Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/08/2023, 19:55

General

  • Target

    80d3f21e74b0140db0d04babfce0b2b352fd27ba9028bb28bcae7532c891c400.exe

  • Size

    1.4MB

  • MD5

    066e578a9a9a2c63197ad8157a1d5411

  • SHA1

    11d7fce7884db6dfd8a84ea2ce9da867372a2807

  • SHA256

    80d3f21e74b0140db0d04babfce0b2b352fd27ba9028bb28bcae7532c891c400

  • SHA512

    e81eeb69f095f5e96bee256bf85254aadc647cf29746bb320e356a3976be582a01ea123bdd39bca5f377b25dc6990f4ce0f0a200ea1fd03ecdcb27c2b544000b

  • SSDEEP

    24576:9yLFjl/wzxhNl20yA96S7tdK0PhAaBW+rfinKqrdwToDIXjDIq24mZT5n85uApnk:Yhh/wFnl2y6ShdK0PhAh+rSFdFIzkqDR

Malware Config

Extracted

Family

amadey

Version

3.87

C2

77.91.68.18/nice/index.php

Extracted

Family

redline

Botnet

stas

C2

77.91.124.82:19071

Attributes
  • auth_value

    db6d96c4eade05afc28c31d9ad73a73c

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\80d3f21e74b0140db0d04babfce0b2b352fd27ba9028bb28bcae7532c891c400.exe
    "C:\Users\Admin\AppData\Local\Temp\80d3f21e74b0140db0d04babfce0b2b352fd27ba9028bb28bcae7532c891c400.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1160
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4664171.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4664171.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4764
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8992540.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8992540.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4288
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y2209421.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y2209421.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1292
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l0550526.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l0550526.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4424
            • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
              "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:4128
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:4636
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1480
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "saves.exe" /P "Admin:N"
                  8⤵
                    PID:4972
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    8⤵
                      PID:3584
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "saves.exe" /P "Admin:R" /E
                      8⤵
                        PID:2692
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:2940
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\b40d11255d" /P "Admin:N"
                          8⤵
                            PID:3264
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\b40d11255d" /P "Admin:R" /E
                            8⤵
                              PID:844
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:2368
                      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m3003015.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m3003015.exe
                        5⤵
                        • Executes dropped EXE
                        PID:4072
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n5090127.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n5090127.exe
                      4⤵
                      • Executes dropped EXE
                      PID:3360
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:3476
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:3116
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:5008

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4664171.exe

                Filesize

                1.3MB

                MD5

                03dd402a48ad83832fa6b1c304d01cf5

                SHA1

                a5875b44b34fcf35ac95a3ff4d3c6492f9f06430

                SHA256

                dc0dba78a8a7777da1424f2adf8aa6b6e723f2c3014891495f504597dcb432e7

                SHA512

                d6303dd998ce50c5b7bd8f4210b5e1c5b3bc6bbc9587b10806d61d952fbc00519fb048419f8471a0497f5cc3f3a6c840ea47b4ecfc5cddcbbea32485394eb9eb

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4664171.exe

                Filesize

                1.3MB

                MD5

                03dd402a48ad83832fa6b1c304d01cf5

                SHA1

                a5875b44b34fcf35ac95a3ff4d3c6492f9f06430

                SHA256

                dc0dba78a8a7777da1424f2adf8aa6b6e723f2c3014891495f504597dcb432e7

                SHA512

                d6303dd998ce50c5b7bd8f4210b5e1c5b3bc6bbc9587b10806d61d952fbc00519fb048419f8471a0497f5cc3f3a6c840ea47b4ecfc5cddcbbea32485394eb9eb

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8992540.exe

                Filesize

                476KB

                MD5

                97a01cae9a731252aceb150da6bcb67f

                SHA1

                0514c1ef518f643364886c0b5e757f661ddceef5

                SHA256

                221b3352db2834b901f6c9b7037e287e37cdec79536ca15b90db6b2b5ead42bf

                SHA512

                5d101673d6275974cf8943ab5dba81eb9108a7342549592d09aa39648a83b50f8af291cdc8c6784cc4b4818088fedbe75d6da2dd73598da0a62c0d9800d9160d

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8992540.exe

                Filesize

                476KB

                MD5

                97a01cae9a731252aceb150da6bcb67f

                SHA1

                0514c1ef518f643364886c0b5e757f661ddceef5

                SHA256

                221b3352db2834b901f6c9b7037e287e37cdec79536ca15b90db6b2b5ead42bf

                SHA512

                5d101673d6275974cf8943ab5dba81eb9108a7342549592d09aa39648a83b50f8af291cdc8c6784cc4b4818088fedbe75d6da2dd73598da0a62c0d9800d9160d

