Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/08/2023, 08:30

General

  • Target

    c998632b37d38f3bc136fae8b591eab8d2e029150aed36392e29a7fe810df669.exe

  • Size

    1.4MB

  • MD5

    4dc3f5945f7dd7dca512f2a50e888eb0

  • SHA1

    aee60d6fd238c5b18f52617233e18dc7d67fcc58

  • SHA256

    c998632b37d38f3bc136fae8b591eab8d2e029150aed36392e29a7fe810df669

  • SHA512

    3a2815ec84c06b805edbd810e12f131be2fe7b81ebbe0338365d4a156ce055ce20ed533af218c2bd145bf9213185b28001e09374c9d0c8386d77181bbb1855a2

  • SSDEEP

    24576:ryrHJhoSDpIhNKnGgqPLNAzT+JCQ10vfowz9goe3p3kMS:erHJhogS/KnGgqPLNI2cIS4SM

Malware Config

Extracted

Family

amadey

Version

3.87

C2

77.91.68.18/nice/index.php

Attributes
  • install_dir

    b40d11255d

  • install_file

    saves.exe

  • strings_key

    fa622dfc42544927a6471829ee1fa9fe

rc4.plain

Extracted

Family

redline

Botnet

sruta

C2

77.91.124.82:19071

Attributes
  • auth_value

    c556edcd49703319eca74247de20c236

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c998632b37d38f3bc136fae8b591eab8d2e029150aed36392e29a7fe810df669.exe
    "C:\Users\Admin\AppData\Local\Temp\c998632b37d38f3bc136fae8b591eab8d2e029150aed36392e29a7fe810df669.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9633916.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9633916.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3208
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9906450.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9906450.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4232
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y5116342.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y5116342.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4700
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l7897003.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l7897003.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3824
            • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
              "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2460
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:2888
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:5048
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:4688
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "saves.exe" /P "Admin:N"
                    8⤵
                      PID:4204
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "saves.exe" /P "Admin:R" /E
                      8⤵
                        PID:1228
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:5100
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\b40d11255d" /P "Admin:N"
                          8⤵
                            PID:2852
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\b40d11255d" /P "Admin:R" /E
                            8⤵
                              PID:2288
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:3428
                      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m3614473.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m3614473.exe
                        5⤵
                        • Executes dropped EXE
                        PID:4364
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n9413072.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n9413072.exe
                      4⤵
                      • Executes dropped EXE
                      PID:3524
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:996
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:5072
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:4412

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9633916.exe

                Filesize

                1.3MB

                MD5

                8962d3d6981b3139d4b402d519de6019

                SHA1

                71ffa3f0dff511d45445ccf5c2c9ee0da115e3b3

                SHA256

                7334c4594420877d2b8f2519276fc5ea8f2ffb128d45684204d8fc545f6f85ec

                SHA512

                9115abf8d28092724c3b224aac88e3ddbf095fe908a356e0d7994174732d4ad21e5b933e44e4ca76a9bb87b8213f007164e81ce2f2d20dacc60f98fd16f7ca5c

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9633916.exe

                Filesize

                1.3MB

                MD5

                8962d3d6981b3139d4b402d519de6019

                SHA1

                71ffa3f0dff511d45445ccf5c2c9ee0da115e3b3

                SHA256

                7334c4594420877d2b8f2519276fc5ea8f2ffb128d45684204d8fc545f6f85ec

                SHA512

                9115abf8d28092724c3b224aac88e3ddbf095fe908a356e0d7994174732d4ad21e5b933e44e4ca76a9bb87b8213f007164e81ce2f2d20dacc60f98fd16f7ca5c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9906450.exe

                Filesize

                476KB

                MD5

                1f2c57948b1f8a18656f9b2fe7b71511

                SHA1

                f2aa213c634cf7c3df4b53a4413a7a35fafb6d9b

                SHA256

                aef7a57d6e7da9cabc33b9181e08c4170f1824ee4f69048714c120d77c4498fc

                SHA512

                6ce4870cd6f98015d6e814d48bb7f58b7dc42cef823fa3f1658eb291024d786d003af3469f93af12aca12f6a9620cefe8c9d089b6eb3737b66d78204fadbdd26

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9906450.exe

                Filesize

                476KB

                MD5

                1f2c57948b1f8a18656f9b2fe7b71511

                SHA1

                f2aa213c634cf7c3df4b53a4413a7a35fafb6d9b

                SHA256

                aef7a57d6e7da9cabc33b9181e08c4170f1824ee4f69048714c120d77c4498fc

                SHA512

                6ce4870cd6f98015d6e814d48bb7f58b7dc42cef823fa3f1658eb291024d786d003af3469f93af12aca12f6a9620cefe8c9d089b6eb3737b66d78204fadbdd26

