Analysis

  • max time kernel
    140s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230824-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/08/2023, 06:27

General

  • Target

    225cfc7d434959d454dade94723adb9b68d015035fca6adeec4770f844faa2a0.exe

  • Size

    1.4MB

  • MD5

    71a98b876751a82463647ad1b1472fc9

  • SHA1

    c932d3d99171b8e2e4f0a43be935f96da72a39a6

  • SHA256

    225cfc7d434959d454dade94723adb9b68d015035fca6adeec4770f844faa2a0

  • SHA512

    f94b3c5e69c72a0a4966079f80c607b4131884f5c6c9c11ab8a7654448870e775f7b5d46b40f3023dd930a8260baa2eb96d727e6193b2e36db3f49d8d3816d39

  • SSDEEP

    24576:iyqyWc6kvuMMHXLNHKMInCVJg+OrrBRd2YdfM82YyoH74YULEj+7q0ElbEqNf/s:JqveM3BKMInfVfM82voH4LEkqndE0

Malware Config

Extracted

Family

amadey

Version

3.87

C2

77.91.68.18/nice/index.php

Extracted

Family

redline

Botnet

stas

C2

77.91.124.82:19071

Attributes
  • auth_value

    db6d96c4eade05afc28c31d9ad73a73c

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\225cfc7d434959d454dade94723adb9b68d015035fca6adeec4770f844faa2a0.exe
    "C:\Users\Admin\AppData\Local\Temp\225cfc7d434959d454dade94723adb9b68d015035fca6adeec4770f844faa2a0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3836
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6992191.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6992191.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:468
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7181804.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7181804.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:216
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y9194599.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y9194599.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3188
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l1290807.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l1290807.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3396
            • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
              "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:3392
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:4000
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2556
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:3288
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "saves.exe" /P "Admin:N"
                    8⤵
                      PID:3872
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "saves.exe" /P "Admin:R" /E
                      8⤵
                        PID:4936
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:4576
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\b40d11255d" /P "Admin:N"
                          8⤵
                            PID:5020
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\b40d11255d" /P "Admin:R" /E
                            8⤵
                              PID:4628
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:1188
                      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m1189720.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m1189720.exe
                        5⤵
                        • Executes dropped EXE
                        PID:3064
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n3858676.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n3858676.exe
                      4⤵
                      • Executes dropped EXE
                      PID:2720
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:380
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:4376

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6992191.exe

                Filesize

                1.3MB

                MD5

                d06fc565bc2a0d7733fb1a2da81fb15f

                SHA1

                7a074bcdbf2ecd75d88ad01c8d08390cab110806

                SHA256

                527c5526593eefc1655965f68367609ec2a1a8e03523107c5bdd265954456574

                SHA512

                08715d64ce6b223464f365d551a008662ab986869b6cba55b6c81ab7c99de00c06a75a927285c19e3445ca5c6fca11102edd5dde5e8863442e8b083733a020b0

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6992191.exe

                Filesize

                1.3MB

                MD5

                d06fc565bc2a0d7733fb1a2da81fb15f

                SHA1

                7a074bcdbf2ecd75d88ad01c8d08390cab110806

                SHA256

                527c5526593eefc1655965f68367609ec2a1a8e03523107c5bdd265954456574

                SHA512

                08715d64ce6b223464f365d551a008662ab986869b6cba55b6c81ab7c99de00c06a75a927285c19e3445ca5c6fca11102edd5dde5e8863442e8b083733a020b0

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7181804.exe

                Filesize

                475KB

                MD5

                3abbdbacfa67d7aef651f9ceed878b16

                SHA1

                136b27a60dc8910a465541f0c5ab43f48e1c5743

                SHA256

                94cff53a3b97c7e159e1688ae0d28765116ff48232fef1a05dc8b62d28f4f738

                SHA512

                a1e3bbc7f3b7271380163d9af1af2b2b840a4a8933f7e264ffd2db80d5957ba085359c70dad7eb1843aaee3914861886347db050dbd5ab1c92ec099c0453a3f6

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7181804.exe

                Filesize

                475KB

                MD5

                3abbdbacfa67d7aef651f9ceed878b16

                SHA1

                136b27a60dc8910a465541f0c5ab43f48e1c5743

                SHA256

                94cff53a3b97c7e159e1688ae0d28765116ff48232fef1a05dc8b62d28f4f738

                SHA512

                a1e3bbc7f3b7271380163d9af1af2b2b840a4a8933f7e264ffd2db80d5957ba085359c70dad7eb1843aaee3914861886347db050dbd5ab1c92ec099c0453a3f6

