Analysis

  • max time kernel
    144s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-08-2023 16:14

General

  • Target

    cf05322ce286ba24b887366a6ff4de031a1558573e0363296d1b8ed16146e4b9.exe

  • Size

    1.4MB

  • MD5

    2786e6a41c8a8a3a5e93a884746acfba

  • SHA1

    edc12c114183401f5d17b87fb99913f165d6dc55

  • SHA256

    cf05322ce286ba24b887366a6ff4de031a1558573e0363296d1b8ed16146e4b9

  • SHA512

    152380b8b0d04f899f59e32bbca5740fd9f2353416cd145e8b0b1be9139661eaac651dd8677459c84269e75c1b79ef515f45d99ae713a5038ae07035ff3e94c1

  • SSDEEP

    24576:Uy1Vq346+d/UqWZiB7KnT/oAnr2h8qa6WRx48jpHSP0DFKlY7mZ0Gyvle7:j1V3rdcqEw7KnT/EhvOx4GlS1Cdvle

Malware Config

Extracted

Family

amadey

Version

3.87

C2

77.91.68.18/nice/index.php

Extracted

Family

redline

Botnet

stas

C2

77.91.124.82:19071

Attributes
  • auth_value

    db6d96c4eade05afc28c31d9ad73a73c

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf05322ce286ba24b887366a6ff4de031a1558573e0363296d1b8ed16146e4b9.exe
    "C:\Users\Admin\AppData\Local\Temp\cf05322ce286ba24b887366a6ff4de031a1558573e0363296d1b8ed16146e4b9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1764
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2967307.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2967307.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4464
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8337723.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8337723.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3988
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y5715847.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y5715847.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3016
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3775376.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3775376.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1564
            • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
              "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:3124
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:2644
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:4824
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:4732
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "saves.exe" /P "Admin:N"
                    8⤵
                      PID:2076
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "saves.exe" /P "Admin:R" /E
                      8⤵
                        PID:4580
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:4496
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\b40d11255d" /P "Admin:N"
                          8⤵
                            PID:228
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\b40d11255d" /P "Admin:R" /E
                            8⤵
                              PID:3896
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:1788
                      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m6796390.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m6796390.exe
                        5⤵
                        • Executes dropped EXE
                        PID:4736
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n2325339.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n2325339.exe
                      4⤵
                      • Executes dropped EXE
                      PID:4304
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:3788
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:2796
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:2232

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2967307.exe

                Filesize

                1.3MB

                MD5

                044c830661e0e761b6b0eca859447430

                SHA1

                719a65dc83bdc192bfc8c0a965a464247e6ee3b1

                SHA256

                a46fa3b424e623fd4c475adbd2357188edf4db52908ee09ffdebbb11dd9967a0

                SHA512

                7889c7dbb68fe6eb5fb9147dea07fa401eb7a670d70a9c751bb105a5c2a626224397e157dbeb473b9b24a5feb281c8f99bede13f7baa125e4fa238f9b18f6eb3

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2967307.exe

                Filesize

                1.3MB

                MD5

                044c830661e0e761b6b0eca859447430

                SHA1

                719a65dc83bdc192bfc8c0a965a464247e6ee3b1

                SHA256

                a46fa3b424e623fd4c475adbd2357188edf4db52908ee09ffdebbb11dd9967a0

                SHA512

                7889c7dbb68fe6eb5fb9147dea07fa401eb7a670d70a9c751bb105a5c2a626224397e157dbeb473b9b24a5feb281c8f99bede13f7baa125e4fa238f9b18f6eb3

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8337723.exe

                Filesize

                475KB

                MD5

                8cd086fee19c931c3146d4ea3e2466c8

                SHA1

                7a8f3c17f53156e6b2bfe28ba340e083555542f1

                SHA256

                347d98be0806ad8d55ab13a45f52698e6e5b79ce510a14d479d9e5a185d43d42

                SHA512

                a775cd44f13d9cfea571c3c284b8ca4b5358ddcfd2204700a08edcf3936e9a09e27fe15fb8f48ac6cd94aa571ce7751779464fcabc450dba380c1631ee55be25

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8337723.exe

                Filesize

                475KB

                MD5

                8cd086fee19c931c3146d4ea3e2466c8

                SHA1

                7a8f3c17f53156e6b2bfe28ba340e083555542f1

                SHA256

                347d98be0806ad8d55ab13a45f52698e6e5b79ce510a14d479d9e5a185d43d42

                SHA512

                a775cd44f13d9cfea571c3c284b8ca4b5358ddcfd2204700a08edcf3936e9a09e27fe15fb8f48ac6cd94aa571ce7751779464fcabc450dba380c1631ee55be25