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n9413072.exe

                Filesize

                176KB

                MD5

                6be27b269e1941a84c8579e82558cad4

                SHA1

                a70f95f1323ae28663e7fa0da4b430ba52081672

                SHA256

                a47c64fdaa56d545e52c38a0589e0e4dd568193ece6a58a56baa0b4f7ec0591a

                SHA512

                e442e56333064974461b0363583dfead0f7330c7d295a5b5d738dba75e357af095b27544c9c8ca8215a1d26fc2c17f0a8dce41e09067e612221c6a5ca8b5cd1e

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n9413072.exe

                Filesize

                176KB

                MD5

                6be27b269e1941a84c8579e82558cad4

                SHA1

                a70f95f1323ae28663e7fa0da4b430ba52081672

                SHA256

                a47c64fdaa56d545e52c38a0589e0e4dd568193ece6a58a56baa0b4f7ec0591a

                SHA512

                e442e56333064974461b0363583dfead0f7330c7d295a5b5d738dba75e357af095b27544c9c8ca8215a1d26fc2c17f0a8dce41e09067e612221c6a5ca8b5cd1e

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y5116342.exe

                Filesize

                319KB

                MD5

                f1b25755eccbe0cd349bd038ca84c3eb

                SHA1

                dfaaaa22c04e6115724e22f83d6ca7f4629915d9

                SHA256

                3607ffdd01f290dd6220375088c08cf2e15dad7d20b7611d26a40cd02f6116da

                SHA512

                41905b0012f12b97cfe09a0e411fc035828fcd0a978c0ee46c67ec74463bb154ab508f1e966fe5245949945894f66fd1fe182d2a18a1a2ac920d68d36b295c9f

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y5116342.exe

                Filesize

                319KB

                MD5

                f1b25755eccbe0cd349bd038ca84c3eb

                SHA1

                dfaaaa22c04e6115724e22f83d6ca7f4629915d9

                SHA256

                3607ffdd01f290dd6220375088c08cf2e15dad7d20b7611d26a40cd02f6116da

                SHA512

                41905b0012f12b97cfe09a0e411fc035828fcd0a978c0ee46c67ec74463bb154ab508f1e966fe5245949945894f66fd1fe182d2a18a1a2ac920d68d36b295c9f

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l7897003.exe

                Filesize

                328KB

                MD5

                8b8fe0219809c184269cda555d96c313

                SHA1

                6cefa25968eb87bdc5695162a217c8019ba2d662

                SHA256

                5e18cf3056efe904ecd16164cef879fa266f5dfbce466f31ac6be6fcdcf7bee8

                SHA512

                812d8a74a9e63f80898090e4c9774515f14fbd8542de35e3c8ee68362e120e6a97ca20433ebc9c166ef16684101d38910d67bf50add39b1a968fed2916521e02

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l7897003.exe

                Filesize

                328KB

                MD5

                8b8fe0219809c184269cda555d96c313

                SHA1

                6cefa25968eb87bdc5695162a217c8019ba2d662

                SHA256

                5e18cf3056efe904ecd16164cef879fa266f5dfbce466f31ac6be6fcdcf7bee8

                SHA512

                812d8a74a9e63f80898090e4c9774515f14fbd8542de35e3c8ee68362e120e6a97ca20433ebc9c166ef16684101d38910d67bf50add39b1a968fed2916521e02

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m3614473.exe

                Filesize

                140KB

                MD5

                01d570774aa664f2e97d6a22ccd8f328

                SHA1

                d0f067f9208d255b3bb5be9251ead39ec2fcf69f

                SHA256

                c1c70935e042f51f8562f8ecef56132619a30f91ab9f3d80fc56e14a066e6037

                SHA512

                6dfc505c7b5d412204e182eef21d620022261559dbb7132392a804e62b3c9f286f5ab11814efdaf8a1d65a10bcab66bd9e637dab6dac6d73be9f989b722886aa

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m3614473.exe

                Filesize

                140KB

                MD5

                01d570774aa664f2e97d6a22ccd8f328

                SHA1

                d0f067f9208d255b3bb5be9251ead39ec2fcf69f

                SHA256

                c1c70935e042f51f8562f8ecef56132619a30f91ab9f3d80fc56e14a066e6037

                SHA512

                6dfc505c7b5d412204e182eef21d620022261559dbb7132392a804e62b3c9f286f5ab11814efdaf8a1d65a10bcab66bd9e637dab6dac6d73be9f989b722886aa

