Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/08/2023, 02:59

General

  • Target

    8bad9814e66de2c052a852f08c12f5cf49585fd810bb58da7c954e8ddc5f8450.exe

  • Size

    1.4MB

  • MD5

    bca1697689c41078f296335aa84acf29

  • SHA1

    a04b53871269745c63c16336641ba177cb052785

  • SHA256

    8bad9814e66de2c052a852f08c12f5cf49585fd810bb58da7c954e8ddc5f8450

  • SHA512

    ef0657473b0dd590ff2585a2efc675a2f7bde9d7d55db4f350242a3b5adccd2f6c6cf35ae8b7401a6cb58f5ba354ed9d7888ae7e48cfca2034a4846b7e01df68

  • SSDEEP

    24576:gy9PCqol1qdcKW+ue+jPiAsMLKOOLAF32ySzxsgerpJ5wHa0kBEIdAiZmUrM1:nhC4+KW+ueEPiAs4KNAF32Fz+7uHFYdu

Malware Config

Extracted

Family

amadey

Version

3.87

C2

77.91.68.18/nice/index.php

Extracted

Family

redline

Botnet

stas

C2

77.91.124.82:19071

Attributes
  • auth_value

    db6d96c4eade05afc28c31d9ad73a73c

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8bad9814e66de2c052a852f08c12f5cf49585fd810bb58da7c954e8ddc5f8450.exe
    "C:\Users\Admin\AppData\Local\Temp\8bad9814e66de2c052a852f08c12f5cf49585fd810bb58da7c954e8ddc5f8450.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3992
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0987424.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0987424.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1664
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6073411.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6073411.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4580
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y4319932.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y4319932.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4040
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m6175003.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m6175003.exe
            5⤵
            • Executes dropped EXE
            PID:4296
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n2353250.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n2353250.exe
          4⤵
          • Executes dropped EXE
          PID:4164
  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l2048340.exe
    C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l2048340.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
      "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1328
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4744
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          4⤵
            PID:2136
          • C:\Windows\SysWOW64\cacls.exe
            CACLS "saves.exe" /P "Admin:N"
            4⤵
              PID:3804
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "saves.exe" /P "Admin:R" /E
              4⤵
                PID:3540
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                4⤵
                  PID:4684
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\b40d11255d" /P "Admin:N"
                  4⤵
                    PID:2404
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\b40d11255d" /P "Admin:R" /E
                    4⤵
                      PID:1992
                  • C:\Windows\SysWOW64\rundll32.exe
                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                    3⤵
                    • Loads dropped DLL
                    PID:1772
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                1⤵
                • Creates scheduled task(s)
                PID:3560
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:2052
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:4472
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:3416

              Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0987424.exe

                      Filesize

                      1.3MB

                      MD5

                      9af806d89cb1e972728fb8af69a125ba

                      SHA1

                      dce69890960b1e625d4938f4a325db5819545dd3

                      SHA256

                      1375c62e4f171a22ebda8418587695c765335f50c5b0b9afda8300ba4f08114a

                      SHA512

                      2d33ee43fe9ee1168977e13116513879af09a893fa49fb59f46a9452c3172e1d967edce4e964e547f4e737fc27f90d51c3f6e16ca3b468a2029a5274d590d56c

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0987424.exe

                      Filesize

                      1.3MB

                      MD5

                      9af806d89cb1e972728fb8af69a125ba

                      SHA1

                      dce69890960b1e625d4938f4a325db5819545dd3

                      SHA256

                      1375c62e4f171a22ebda8418587695c765335f50c5b0b9afda8300ba4f08114a

                      SHA512

                      2d33ee43fe9ee1168977e13116513879af09a893fa49fb59f46a9452c3172e1d967edce4e964e547f4e737fc27f90d51c3f6e16ca3b468a2029a5274d590d56c

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6073411.exe

                      Filesize

                      475KB

                      MD5

                      a816e95dad7cc50bb5a1ea6586881a37

                      SHA1

                      c0a8ee51ee530c5bdc727725424e729569771b6e

                      SHA256

                      dae40339ffb61c948044d293879a340b75b187cdb7ae9625576fa4a003b8f517

                      SHA512

                      31a936cbf39b28bdac3281b03f4a148a9bca33fd047931fe05b735749292e93bb78d77e32e2db3df98449bff4ede1c662af7b3968f03dc367c7a7a2b29ffea7e

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6073411.exe

                      Filesize

                      475KB

                      MD5

                      a816e95dad7cc50bb5a1ea6586881a37

                      SHA1

                      c0a8ee51ee530c5bdc727725424e729569771b6e

                      SHA256

                      dae40339ffb61c948044d293879a340b75b187cdb7ae9625576fa4a003b8f517

                      SHA512

                      31a936cbf39b28bdac3281b03f4a148a9bca33fd047931fe05b735749292e93bb78d77e32e2db3df98449bff4ede1c662af7b3968f03dc367c7a7a2b29ffea7e