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n2325339.exe

                Filesize

                174KB

                MD5

                49a4bada65dc1e66e5a266743ad5cb32

                SHA1

                c616095d74ff82b7f77a5650c3b5a6b219b85b50

                SHA256

                d6583f85d6833afb0c6fc91d9e61f21086630e415885acd78c75fce59170f5c1

                SHA512

                79c14f33122a6b76e0e4b7ae73085230983f36dd927ae2d8e8231f360e0117928b779da0e3c7ec0227f33ffd09ea4cc5ae63464ad59dabdcaba498ab52b12a09

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n2325339.exe

                Filesize

                174KB

                MD5

                49a4bada65dc1e66e5a266743ad5cb32

                SHA1

                c616095d74ff82b7f77a5650c3b5a6b219b85b50

                SHA256

                d6583f85d6833afb0c6fc91d9e61f21086630e415885acd78c75fce59170f5c1

                SHA512

                79c14f33122a6b76e0e4b7ae73085230983f36dd927ae2d8e8231f360e0117928b779da0e3c7ec0227f33ffd09ea4cc5ae63464ad59dabdcaba498ab52b12a09

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y5715847.exe

                Filesize

                320KB

                MD5

                7920d786c3af44657b3648dbd595a217

                SHA1

                40da3984889322c5e0164dc3180b9375a9a1be91

                SHA256

                a03eb5524e88bd701ebdacf71f4eb2b99a68b475f4f32481b20059ac623084d2

                SHA512

                dcb2958976c2f015f6cda08ad328ce9717d57311b5e45364ecfb9ee8b5b53f327216db920ae96bea87aee01947b9e10e5f4e2dd5f4a6a5d7cd3be55c75a0efa2

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y5715847.exe

                Filesize

                320KB

                MD5

                7920d786c3af44657b3648dbd595a217

                SHA1

                40da3984889322c5e0164dc3180b9375a9a1be91

                SHA256

                a03eb5524e88bd701ebdacf71f4eb2b99a68b475f4f32481b20059ac623084d2

                SHA512

                dcb2958976c2f015f6cda08ad328ce9717d57311b5e45364ecfb9ee8b5b53f327216db920ae96bea87aee01947b9e10e5f4e2dd5f4a6a5d7cd3be55c75a0efa2

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3775376.exe

                Filesize

                324KB

                MD5

                a9b6c3d69dd09c11f5fa688843d49d7d

                SHA1

                0ff25ca46f756eb9adb97d989e21603b7f0d9a4c

                SHA256

                db781daa2db86984240770cad93946c0b82d6962256a816e75d0d36f4e8d707a

                SHA512

                13d318d66b61b142eb9489af791ed6a580cafb85ad31c24f96c4375ee26e542b601b8140ff62ae5f7b211231c3b94ad25ed129c3d19a7f90053a5e604aa8dead

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3775376.exe

                Filesize

                324KB

                MD5

                a9b6c3d69dd09c11f5fa688843d49d7d

                SHA1

                0ff25ca46f756eb9adb97d989e21603b7f0d9a4c

                SHA256

                db781daa2db86984240770cad93946c0b82d6962256a816e75d0d36f4e8d707a

                SHA512

                13d318d66b61b142eb9489af791ed6a580cafb85ad31c24f96c4375ee26e542b601b8140ff62ae5f7b211231c3b94ad25ed129c3d19a7f90053a5e604aa8dead

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m6796390.exe

                Filesize

                140KB

                MD5

                6564a432b20d8618af0d4b3d9ae9c3f9

                SHA1

                f2ee9bed6af86f463ac83e5619797404f34b725b

                SHA256

                0bdc51093b7277c1d8d772388f6bcd084e78963d9c2932b711469993ae8118f7

                SHA512

                444f204ca246bf37e97e6d679c495e0b3029b6b8c8378bc4d4f8828d1ab409ca9ec9f0def12b20c90c655bfaff7349f54453a981cf713e1cbbf8b191a94d4c50

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m6796390.exe

                Filesize

                140KB

                MD5

                6564a432b20d8618af0d4b3d9ae9c3f9

                SHA1

                f2ee9bed6af86f463ac83e5619797404f34b725b

                SHA256

                0bdc51093b7277c1d8d772388f6bcd084e78963d9c2932b711469993ae8118f7

                SHA512

                444f204ca246bf37e97e6d679c495e0b3029b6b8c8378bc4d4f8828d1ab409ca9ec9f0def12b20c90c655bfaff7349f54453a981cf713e1cbbf8b191a94d4c50