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                328KB

                MD5

                8b8fe0219809c184269cda555d96c313

                SHA1

                6cefa25968eb87bdc5695162a217c8019ba2d662

                SHA256

                5e18cf3056efe904ecd16164cef879fa266f5dfbce466f31ac6be6fcdcf7bee8

                SHA512

                812d8a74a9e63f80898090e4c9774515f14fbd8542de35e3c8ee68362e120e6a97ca20433ebc9c166ef16684101d38910d67bf50add39b1a968fed2916521e02

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                328KB

                MD5

                8b8fe0219809c184269cda555d96c313

                SHA1

                6cefa25968eb87bdc5695162a217c8019ba2d662

                SHA256

                5e18cf3056efe904ecd16164cef879fa266f5dfbce466f31ac6be6fcdcf7bee8

                SHA512

                812d8a74a9e63f80898090e4c9774515f14fbd8542de35e3c8ee68362e120e6a97ca20433ebc9c166ef16684101d38910d67bf50add39b1a968fed2916521e02

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                328KB

                MD5

                8b8fe0219809c184269cda555d96c313

                SHA1

                6cefa25968eb87bdc5695162a217c8019ba2d662

                SHA256

                5e18cf3056efe904ecd16164cef879fa266f5dfbce466f31ac6be6fcdcf7bee8

                SHA512

                812d8a74a9e63f80898090e4c9774515f14fbd8542de35e3c8ee68362e120e6a97ca20433ebc9c166ef16684101d38910d67bf50add39b1a968fed2916521e02

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                328KB

                MD5

                8b8fe0219809c184269cda555d96c313

                SHA1

                6cefa25968eb87bdc5695162a217c8019ba2d662

                SHA256

                5e18cf3056efe904ecd16164cef879fa266f5dfbce466f31ac6be6fcdcf7bee8

                SHA512

                812d8a74a9e63f80898090e4c9774515f14fbd8542de35e3c8ee68362e120e6a97ca20433ebc9c166ef16684101d38910d67bf50add39b1a968fed2916521e02

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                328KB

                MD5

                8b8fe0219809c184269cda555d96c313

                SHA1

                6cefa25968eb87bdc5695162a217c8019ba2d662

                SHA256

                5e18cf3056efe904ecd16164cef879fa266f5dfbce466f31ac6be6fcdcf7bee8

                SHA512

                812d8a74a9e63f80898090e4c9774515f14fbd8542de35e3c8ee68362e120e6a97ca20433ebc9c166ef16684101d38910d67bf50add39b1a968fed2916521e02

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                328KB

                MD5

                8b8fe0219809c184269cda555d96c313

                SHA1

                6cefa25968eb87bdc5695162a217c8019ba2d662

                SHA256

                5e18cf3056efe904ecd16164cef879fa266f5dfbce466f31ac6be6fcdcf7bee8

                SHA512

                812d8a74a9e63f80898090e4c9774515f14fbd8542de35e3c8ee68362e120e6a97ca20433ebc9c166ef16684101d38910d67bf50add39b1a968fed2916521e02

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                374bfdcfcf19f4edfe949022092848d2

                SHA1

                df5ee40497e98efcfba30012452d433373d287d4

                SHA256

                224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f

                SHA512

                bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7

              • memory/3524-44-0x00000000734B0000-0x0000000073C60000-memory.dmp

                Filesize

                7.7MB

              • memory/3524-50-0x00000000734B0000-0x0000000073C60000-memory.dmp

                Filesize

                7.7MB

              • memory/3524-52-0x0000000002C60000-0x0000000002C70000-memory.dmp

                Filesize

                64KB

              • memory/3524-49-0x0000000005360000-0x000000000539C000-memory.dmp

                Filesize

                240KB

              • memory/3524-47-0x0000000002C60000-0x0000000002C70000-memory.dmp

                Filesize

                64KB

              • memory/3524-48-0x0000000005300000-0x0000000005312000-memory.dmp

                Filesize

                72KB

              • memory/3524-46-0x00000000053C0000-0x00000000054CA000-memory.dmp

                Filesize

                1.0MB

              • memory/3524-45-0x00000000058D0000-0x0000000005EE8000-memory.dmp

                Filesize

                6.1MB

              • memory/3524-43-0x0000000000830000-0x0000000000860000-memory.dmp

                Filesize

                192KB