Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    31/08/2023, 02:41

General

  • Target

    aca60148eb2c467be7d7ef67474b35d3c2deb51ef7ba6bc05cc20f78a428efd0.exe

  • Size

    705KB

  • MD5

    b09d36769d8331bce1b5f035ee79c3ef

  • SHA1

    21dc47437bd345e71b32fd5bf5c23b2d25aca569

  • SHA256

    aca60148eb2c467be7d7ef67474b35d3c2deb51ef7ba6bc05cc20f78a428efd0

  • SHA512

    20785f23924e6c353ab1f224ea9e6f021e5ff5654053fdb698c6e19c132f28bf9b48efb25499a955a72f498903220dcf20774456cc7935ed80743190acbb9f8e

  • SSDEEP

    12288:vMrdy90vVGD+8tzOq/Z7+c0fiLoKiORXJphyvjbS9JRRohcDLYXal:2y0GTV/Z7+xfiniORrhgfS9JR6hcD2Y

Malware Config

Extracted

Family

amadey

Version

3.87

C2

77.91.68.18/nice/index.php

Attributes
  • install_dir

    b40d11255d

  • install_file

    saves.exe

  • strings_key

    fa622dfc42544927a6471829ee1fa9fe

rc4.plain

Extracted

Family

redline

Botnet

sruta

C2

77.91.124.82:19071

Attributes
  • auth_value

    c556edcd49703319eca74247de20c236

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aca60148eb2c467be7d7ef67474b35d3c2deb51ef7ba6bc05cc20f78a428efd0.exe
    "C:\Users\Admin\AppData\Local\Temp\aca60148eb2c467be7d7ef67474b35d3c2deb51ef7ba6bc05cc20f78a428efd0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3060
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2619016.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2619016.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4668
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7609898.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7609898.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1136
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1724690.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1724690.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:5108
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2858618.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2858618.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1364
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7731192.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7731192.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:216
            • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
              "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:3968
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:3760
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:4984
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:5096
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "saves.exe" /P "Admin:N"
                    8⤵
                      PID:4508
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "saves.exe" /P "Admin:R" /E
                      8⤵
                        PID:3188
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\b40d11255d" /P "Admin:N"
                        8⤵
                          PID:2960
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                          8⤵
                            PID:4808
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\b40d11255d" /P "Admin:R" /E
                            8⤵
                              PID:2912
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:3212
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i1004920.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i1004920.exe
                      4⤵
                      • Executes dropped EXE
                      PID:5084
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:404

              Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2619016.exe

                      Filesize

                      599KB

                      MD5

                      575344c2f9238bc708b28316de1a6cc6

                      SHA1

                      8c30d653af6ab3b6777e7e8bd0ddf139c44386f7

                      SHA256

                      20a11a72f109a0a6ed0ac438cc5bfc64c79b07a0f48b786b86ae49afa3b0e0b9

                      SHA512

                      4422f63024972614ee875f69c8b72348192eef6fff945ed289cb9f522b6651395ea4dafca500cbc812b72a2fd22ad697b2ddc1868ba69d23d3017d2400b97173

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2619016.exe

                      Filesize

                      599KB

                      MD5

                      575344c2f9238bc708b28316de1a6cc6

                      SHA1

                      8c30d653af6ab3b6777e7e8bd0ddf139c44386f7

                      SHA256

                      20a11a72f109a0a6ed0ac438cc5bfc64c79b07a0f48b786b86ae49afa3b0e0b9

                      SHA512

                      4422f63024972614ee875f69c8b72348192eef6fff945ed289cb9f522b6651395ea4dafca500cbc812b72a2fd22ad697b2ddc1868ba69d23d3017d2400b97173

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7609898.exe

                      Filesize

                      433KB

                      MD5

                      a6f33e838c6fd349db700d13ed6ea9b4

                      SHA1

                      a94ee05d03471bbab0c2aec5894c2beca17670b7

                      SHA256

                      c86dbe467e95f92f5c60cdbe0965c0437771daafbe82a9acf75209731445672d

                      SHA512

                      eba9be68ca4aa6ea15ad7e53e304fd41cfd4ab4a6bc3c0925db207b3396c6f90c41accc0820ac1cd9dde1272174b64229f5b94cad1dcecebfa63f38755d9f12f

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7609898.exe

                      Filesize

                      433KB

                      MD5

                      a6f33e838c6fd349db700d13ed6ea9b4

                      SHA1

                      a94ee05d03471bbab0c2aec5894c2beca17670b7

                      SHA256

                      c86dbe467e95f92f5c60cdbe0965c0437771daafbe82a9acf75209731445672d

                      SHA512

                      eba9be68ca4aa6ea15ad7e53e304fd41cfd4ab4a6bc3c0925db207b3396c6f90c41accc0820ac1cd9dde1272174b64229f5b94cad1dcecebfa63f38755d9f12f