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                324KB

                MD5

                a9b6c3d69dd09c11f5fa688843d49d7d

                SHA1

                0ff25ca46f756eb9adb97d989e21603b7f0d9a4c

                SHA256

                db781daa2db86984240770cad93946c0b82d6962256a816e75d0d36f4e8d707a

                SHA512

                13d318d66b61b142eb9489af791ed6a580cafb85ad31c24f96c4375ee26e542b601b8140ff62ae5f7b211231c3b94ad25ed129c3d19a7f90053a5e604aa8dead

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                324KB

                MD5

                a9b6c3d69dd09c11f5fa688843d49d7d

                SHA1

                0ff25ca46f756eb9adb97d989e21603b7f0d9a4c

                SHA256

                db781daa2db86984240770cad93946c0b82d6962256a816e75d0d36f4e8d707a

                SHA512

                13d318d66b61b142eb9489af791ed6a580cafb85ad31c24f96c4375ee26e542b601b8140ff62ae5f7b211231c3b94ad25ed129c3d19a7f90053a5e604aa8dead

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                324KB

                MD5

                a9b6c3d69dd09c11f5fa688843d49d7d

                SHA1

                0ff25ca46f756eb9adb97d989e21603b7f0d9a4c

                SHA256

                db781daa2db86984240770cad93946c0b82d6962256a816e75d0d36f4e8d707a

                SHA512

                13d318d66b61b142eb9489af791ed6a580cafb85ad31c24f96c4375ee26e542b601b8140ff62ae5f7b211231c3b94ad25ed129c3d19a7f90053a5e604aa8dead

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                324KB

                MD5

                a9b6c3d69dd09c11f5fa688843d49d7d

                SHA1

                0ff25ca46f756eb9adb97d989e21603b7f0d9a4c

                SHA256

                db781daa2db86984240770cad93946c0b82d6962256a816e75d0d36f4e8d707a

                SHA512

                13d318d66b61b142eb9489af791ed6a580cafb85ad31c24f96c4375ee26e542b601b8140ff62ae5f7b211231c3b94ad25ed129c3d19a7f90053a5e604aa8dead

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                324KB

                MD5

                a9b6c3d69dd09c11f5fa688843d49d7d

                SHA1

                0ff25ca46f756eb9adb97d989e21603b7f0d9a4c

                SHA256

                db781daa2db86984240770cad93946c0b82d6962256a816e75d0d36f4e8d707a

                SHA512

                13d318d66b61b142eb9489af791ed6a580cafb85ad31c24f96c4375ee26e542b601b8140ff62ae5f7b211231c3b94ad25ed129c3d19a7f90053a5e604aa8dead

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                324KB

                MD5

                a9b6c3d69dd09c11f5fa688843d49d7d

                SHA1

                0ff25ca46f756eb9adb97d989e21603b7f0d9a4c

                SHA256

                db781daa2db86984240770cad93946c0b82d6962256a816e75d0d36f4e8d707a

                SHA512

                13d318d66b61b142eb9489af791ed6a580cafb85ad31c24f96c4375ee26e542b601b8140ff62ae5f7b211231c3b94ad25ed129c3d19a7f90053a5e604aa8dead

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                374bfdcfcf19f4edfe949022092848d2

                SHA1

                df5ee40497e98efcfba30012452d433373d287d4

                SHA256

                224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f

                SHA512

                bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7

              • memory/4304-59-0x0000000005B00000-0x0000000006118000-memory.dmp

                Filesize

                6.1MB

              • memory/4304-60-0x00000000055F0000-0x00000000056FA000-memory.dmp

                Filesize

                1.0MB

              • memory/4304-61-0x00000000054D0000-0x00000000054E0000-memory.dmp

                Filesize

                64KB

              • memory/4304-62-0x0000000005480000-0x0000000005492000-memory.dmp

                Filesize

                72KB

              • memory/4304-63-0x0000000005520000-0x000000000555C000-memory.dmp

                Filesize

                240KB

              • memory/4304-57-0x00000000009C0000-0x00000000009F0000-memory.dmp

                Filesize

                192KB

              • memory/4304-65-0x0000000072B20000-0x00000000732D0000-memory.dmp

                Filesize

                7.7MB

              • memory/4304-66-0x00000000054D0000-0x00000000054E0000-memory.dmp

                Filesize

                64KB

              • memory/4304-58-0x0000000072B20000-0x00000000732D0000-memory.dmp

                Filesize

                7.7MB