addd72ef8c55ecde6fcf

                SHA1

                17dcd92f8b92e49531c25356a4fd08ffba234a26

                SHA256

                f8b5328054fcc136596967bf880a33aef8a3a6b1f04e2797ad84cd9d21b9c1af

                SHA512

                ecffeff61f8490115494b10c99b5aef9c7bfd1ce8324b172bfa09a9e082723fb3a937601aba48f33023f929d4dd84661550435f001ef10e00421abe27c939b9c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y4257010.exe

                Filesize

                320KB

                MD5

                3742401f7622a93eff8be323a0312b03

                SHA1

                3aad3e179d7f8d1c70a8c1c6ca21e81b500aea14

                SHA256

                6d6754577604fb65647703e79134440b228bb607487c2dc0a5e4ddbf2b3c8c6f

                SHA512

                264449766d73687ace459bf5db79e9dbad58363553679607aa4d1f30d0ff61496160ffaebe097fd0ad0662902900cd56c7607dbd749dedac33306d4852f99ce9

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y4257010.exe

                Filesize

                320KB

                MD5

                3742401f7622a93eff8be323a0312b03

                SHA1

                3aad3e179d7f8d1c70a8c1c6ca21e81b500aea14

                SHA256

                6d6754577604fb65647703e79134440b228bb607487c2dc0a5e4ddbf2b3c8c6f

                SHA512

                264449766d73687ace459bf5db79e9dbad58363553679607aa4d1f30d0ff61496160ffaebe097fd0ad0662902900cd56c7607dbd749dedac33306d4852f99ce9

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l0586353.exe

                Filesize

                323KB

                MD5

                a86d39de07e0c8e1b4f24f1c4b1b8cfb

                SHA1

                8ddaceb33b1c3d175b9bd7c98408491a683c843c

                SHA256

                bf45124895f6fec0155252c5e22d7f7578d308c4949ff8680f92c5e1a9ee61f9

                SHA512

                f70f2e66dabab9fa193c544b51f1922161b0a6746a6e84146e7f9af67234dab52943088219eb75e0716c9fd282e82c9f887739755bfff4d8780b9ba043f3c4e2

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l0586353.exe

                Filesize

                323KB

                MD5

                a86d39de07e0c8e1b4f24f1c4b1b8cfb

                SHA1

                8ddaceb33b1c3d175b9bd7c98408491a683c843c

                SHA256

                bf45124895f6fec0155252c5e22d7f7578d308c4949ff8680f92c5e1a9ee61f9

                SHA512

                f70f2e66dabab9fa193c544b51f1922161b0a6746a6e84146e7f9af67234dab52943088219eb75e0716c9fd282e82c9f887739755bfff4d8780b9ba043f3c4e2

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m3143299.exe

                Filesize

                140KB

                MD5

                ec8593c38de90cd605c47576eeae76da

                SHA1

                7d6613303815903e1f8290cf6e7138435381ef84

                SHA256

                16d82a7ec3a762af5a95506c067adcf76896a5ffa3d57c48af9a6df2b06c08aa

                SHA512

                ad753bf2c5782e5039023238bdff23031c0c3644c330039b5934e6b0efbef8858e4005b45078cddafd935c886c918af7a1d1141a0176fc6fde1297457966c0c3

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m3143299.exe

                Filesize

                140KB

                MD5

                ec8593c38de90cd605c47576eeae76da

                SHA1

                7d6613303815903e1f8290cf6e7138435381ef84

                SHA256

                16d82a7ec3a762af5a95506c067adcf76896a5ffa3d57c48af9a6df2b06c08aa

                SHA512

                ad753bf2c5782e5039023238bdff23031c0c3644c330039b5934e6b0efbef8858e4005b45078cddafd935c886c918af7a1d1141a0176fc6fde1297457966c0c3

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                323KB

                MD5

                a86d39de07e0c8e1b4f24f1c4b1b8cfb

                SHA1

                8ddaceb33b1c3d175b9bd7c98408491a683c843c

                SHA256

                bf45124895f6fec0155252c5e22d7f7578d308c4949ff8680f92c5e1a9ee61f9

                SHA512

                f70f2e66dabab9fa193c544b51f1922161b0a6746a6e84146e7f9af67234dab52943088219eb75e0716c9fd282e82c9f887739755bfff4d8780b9ba043f3c4e2

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                323KB

                MD5

                a86d39de07e0c8e1b4f24f1c4b1b8cfb

                SHA1

                8ddaceb33b1c3d175b9bd7c98408491a683c843c

                SHA256

                bf45124895f6fec0155252c5e22d7f7578d308c4949ff8680f92c5e1a9ee61f9

                SHA512

                f70f2e66dabab9fa193c544b51f1922161b0a6746a6e84146e7f9af67234dab52943088219eb75e0716c9fd282e82c9f887739755bfff4d8780b9ba043f3c4e2

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                323KB

                MD5

                a86d39de07e0c8e1b4f24f1c4b1b8cfb

                SHA1

                8ddaceb33b1c3d175b9bd7c98408491a683c843c

                SHA256

                bf45124895f6fec0155252c5e22d7f7578d308c4949ff8680f92c5e1a9ee61f9

                SHA512

                f70f2e66dabab9fa193c544b51f1922161b0a6746a6e84146e7f9af67234dab52943088219eb75e0716c9fd282e82c9f887739755bfff4d8780b9ba043f3c4e2

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                374bfdcfcf19f4edfe949022092848d2

                SHA1

                df5ee40497e98efcfba30012452d433373d287d4

                SHA256

                224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f

                SHA512

                bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7

              • memory/2708-45-0x00000000060A0000-0x00000000066B8000-memory.dmp

                Filesize

                6.1MB

              • memory/2708-47-0x0000000005970000-0x0000000005980000-memory.dmp

                Filesize

                64KB

              • memory/2708-49-0x0000000005A80000-0x0000000005ABC000-memory.dmp

                Filesize

                240KB

              • memory/2708-50-0x0000000073570000-0x0000000073D20000-memory.dmp

                Filesize

                7.7MB

              • memory/2708-51-0x0000000005970000-0x0000000005980000-memory.dmp

                Filesize

                64KB

              • memory/2708-48-0x0000000005910000-0x0000000005922000-memory.dmp

                Filesize

                72KB

              • memory/2708-46-0x0000000005B90000-0x0000000005C9A000-memory.dmp

                Filesize

                1.0MB

              • memory/2708-44-0x0000000073570000-0x0000000073D20000-memory.dmp

                Filesize

                7.7MB

              • memory/2708-43-0x0000000000F50000-0x0000000000F80000-memory.dmp

                Filesize

                192KB