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n2353250.exe

                      Filesize

                      175KB

                      MD5

                      a647c690a078149cf0c7d7146d1da4a1

                      SHA1

                      d0a097b1e39fa649adbbff27813e04ad8d5a4ea5

                      SHA256

                      bd85e2ff04db8600d5458ab97a4e62c92fb3f2a297583db43fdf9848ab2353e0

                      SHA512

                      cff5803977734c7aff1d9f1a9ce3b7607332796df23e6e3c7acaaa6b3d7c663f0b8f9edfa1c3816a484315e62256b89dd9fab7f3abd96f87290480d67b9aab1d

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n2353250.exe

                      Filesize

                      175KB

                      MD5

                      a647c690a078149cf0c7d7146d1da4a1

                      SHA1

                      d0a097b1e39fa649adbbff27813e04ad8d5a4ea5

                      SHA256

                      bd85e2ff04db8600d5458ab97a4e62c92fb3f2a297583db43fdf9848ab2353e0

                      SHA512

                      cff5803977734c7aff1d9f1a9ce3b7607332796df23e6e3c7acaaa6b3d7c663f0b8f9edfa1c3816a484315e62256b89dd9fab7f3abd96f87290480d67b9aab1d

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y4319932.exe

                      Filesize

                      319KB

                      MD5

                      dc1dbfb64196b1e96eab343bfa921662

                      SHA1

                      d11b1a478343d4d897c35ba303ec40bcda3fb5b2

                      SHA256

                      a2db76e7be23b5d22650343744feca884e24178430caf653fce67b0cf46076cc

                      SHA512

                      751e57980d56e65609cb1a915cfc66c5800bc85b7d86d1c7209c8ffe290156120867a4fa81b29b83917bfd9a7c859215625ed354f7870cf73aae97d1cf0e881f

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y4319932.exe

                      Filesize

                      319KB

                      MD5

                      dc1dbfb64196b1e96eab343bfa921662

                      SHA1

                      d11b1a478343d4d897c35ba303ec40bcda3fb5b2

                      SHA256

                      a2db76e7be23b5d22650343744feca884e24178430caf653fce67b0cf46076cc

                      SHA512

                      751e57980d56e65609cb1a915cfc66c5800bc85b7d86d1c7209c8ffe290156120867a4fa81b29b83917bfd9a7c859215625ed354f7870cf73aae97d1cf0e881f

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l2048340.exe

                      Filesize

                      324KB

                      MD5

                      6d2a768cdcef663867b4c8defcae1691

                      SHA1

                      e794e723d07af063a2b4d061a9557e53936243ec

                      SHA256

                      163dd632d307bd3fb11d64dcaa819ff9fcec08da30a57d596995fa41ddc749c5

                      SHA512

                      2f06b377221fec191388797f8c106cbfe30a371a988e0b27ff132b004cc780d0565f58f99cc5c0ed5cb5f1b0047e61f245460b30174ea3efe552e951cff315b4

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l2048340.exe

                      Filesize

                      324KB

                      MD5

                      6d2a768cdcef663867b4c8defcae1691

                      SHA1

                      e794e723d07af063a2b4d061a9557e53936243ec

                      SHA256

                      163dd632d307bd3fb11d64dcaa819ff9fcec08da30a57d596995fa41ddc749c5

                      SHA512

                      2f06b377221fec191388797f8c106cbfe30a371a988e0b27ff132b004cc780d0565f58f99cc5c0ed5cb5f1b0047e61f245460b30174ea3efe552e951cff315b4

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m6175003.exe

                      Filesize

                      141KB

                      MD5

                      cfc861964c95c37a630f5ba6ddb99063

                      SHA1

                      f1eb3bef9eb05db9860e3581d82f60881386f9c6

                      SHA256

                      463e8c5d0e47522e37a6e27d3d1ddfeaa2c216be24bd0cd1c945387260547f9c

                      SHA512

                      450f40a935d80a5f8f0784779612c263de129da0ed4989a6da48e6663517fc3eb76cfbd0e0986fb59468d0d33f0f287b9ce0eff934e3e259f65e094741298cbb

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m6175003.exe

                      Filesize

                      141KB

                      MD5

                      cfc861964c95c37a630f5ba6ddb99063

                      SHA1

                      f1eb3bef9eb05db9860e3581d82f60881386f9c6

                      SHA256

                      463e8c5d0e47522e37a6e27d3d1ddfeaa2c216be24bd0cd1c945387260547f9c

                      SHA512

                      450f40a935d80a5f8f0784779612c263de129da0ed4989a6da48e6663517fc3eb76cfbd0e0986fb59468d0d33f0f287b9ce0eff934e3e259f65e094741298cbb

                    • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                      Filesize

