Analysis

  • max time kernel
    135s
  • max time network
    152s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    31-08-2023 09:35

General

  • Target

    b12896f00a86268ee695be4bdf918bc5de442ebee7fa60cda881c95cf234e634.exe

  • Size

    1.4MB

  • MD5

    979ebd5b029c731253b3b912d367bce3

  • SHA1

    81c4dec532361ea5d73697c0b70f90caef466e35

  • SHA256

    b12896f00a86268ee695be4bdf918bc5de442ebee7fa60cda881c95cf234e634

  • SHA512

    a06cfe065b5b4ab8d24377c4fbd48290a3b6398fd1eb7d6cbf0a0002f17c5d860965db64b9de5afcf3feca8bb90f53fcc6d55f9f77d384aba458eb4d844fe01e

  • SSDEEP

    24576:Jys6yjScruIHtKoZQN9iIh8ibwovXJ3XLPGmsgz0w/seuHJerkDGVcoCJxF:8ryjScr5KoZQNkIZb9XVSaj/se6qhwx

Malware Config

Extracted

Family

amadey

Version

3.87

C2

77.91.68.18/nice/index.php

Attributes
  • install_dir

    b40d11255d

  • install_file

    saves.exe

  • strings_key

    fa622dfc42544927a6471829ee1fa9fe

rc4.plain

Extracted

Family

redline

Botnet

sruta

C2

77.91.124.82:19071

Attributes
  • auth_value

    c556edcd49703319eca74247de20c236

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b12896f00a86268ee695be4bdf918bc5de442ebee7fa60cda881c95cf234e634.exe
    "C:\Users\Admin\AppData\Local\Temp\b12896f00a86268ee695be4bdf918bc5de442ebee7fa60cda881c95cf234e634.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3974096.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3974096.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3032
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5108213.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5108213.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4960
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y0313048.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y0313048.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4244
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l9824248.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l9824248.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2740
            • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
              "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2392
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:1312
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1456
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:2780
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "saves.exe" /P "Admin:N"
                    8⤵
                      PID:4772
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "saves.exe" /P "Admin:R" /E
                      8⤵
                        PID:896
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:4744
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\b40d11255d" /P "Admin:N"
                          8⤵
                            PID:1424
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\b40d11255d" /P "Admin:R" /E
                            8⤵
                              PID:4024
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:3108
                      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m1795784.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m1795784.exe
                        5⤵
                        • Executes dropped EXE
                        PID:2288
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n7591330.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n7591330.exe
                      4⤵
                      • Executes dropped EXE
                      PID:1960
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:5060
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:1084

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3974096.exe

                Filesize

                1.3MB

                MD5

                ac5a3bd2fa9c3653b76b1892ceaffd56

                SHA1

                ddd46dfbceae41f561c992414f3a562d5c593e2f

                SHA256

                072cafa094630b1c7bce66c639a74d64ca6304c9dfbdd713166d9b6c33c3b5cd

                SHA512

                30630f6fa1f2429131a31c66444c539da385c204d5e5fedac9e50f5da243159f3732344789b93aed5bfe6fc5e2504f1a13afa55f0401374c3046d11a1ea8cbca

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3974096.exe

                Filesize

                1.3MB

                MD5

                ac5a3bd2fa9c3653b76b1892ceaffd56

                SHA1

                ddd46dfbceae41f561c992414f3a562d5c593e2f

                SHA256

                072cafa094630b1c7bce66c639a74d64ca6304c9dfbdd713166d9b6c33c3b5cd

                SHA512

                30630f6fa1f2429131a31c66444c539da385c204d5e5fedac9e50f5da243159f3732344789b93aed5bfe6fc5e2504f1a13afa55f0401374c3046d11a1ea8cbca

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5108213.exe

                Filesize

                475KB

                MD5

                632acc11f271790a948572a5b8daf4bd

                SHA1

                30ed471f976fc0fe314dee54a0bff4a4ab7e04b0

                SHA256

                05a3b727a71a30bfbb44f52bde924ebe432310eb034c067c6d76569bb1e64bf8

                SHA512

                e6992f852f9b84975b7d4e8a51d494b1b9f21bbfcff31872007bf335c5c728c8d356c4ff1062c90814f2a892e1e90a9827553723623559b6fa59072c6b14297d