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i1004920.exe

                      Filesize

                      175KB

                      MD5

                      b602995207d10dd3b8ab501abf4d61a7

                      SHA1

                      8303f288bb06ee1467fd01c32b06d46888595778

                      SHA256

                      b219fd53bd8cfbbbf2b9269065c3f18ecd95dcf40fe82c8386640c6d5d837eb2

                      SHA512

                      67d9b58ecac81fd61eddb0f7a505adff36fe27c9beb5f6b500cf0d33f4d825ca2cf089454658be1f62d722e987db6ad463ccda547af5282bfdcbb01b1b3daa97

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i1004920.exe

                      Filesize

                      175KB

                      MD5

                      b602995207d10dd3b8ab501abf4d61a7

                      SHA1

                      8303f288bb06ee1467fd01c32b06d46888595778

                      SHA256

                      b219fd53bd8cfbbbf2b9269065c3f18ecd95dcf40fe82c8386640c6d5d837eb2

                      SHA512

                      67d9b58ecac81fd61eddb0f7a505adff36fe27c9beb5f6b500cf0d33f4d825ca2cf089454658be1f62d722e987db6ad463ccda547af5282bfdcbb01b1b3daa97

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1724690.exe

                      Filesize

                      277KB

                      MD5

                      9a3dec6464a3368f9949d4fab9cbe8bb

                      SHA1

                      6a727dbcb4978d1ddbfea83f16574f5a1335265f

                      SHA256

                      f99a047a50b73b59653414ec2442191828a27389fc30860752abbfddebb85293

                      SHA512

                      392f0ce2cf9a8735e801f67f515c93620bf7e2f63a8ce68d6e4ae68095a3a7e60c67b1a071fe84e5680c82c293149efcc34a553b7631c5f7ae07a751f5f7f128

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1724690.exe

                      Filesize

                      277KB

                      MD5

                      9a3dec6464a3368f9949d4fab9cbe8bb

                      SHA1

                      6a727dbcb4978d1ddbfea83f16574f5a1335265f

                      SHA256

                      f99a047a50b73b59653414ec2442191828a27389fc30860752abbfddebb85293

                      SHA512

                      392f0ce2cf9a8735e801f67f515c93620bf7e2f63a8ce68d6e4ae68095a3a7e60c67b1a071fe84e5680c82c293149efcc34a553b7631c5f7ae07a751f5f7f128

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2858618.exe

                      Filesize

                      18KB

                      MD5

                      fbf58e8f9baf0369eb47609e938f6a15

                      SHA1

                      0e36635c09c6b20947aa75cc98d20def491fcc70

                      SHA256

                      a076f1adf36614a025fb1fed21a4c84398be9e251b60d34c58bbd53fa6b764f7

                      SHA512

                      1bbfffd6687d1608a3e4191931712fdcc6d7b6236a4cd3c280360d01966eefcc87721b4eb9d0019fd6ba0458981a8c252f951ab51fa3b04bfd79bd937f48906a

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2858618.exe

                      Filesize

                      18KB

                      MD5

                      fbf58e8f9baf0369eb47609e938f6a15

                      SHA1

                      0e36635c09c6b20947aa75cc98d20def491fcc70

                      SHA256

                      a076f1adf36614a025fb1fed21a4c84398be9e251b60d34c58bbd53fa6b764f7

                      SHA512

                      1bbfffd6687d1608a3e4191931712fdcc6d7b6236a4cd3c280360d01966eefcc87721b4eb9d0019fd6ba0458981a8c252f951ab51fa3b04bfd79bd937f48906a

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7731192.exe

                      Filesize

                      328KB

                      MD5

                      fe9fda9e5dae99cbcffa77dd176f7205

                      SHA1

                      9c412093b39af371597367fd1fbcc0dfd9121717

                      SHA256

                      5e864bb71fce0e08cf44cfafec9afcfa9f61d33f741417d6f4d98f35618c8587

                      SHA512

                      f363d6cb8ac18f5887537011ce6c84627495c24f3344e4685db7b32873300276d9a4b0d7603f5821390138854748f3be00ee54d77f529b2b3ef58263915c130d