                      324KB

                      MD5

                      6d2a768cdcef663867b4c8defcae1691

                      SHA1

                      e794e723d07af063a2b4d061a9557e53936243ec

                      SHA256

                      163dd632d307bd3fb11d64dcaa819ff9fcec08da30a57d596995fa41ddc749c5

                      SHA512

                      2f06b377221fec191388797f8c106cbfe30a371a988e0b27ff132b004cc780d0565f58f99cc5c0ed5cb5f1b0047e61f245460b30174ea3efe552e951cff315b4

                    • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                      Filesize

                      324KB

                      MD5

                      6d2a768cdcef663867b4c8defcae1691

                      SHA1

                      e794e723d07af063a2b4d061a9557e53936243ec

                      SHA256

                      163dd632d307bd3fb11d64dcaa819ff9fcec08da30a57d596995fa41ddc749c5

                      SHA512

                      2f06b377221fec191388797f8c106cbfe30a371a988e0b27ff132b004cc780d0565f58f99cc5c0ed5cb5f1b0047e61f245460b30174ea3efe552e951cff315b4

                    • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                      Filesize

                      324KB

                      MD5

                      6d2a768cdcef663867b4c8defcae1691

                      SHA1

                      e794e723d07af063a2b4d061a9557e53936243ec

                      SHA256

                      163dd632d307bd3fb11d64dcaa819ff9fcec08da30a57d596995fa41ddc749c5

                      SHA512

                      2f06b377221fec191388797f8c106cbfe30a371a988e0b27ff132b004cc780d0565f58f99cc5c0ed5cb5f1b0047e61f245460b30174ea3efe552e951cff315b4

                    • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                      Filesize

                      324KB

                      MD5

                      6d2a768cdcef663867b4c8defcae1691

                      SHA1

                      e794e723d07af063a2b4d061a9557e53936243ec

                      SHA256

                      163dd632d307bd3fb11d64dcaa819ff9fcec08da30a57d596995fa41ddc749c5

                      SHA512

                      2f06b377221fec191388797f8c106cbfe30a371a988e0b27ff132b004cc780d0565f58f99cc5c0ed5cb5f1b0047e61f245460b30174ea3efe552e951cff315b4

                    • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                      Filesize

                      324KB

                      MD5

                      6d2a768cdcef663867b4c8defcae1691

                      SHA1

                      e794e723d07af063a2b4d061a9557e53936243ec

                      SHA256

                      163dd632d307bd3fb11d64dcaa819ff9fcec08da30a57d596995fa41ddc749c5

                      SHA512

                      2f06b377221fec191388797f8c106cbfe30a371a988e0b27ff132b004cc780d0565f58f99cc5c0ed5cb5f1b0047e61f245460b30174ea3efe552e951cff315b4

                    • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                      Filesize

                      324KB

                      MD5

                      6d2a768cdcef663867b4c8defcae1691

                      SHA1

                      e794e723d07af063a2b4d061a9557e53936243ec

                      SHA256

                      163dd632d307bd3fb11d64dcaa819ff9fcec08da30a57d596995fa41ddc749c5

                      SHA512

                      2f06b377221fec191388797f8c106cbfe30a371a988e0b27ff132b004cc780d0565f58f99cc5c0ed5cb5f1b0047e61f245460b30174ea3efe552e951cff315b4

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      5bc0153d2973241b72a38c51a2f72116

                      SHA1

                      cd9c689663557452631d9f8ff609208b01884a32

                      SHA256

                      68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                      SHA512

                      2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      5bc0153d2973241b72a38c51a2f72116

                      SHA1

                      cd9c689663557452631d9f8ff609208b01884a32

                      SHA256

                      68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                      SHA512

                      2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      5bc0153d2973241b72a38c51a2f72116

                      SHA1

                      cd9c689663557452631d9f8ff609208b01884a32

                      SHA256

                      68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                      SHA512

                      2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                      Filesize

                      273B

                      MD5

                      374bfdcfcf19f4edfe949022092848d2

                      SHA1

                      df5ee40497e98efcfba30012452d433373d287d4

                      SHA256

                      224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f

                      SHA512

                      bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7

                    • memory/4164-43-0x0000000000970000-0x00000000009A0000-memory.dmp

                      Filesize

                      192KB

                    • memory/4164-51-0x0000000005230000-0x0000000005240000-memory.dmp

                      Filesize

                      64KB

                    • memory/4164-50-0x00000000727D0000-0x0000000072F80000-memory.dmp

                      Filesize

                      7.7MB

                    • memory/4164-49-0x0000000005380000-0x00000000053BC000-memory.dmp

                      Filesize

                      240KB

                    • memory/4164-48-0x00000000051F0000-0x0000000005202000-memory.dmp

                      Filesize

                      72KB

                    • memory/4164-47-0x0000000005230000-0x0000000005240000-memory.dmp

                      Filesize

                      64KB

                    • memory/4164-46-0x0000000005450000-0x000000000555A000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/4164-45-0x0000000005960000-0x0000000005F78000-memory.dmp

                      Filesize

                      6.1MB

                    • memory/4164-44-0x00000000727D0000-0x0000000072F80000-memory.dmp

                      Filesize

                      7.7MB