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n3858676.exe

                Filesize

                174KB

                MD5

                6ea3296aa2e719ba9764b5d1288772cf

                SHA1

                2e9f94ee7de35ac5cc0d7f318975c4f42a204bf3

                SHA256

                680e2f0e04eeac44b64a2c990f052da16d901f74e97432a72190a3426f6325a0

                SHA512

                84f015b09dae0134a1f8e198b06e25a86eda38014356c6c1f5ff67d4419ddcc0b7f2eae888eda19d62bdefed03208f52091297cc9afc1731d72beea1d42207cc

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n3858676.exe

                Filesize

                174KB

                MD5

                6ea3296aa2e719ba9764b5d1288772cf

                SHA1

                2e9f94ee7de35ac5cc0d7f318975c4f42a204bf3

                SHA256

                680e2f0e04eeac44b64a2c990f052da16d901f74e97432a72190a3426f6325a0

                SHA512

                84f015b09dae0134a1f8e198b06e25a86eda38014356c6c1f5ff67d4419ddcc0b7f2eae888eda19d62bdefed03208f52091297cc9afc1731d72beea1d42207cc

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y9194599.exe

                Filesize

                320KB

                MD5

                31186a3b4ad0a969165ce9808b76bc2d

                SHA1

                793869b4deb0e945c0ffbd30aaff238ac27598b6

                SHA256

                6c25afbc3797343a2171f0c4cf68d74c32647b07f3b147c1efa653327705f618

                SHA512

                827b8cd0382520e0e3d70c32ffc8b824a24895a6d2b04e3e2efc2af541f20564a27ccfb4f5df45b701608b87a575c13422bd050b78116e230d8cdac68fd51d08

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y9194599.exe

                Filesize

                320KB

                MD5

                31186a3b4ad0a969165ce9808b76bc2d

                SHA1

                793869b4deb0e945c0ffbd30aaff238ac27598b6

                SHA256

                6c25afbc3797343a2171f0c4cf68d74c32647b07f3b147c1efa653327705f618

                SHA512

                827b8cd0382520e0e3d70c32ffc8b824a24895a6d2b04e3e2efc2af541f20564a27ccfb4f5df45b701608b87a575c13422bd050b78116e230d8cdac68fd51d08

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l1290807.exe

                Filesize

                323KB

                MD5

                05a25f21b5c0c6560753392ad3bfbe53

                SHA1

                d129b34deda98decc3ef3abc78d3e5499d5a9233

                SHA256

                42305ffff135c8bd947ee97c9b8e07fd3627256d4a15ed41d444f61c52be359c

                SHA512

                94e9b6348ffa561e9f59fce8193eff1e729f28306dab822349202f213cff1623f7cb6878ebd223bc14d8844c579a8ce8ed0531adcaf5f798f8c69b5ca6966b72

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l1290807.exe

                Filesize

                323KB

                MD5

                05a25f21b5c0c6560753392ad3bfbe53

                SHA1

                d129b34deda98decc3ef3abc78d3e5499d5a9233

                SHA256

                42305ffff135c8bd947ee97c9b8e07fd3627256d4a15ed41d444f61c52be359c

                SHA512

                94e9b6348ffa561e9f59fce8193eff1e729f28306dab822349202f213cff1623f7cb6878ebd223bc14d8844c579a8ce8ed0531adcaf5f798f8c69b5ca6966b72

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m1189720.exe

                Filesize

                140KB

                MD5

                b88af9c3a1d5655116c34ec796b109de

                SHA1

                318f41e9de7f5f92f2fdd2ec1f2141066948bc9e

                SHA256

                21210c8c43c2d9c65db22fbf0103fca3f64e35f6a2977996d004e6865fcfe5e9

                SHA512

                6a6834115e054e21d08dad154bf766778293f6cf47bf122842aa2ac89a69ce2f521d3ac80ba4eb3354900f9af723d8f0ed4dfa6b053d642e4b9dcecba9120b6f