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5108213.exe

                Filesize

                475KB

                MD5

                632acc11f271790a948572a5b8daf4bd

                SHA1

                30ed471f976fc0fe314dee54a0bff4a4ab7e04b0

                SHA256

                05a3b727a71a30bfbb44f52bde924ebe432310eb034c067c6d76569bb1e64bf8

                SHA512

                e6992f852f9b84975b7d4e8a51d494b1b9f21bbfcff31872007bf335c5c728c8d356c4ff1062c90814f2a892e1e90a9827553723623559b6fa59072c6b14297d

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n7591330.exe

                Filesize

                176KB

                MD5

                913eff4e3b8f603efe375d041934d842

                SHA1

                38b5a804194af72b5d1f88fded9454cdbcd8b4f1

                SHA256

                f51d19ee4a7cb18ebdc453e7e56e1ec1917a7941a66417d2d9bf4a5095f0197c

                SHA512

                70ab79737f5df230a5d71b3f927fefe6792b2e78250f9166f2f27237bd6de2d9b5f76a63890081f533d01a76361e90ba1f5519fb8ac3e652c2e264792beec54e

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n7591330.exe

                Filesize

                176KB

                MD5

                913eff4e3b8f603efe375d041934d842

                SHA1

                38b5a804194af72b5d1f88fded9454cdbcd8b4f1

                SHA256

                f51d19ee4a7cb18ebdc453e7e56e1ec1917a7941a66417d2d9bf4a5095f0197c

                SHA512

                70ab79737f5df230a5d71b3f927fefe6792b2e78250f9166f2f27237bd6de2d9b5f76a63890081f533d01a76361e90ba1f5519fb8ac3e652c2e264792beec54e

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y0313048.exe

                Filesize

                319KB

                MD5

                fed409f05746f4c86d3f60d52d0a7c5d

                SHA1

                26a634b4c390f04b4c2e96ee7b971da37dd6d27f

                SHA256

                73fad87b362d8d7b2d8ba67fbbd7bac4af33c040970f17f6dd74b13d86725197

                SHA512

                8cb402c07ed7c26d024457cbbc13532adb0a69ca92eb38bd01dcfbce136d4276f39d1c0eb44f1685e8a2342267299ea2df388f1fe3feffb28a60b8eaf8a58287

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y0313048.exe

                Filesize

                319KB

                MD5

                fed409f05746f4c86d3f60d52d0a7c5d

                SHA1

                26a634b4c390f04b4c2e96ee7b971da37dd6d27f

                SHA256

                73fad87b362d8d7b2d8ba67fbbd7bac4af33c040970f17f6dd74b13d86725197

                SHA512

                8cb402c07ed7c26d024457cbbc13532adb0a69ca92eb38bd01dcfbce136d4276f39d1c0eb44f1685e8a2342267299ea2df388f1fe3feffb28a60b8eaf8a58287

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l9824248.exe

                Filesize

                328KB

                MD5

                8d1f116546f8cc785d0c1c5c7eb08597

                SHA1

                5b66daa7ba7589c4f6a0a31978bd21c1067ff7ca

                SHA256

                000a93b5ffa6face59d7026fff51d53d1c146bcd7509a9403c1db86e3ab3d1c3

                SHA512

                4a18dace968463ddbff6c602e28104cbfba22d382491033b0773337ee7663217637a5de40990ba5a7b712b7266018ee88ee2e9a78ab981066909717a88899218

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l9824248.exe

                Filesize

                328KB

                MD5

                8d1f116546f8cc785d0c1c5c7eb08597

                SHA1

                5b66daa7ba7589c4f6a0a31978bd21c1067ff7ca

                SHA256

                000a93b5ffa6face59d7026fff51d53d1c146bcd7509a9403c1db86e3ab3d1c3

                SHA512

                4a18dace968463ddbff6c602e28104cbfba22d382491033b0773337ee7663217637a5de40990ba5a7b712b7266018ee88ee2e9a78ab981066909717a88899218

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m1795784.exe

                Filesize

                141KB

                MD5

                7d8ce2f7f84932f124346f0e85450efe

                SHA1

                71398d32653071ceb49648ca604ee0057b09a6bf

                SHA256

                09490e0ad9dacee95b08e4db0a39ab429af76145230b2776a5a53b733ae1a34f

                SHA512

                f86ff86d8a07e50c1c6bbc0f5875878b1abdbcd77becf0f60843eeade5880cb3f3e982301b622fe416f29c67f5113d80c2e0a645831732fd5511a1d5a51bbffe