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7731192.exe

                      Filesize

                      328KB

                      MD5

                      fe9fda9e5dae99cbcffa77dd176f7205

                      SHA1

                      9c412093b39af371597367fd1fbcc0dfd9121717

                      SHA256

                      5e864bb71fce0e08cf44cfafec9afcfa9f61d33f741417d6f4d98f35618c8587

                      SHA512

                      f363d6cb8ac18f5887537011ce6c84627495c24f3344e4685db7b32873300276d9a4b0d7603f5821390138854748f3be00ee54d77f529b2b3ef58263915c130d

                    • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                      Filesize

                      328KB

                      MD5

                      fe9fda9e5dae99cbcffa77dd176f7205

                      SHA1

                      9c412093b39af371597367fd1fbcc0dfd9121717

                      SHA256

                      5e864bb71fce0e08cf44cfafec9afcfa9f61d33f741417d6f4d98f35618c8587

                      SHA512

                      f363d6cb8ac18f5887537011ce6c84627495c24f3344e4685db7b32873300276d9a4b0d7603f5821390138854748f3be00ee54d77f529b2b3ef58263915c130d

                    • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                      Filesize

                      328KB

                      MD5

                      fe9fda9e5dae99cbcffa77dd176f7205

                      SHA1

                      9c412093b39af371597367fd1fbcc0dfd9121717

                      SHA256

                      5e864bb71fce0e08cf44cfafec9afcfa9f61d33f741417d6f4d98f35618c8587

                      SHA512

                      f363d6cb8ac18f5887537011ce6c84627495c24f3344e4685db7b32873300276d9a4b0d7603f5821390138854748f3be00ee54d77f529b2b3ef58263915c130d

                    • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                      Filesize

                      328KB

                      MD5

                      fe9fda9e5dae99cbcffa77dd176f7205

                      SHA1

                      9c412093b39af371597367fd1fbcc0dfd9121717

                      SHA256

                      5e864bb71fce0e08cf44cfafec9afcfa9f61d33f741417d6f4d98f35618c8587

                      SHA512

                      f363d6cb8ac18f5887537011ce6c84627495c24f3344e4685db7b32873300276d9a4b0d7603f5821390138854748f3be00ee54d77f529b2b3ef58263915c130d

                    • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                      Filesize

                      328KB

                      MD5

                      fe9fda9e5dae99cbcffa77dd176f7205

                      SHA1

                      9c412093b39af371597367fd1fbcc0dfd9121717

                      SHA256

                      5e864bb71fce0e08cf44cfafec9afcfa9f61d33f741417d6f4d98f35618c8587

                      SHA512

                      f363d6cb8ac18f5887537011ce6c84627495c24f3344e4685db7b32873300276d9a4b0d7603f5821390138854748f3be00ee54d77f529b2b3ef58263915c130d

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      5bc0153d2973241b72a38c51a2f72116

                      SHA1

                      cd9c689663557452631d9f8ff609208b01884a32

                      SHA256

                      68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                      SHA512

                      2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      5bc0153d2973241b72a38c51a2f72116

                      SHA1

                      cd9c689663557452631d9f8ff609208b01884a32

                      SHA256

                      68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                      SHA512

                      2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                      Filesize

                      273B

                      MD5

                      374bfdcfcf19f4edfe949022092848d2

                      SHA1

                      df5ee40497e98efcfba30012452d433373d287d4

                      SHA256

                      224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f

                      SHA512

                      bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7

                    • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      5bc0153d2973241b72a38c51a2f72116

                      SHA1

                      cd9c689663557452631d9f8ff609208b01884a32

                      SHA256

                      68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                      SHA512

                      2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

                    • memory/1364-28-0x0000000000D40000-0x0000000000D4A000-memory.dmp

                      Filesize

                      40KB

                    • memory/1364-31-0x00007FF9FE720000-0x00007FF9FF10C000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/1364-29-0x00007FF9FE720000-0x00007FF9FF10C000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/5084-47-0x000000000A6C0000-0x000000000ACC6000-memory.dmp

                      Filesize

                      6.0MB

                    • memory/5084-48-0x000000000A1C0000-0x000000000A2CA000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/5084-49-0x000000000A0F0000-0x000000000A102000-memory.dmp

                      Filesize

                      72KB

                    • memory/5084-50-0x000000000A150000-0x000000000A18E000-memory.dmp

                      Filesize

                      248KB

                    • memory/5084-51-0x000000000A2D0000-0x000000000A31B000-memory.dmp

                      Filesize

                      300KB

                    • memory/5084-52-0x0000000072BB0000-0x000000007329E000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/5084-46-0x0000000002590000-0x0000000002596000-memory.dmp

                      Filesize

                      24KB

                    • memory/5084-45-0x0000000072BB0000-0x000000007329E000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/5084-44-0x00000000003B0000-0x00000000003E0000-memory.dmp

                      Filesize

                      192KB