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n5090127.exe

                Filesize

                175KB

                MD5

                4e1dd1a8e263ecdb382c8316feb5cbed

                SHA1

                7122e0448995577ddacc007a7711a7356d2d9a36

                SHA256

                b024a2772ae6a8beb033aa47e37f49ec91f7251ca170645fbbb663ef8993dfe1

                SHA512

                9ebe8328446707a933d4215d3beea0e75fcc79467fe9739c3a01fb0d9f3a4a620890108d91cd5434901c64957309bb96f071bd8cd1d8eef856bf6be0b072daf6

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n5090127.exe

                Filesize

                175KB

                MD5

                4e1dd1a8e263ecdb382c8316feb5cbed

                SHA1

                7122e0448995577ddacc007a7711a7356d2d9a36

                SHA256

                b024a2772ae6a8beb033aa47e37f49ec91f7251ca170645fbbb663ef8993dfe1

                SHA512

                9ebe8328446707a933d4215d3beea0e75fcc79467fe9739c3a01fb0d9f3a4a620890108d91cd5434901c64957309bb96f071bd8cd1d8eef856bf6be0b072daf6

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y2209421.exe

                Filesize

                320KB

                MD5

                0d533da22ca5d3c278943cea7456e124

                SHA1

                2119c9e4f1f5c3a38ee107e2a35b4f34a36f2a0c

                SHA256

                4b8f76669c69501ca4c6386c301e48b368f76d3c9de067eaf5b16aae3a084678

                SHA512

                f0d5c06a29d6732693d9c5631160f10a4ec79f09fee7b95305b7945143b5f6cec377b3ca014d222a332ee10a16768a9f7f114e29e9c3d0578976ab0924848afb

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y2209421.exe

                Filesize

                320KB

                MD5

                0d533da22ca5d3c278943cea7456e124

                SHA1

                2119c9e4f1f5c3a38ee107e2a35b4f34a36f2a0c

                SHA256

                4b8f76669c69501ca4c6386c301e48b368f76d3c9de067eaf5b16aae3a084678

                SHA512

                f0d5c06a29d6732693d9c5631160f10a4ec79f09fee7b95305b7945143b5f6cec377b3ca014d222a332ee10a16768a9f7f114e29e9c3d0578976ab0924848afb

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l0550526.exe

                Filesize

                324KB

                MD5

                c1bd2b29242b08c183a79a448e3dd623

                SHA1

                daa361f4d9eb3beba3aed516821d04e30636271f

                SHA256

                77b745807e5ef267d7e73029f18da08fe69e2e679a0aa1d74eb7d20e44f0c885

                SHA512

                22fda95c83c452af28a740db9d2ab841f0697f70188a1940447b8f69c2d8c5218dd38d8f1444e96e33fbec52d491d8e4ba72d627029234e5d2f78fa0ba422ed1

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l0550526.exe

                Filesize

                324KB

                MD5

                c1bd2b29242b08c183a79a448e3dd623

                SHA1

                daa361f4d9eb3beba3aed516821d04e30636271f

                SHA256

                77b745807e5ef267d7e73029f18da08fe69e2e679a0aa1d74eb7d20e44f0c885

                SHA512

                22fda95c83c452af28a740db9d2ab841f0697f70188a1940447b8f69c2d8c5218dd38d8f1444e96e33fbec52d491d8e4ba72d627029234e5d2f78fa0ba422ed1

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m3003015.exe

                Filesize

                140KB

                MD5

                ef370f5889cb520f8f3567f8719797e1

                SHA1

                72566ec538ff95ab5a9d95f1f8bd14395ebac2b7

                SHA256

                9f8decacd169fd252bf0e47182801e782e56d2c154ff2a616c991bd60529f467

                SHA512

                fa9eea5e8abafd076f361ef4add902939d915f71ec49ba813a01f2727ce831d7169e46a8a7bd588e273ea5128a2007f69496bcbf91eccf6ffa155531fd095129

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m3003015.exe

                Filesize

                140KB

                MD5

                ef370f5889cb520f8f3567f8719797e1

                SHA1

                72566ec538ff95ab5a9d95f1f8bd14395ebac2b7

                SHA256

                9f8decacd169fd252bf0e47182801e782e56d2c154ff2a616c991bd60529f467

                SHA512

                fa9eea5e8abafd076f361ef4add902939d915f71ec49ba813a01f2727ce831d7169e46a8a7bd588e273ea5128a2007f69496bcbf91eccf6ffa155531fd095129