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m1795784.exe

                Filesize

                141KB

                MD5

                7d8ce2f7f84932f124346f0e85450efe

                SHA1

                71398d32653071ceb49648ca604ee0057b09a6bf

                SHA256

                09490e0ad9dacee95b08e4db0a39ab429af76145230b2776a5a53b733ae1a34f

                SHA512

                f86ff86d8a07e50c1c6bbc0f5875878b1abdbcd77becf0f60843eeade5880cb3f3e982301b622fe416f29c67f5113d80c2e0a645831732fd5511a1d5a51bbffe

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                328KB

                MD5

                8d1f116546f8cc785d0c1c5c7eb08597

                SHA1

                5b66daa7ba7589c4f6a0a31978bd21c1067ff7ca

                SHA256

                000a93b5ffa6face59d7026fff51d53d1c146bcd7509a9403c1db86e3ab3d1c3

                SHA512

                4a18dace968463ddbff6c602e28104cbfba22d382491033b0773337ee7663217637a5de40990ba5a7b712b7266018ee88ee2e9a78ab981066909717a88899218

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                328KB

                MD5

                8d1f116546f8cc785d0c1c5c7eb08597

                SHA1

                5b66daa7ba7589c4f6a0a31978bd21c1067ff7ca

                SHA256

                000a93b5ffa6face59d7026fff51d53d1c146bcd7509a9403c1db86e3ab3d1c3

                SHA512

                4a18dace968463ddbff6c602e28104cbfba22d382491033b0773337ee7663217637a5de40990ba5a7b712b7266018ee88ee2e9a78ab981066909717a88899218

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                328KB

                MD5

                8d1f116546f8cc785d0c1c5c7eb08597

                SHA1

                5b66daa7ba7589c4f6a0a31978bd21c1067ff7ca

                SHA256

                000a93b5ffa6face59d7026fff51d53d1c146bcd7509a9403c1db86e3ab3d1c3

                SHA512

                4a18dace968463ddbff6c602e28104cbfba22d382491033b0773337ee7663217637a5de40990ba5a7b712b7266018ee88ee2e9a78ab981066909717a88899218

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                328KB

                MD5

                8d1f116546f8cc785d0c1c5c7eb08597

                SHA1

                5b66daa7ba7589c4f6a0a31978bd21c1067ff7ca

                SHA256

                000a93b5ffa6face59d7026fff51d53d1c146bcd7509a9403c1db86e3ab3d1c3

                SHA512

                4a18dace968463ddbff6c602e28104cbfba22d382491033b0773337ee7663217637a5de40990ba5a7b712b7266018ee88ee2e9a78ab981066909717a88899218

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                328KB

                MD5

                8d1f116546f8cc785d0c1c5c7eb08597

                SHA1

                5b66daa7ba7589c4f6a0a31978bd21c1067ff7ca

                SHA256

                000a93b5ffa6face59d7026fff51d53d1c146bcd7509a9403c1db86e3ab3d1c3

                SHA512

                4a18dace968463ddbff6c602e28104cbfba22d382491033b0773337ee7663217637a5de40990ba5a7b712b7266018ee88ee2e9a78ab981066909717a88899218

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                374bfdcfcf19f4edfe949022092848d2

                SHA1

                df5ee40497e98efcfba30012452d433373d287d4

                SHA256

                224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f

                SHA512

                bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • memory/1960-40-0x0000000000660000-0x0000000000690000-memory.dmp

                Filesize

                192KB

              • memory/1960-47-0x000000000A580000-0x000000000A5CB000-memory.dmp

                Filesize

                300KB

              • memory/1960-48-0x0000000071BB0000-0x000000007229E000-memory.dmp

                Filesize

                6.9MB

              • memory/1960-46-0x000000000A400000-0x000000000A43E000-memory.dmp

                Filesize

                248KB

              • memory/1960-45-0x000000000A3A0000-0x000000000A3B2000-memory.dmp

                Filesize

                72KB

              • memory/1960-44-0x000000000A470000-0x000000000A57A000-memory.dmp

                Filesize

                1.0MB

              • memory/1960-43-0x000000000A8E0000-0x000000000AEE6000-memory.dmp

                Filesize

                6.0MB

              • memory/1960-42-0x00000000028F0000-0x00000000028F6000-memory.dmp

                Filesize

                24KB

              • memory/1960-41-0x0000000071BB0000-0x000000007229E000-memory.dmp

                Filesize

                6.9MB