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m1189720.exe

                Filesize

                140KB

                MD5

                b88af9c3a1d5655116c34ec796b109de

                SHA1

                318f41e9de7f5f92f2fdd2ec1f2141066948bc9e

                SHA256

                21210c8c43c2d9c65db22fbf0103fca3f64e35f6a2977996d004e6865fcfe5e9

                SHA512

                6a6834115e054e21d08dad154bf766778293f6cf47bf122842aa2ac89a69ce2f521d3ac80ba4eb3354900f9af723d8f0ed4dfa6b053d642e4b9dcecba9120b6f

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                323KB

                MD5

                05a25f21b5c0c6560753392ad3bfbe53

                SHA1

                d129b34deda98decc3ef3abc78d3e5499d5a9233

                SHA256

                42305ffff135c8bd947ee97c9b8e07fd3627256d4a15ed41d444f61c52be359c

                SHA512

                94e9b6348ffa561e9f59fce8193eff1e729f28306dab822349202f213cff1623f7cb6878ebd223bc14d8844c579a8ce8ed0531adcaf5f798f8c69b5ca6966b72

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                323KB

                MD5

                05a25f21b5c0c6560753392ad3bfbe53

                SHA1

                d129b34deda98decc3ef3abc78d3e5499d5a9233

                SHA256

                42305ffff135c8bd947ee97c9b8e07fd3627256d4a15ed41d444f61c52be359c

                SHA512

                94e9b6348ffa561e9f59fce8193eff1e729f28306dab822349202f213cff1623f7cb6878ebd223bc14d8844c579a8ce8ed0531adcaf5f798f8c69b5ca6966b72

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                323KB

                MD5

                05a25f21b5c0c6560753392ad3bfbe53

                SHA1

                d129b34deda98decc3ef3abc78d3e5499d5a9233

                SHA256

                42305ffff135c8bd947ee97c9b8e07fd3627256d4a15ed41d444f61c52be359c

                SHA512

                94e9b6348ffa561e9f59fce8193eff1e729f28306dab822349202f213cff1623f7cb6878ebd223bc14d8844c579a8ce8ed0531adcaf5f798f8c69b5ca6966b72

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                323KB

                MD5

                05a25f21b5c0c6560753392ad3bfbe53

                SHA1

                d129b34deda98decc3ef3abc78d3e5499d5a9233

                SHA256

                42305ffff135c8bd947ee97c9b8e07fd3627256d4a15ed41d444f61c52be359c

                SHA512

                94e9b6348ffa561e9f59fce8193eff1e729f28306dab822349202f213cff1623f7cb6878ebd223bc14d8844c579a8ce8ed0531adcaf5f798f8c69b5ca6966b72

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                323KB

                MD5

                05a25f21b5c0c6560753392ad3bfbe53

                SHA1

                d129b34deda98decc3ef3abc78d3e5499d5a9233

                SHA256

                42305ffff135c8bd947ee97c9b8e07fd3627256d4a15ed41d444f61c52be359c

                SHA512

                94e9b6348ffa561e9f59fce8193eff1e729f28306dab822349202f213cff1623f7cb6878ebd223bc14d8844c579a8ce8ed0531adcaf5f798f8c69b5ca6966b72

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                374bfdcfcf19f4edfe949022092848d2

                SHA1

                df5ee40497e98efcfba30012452d433373d287d4

                SHA256

                224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f

                SHA512

                bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7

              • memory/2720-43-0x0000000072700000-0x0000000072EB0000-memory.dmp

                Filesize

                7.7MB

              • memory/2720-50-0x0000000072700000-0x0000000072EB0000-memory.dmp

                Filesize

                7.7MB

              • memory/2720-51-0x0000000005870000-0x0000000005880000-memory.dmp

                Filesize

                64KB

              • memory/2720-49-0x000000000ADC0000-0x000000000ADFC000-memory.dmp

                Filesize

                240KB

              • memory/2720-48-0x000000000AD60000-0x000000000AD72000-memory.dmp

                Filesize

                72KB

              • memory/2720-47-0x0000000005870000-0x0000000005880000-memory.dmp

                Filesize

                64KB

              • memory/2720-46-0x000000000AE20000-0x000000000AF2A000-memory.dmp

                Filesize

                1.0MB

              • memory/2720-45-0x000000000B320000-0x000000000B938000-memory.dmp

                Filesize

                6.1MB

              • memory/2720-44-0x0000000000E80000-0x0000000000EB0000-memory.dmp

                Filesize

                192KB