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                324KB

                MD5

                c1bd2b29242b08c183a79a448e3dd623

                SHA1

                daa361f4d9eb3beba3aed516821d04e30636271f

                SHA256

                77b745807e5ef267d7e73029f18da08fe69e2e679a0aa1d74eb7d20e44f0c885

                SHA512

                22fda95c83c452af28a740db9d2ab841f0697f70188a1940447b8f69c2d8c5218dd38d8f1444e96e33fbec52d491d8e4ba72d627029234e5d2f78fa0ba422ed1

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                324KB

                MD5

                c1bd2b29242b08c183a79a448e3dd623

                SHA1

                daa361f4d9eb3beba3aed516821d04e30636271f

                SHA256

                77b745807e5ef267d7e73029f18da08fe69e2e679a0aa1d74eb7d20e44f0c885

                SHA512

                22fda95c83c452af28a740db9d2ab841f0697f70188a1940447b8f69c2d8c5218dd38d8f1444e96e33fbec52d491d8e4ba72d627029234e5d2f78fa0ba422ed1

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                324KB

                MD5

                c1bd2b29242b08c183a79a448e3dd623

                SHA1

                daa361f4d9eb3beba3aed516821d04e30636271f

                SHA256

                77b745807e5ef267d7e73029f18da08fe69e2e679a0aa1d74eb7d20e44f0c885

                SHA512

                22fda95c83c452af28a740db9d2ab841f0697f70188a1940447b8f69c2d8c5218dd38d8f1444e96e33fbec52d491d8e4ba72d627029234e5d2f78fa0ba422ed1

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                324KB

                MD5

                c1bd2b29242b08c183a79a448e3dd623

                SHA1

                daa361f4d9eb3beba3aed516821d04e30636271f

                SHA256

                77b745807e5ef267d7e73029f18da08fe69e2e679a0aa1d74eb7d20e44f0c885

                SHA512

                22fda95c83c452af28a740db9d2ab841f0697f70188a1940447b8f69c2d8c5218dd38d8f1444e96e33fbec52d491d8e4ba72d627029234e5d2f78fa0ba422ed1

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                324KB

                MD5

                c1bd2b29242b08c183a79a448e3dd623

                SHA1

                daa361f4d9eb3beba3aed516821d04e30636271f

                SHA256

                77b745807e5ef267d7e73029f18da08fe69e2e679a0aa1d74eb7d20e44f0c885

                SHA512

                22fda95c83c452af28a740db9d2ab841f0697f70188a1940447b8f69c2d8c5218dd38d8f1444e96e33fbec52d491d8e4ba72d627029234e5d2f78fa0ba422ed1

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                324KB

                MD5

                c1bd2b29242b08c183a79a448e3dd623

                SHA1

                daa361f4d9eb3beba3aed516821d04e30636271f

                SHA256

                77b745807e5ef267d7e73029f18da08fe69e2e679a0aa1d74eb7d20e44f0c885

                SHA512

                22fda95c83c452af28a740db9d2ab841f0697f70188a1940447b8f69c2d8c5218dd38d8f1444e96e33fbec52d491d8e4ba72d627029234e5d2f78fa0ba422ed1

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                374bfdcfcf19f4edfe949022092848d2

                SHA1

                df5ee40497e98efcfba30012452d433373d287d4

                SHA256

                224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f

                SHA512

                bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7

              • memory/3360-43-0x0000000000910000-0x0000000000940000-memory.dmp

                Filesize

                192KB

              • memory/3360-51-0x0000000072F00000-0x00000000736B0000-memory.dmp

                Filesize

                7.7MB

              • memory/3360-52-0x0000000005230000-0x0000000005240000-memory.dmp

                Filesize

                64KB

              • memory/3360-49-0x0000000005300000-0x000000000533C000-memory.dmp

                Filesize

                240KB

              • memory/3360-47-0x0000000005230000-0x0000000005240000-memory.dmp

                Filesize

                64KB

              • memory/3360-48-0x00000000052A0000-0x00000000052B2000-memory.dmp

                Filesize

                72KB

              • memory/3360-46-0x0000000005360000-0x000000000546A000-memory.dmp

                Filesize

                1.0MB

              • memory/3360-45-0x0000000005860000-0x0000000005E78000-memory.dmp

                Filesize

                6.1MB

              • memory/3360-44-0x0000000072F00000-0x00000000736B0000-memory.dmp

                Filesize

                7.7MB