Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-1703_x64
  • resource
    win10-20230831-en
  • resource tags

    arch:x64arch:x86image:win10-20230831-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01/09/2023, 04:36

General

  • Target

    f0259c6e6c6108cfdad1d50558844d1460f888217c3eaad1649f02871d709c15.exe

  • Size

    1.4MB

  • MD5

    518a2ba92b0737c755a8cfb27a03d1ec

  • SHA1

    080277b5dfab7af1f3cb3fd7b7925167b0341b48

  • SHA256

    f0259c6e6c6108cfdad1d50558844d1460f888217c3eaad1649f02871d709c15

  • SHA512

    04cce8d4d0ae47418e122e9f55654cb44131296cddb506c442745fcce106724c6e4b611fd43fd5933c632fa1964c798c20ff235d775cbd5e10586814007fd91b

  • SSDEEP

    24576:TyGSF/B7nz7ZDKxXByndVS7zWtGuWslL2d9SV0HAp9guPD:mGSZRnzlDKxXBaQfWtG1E2vSF48

Malware Config

Extracted

Family

amadey

Version

3.87

C2

77.91.68.18/nice/index.php

Attributes
  • install_dir

    b40d11255d

  • install_file

    saves.exe

  • strings_key

    fa622dfc42544927a6471829ee1fa9fe

rc4.plain

Extracted

Family

redline

Botnet

jang

C2

77.91.124.82:19071

Attributes
  • auth_value

    662102010afcbe9e22b13116b1c1a088

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0259c6e6c6108cfdad1d50558844d1460f888217c3eaad1649f02871d709c15.exe
    "C:\Users\Admin\AppData\Local\Temp\f0259c6e6c6108cfdad1d50558844d1460f888217c3eaad1649f02871d709c15.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1544
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6388836.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6388836.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2028
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3377175.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3377175.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4732
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y6793293.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y6793293.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:5116
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l1901421.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l1901421.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1032
            • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
              "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:3560
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:2996
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:196
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:3168
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "saves.exe" /P "Admin:N"
                    8⤵
                      PID:4868
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "saves.exe" /P "Admin:R" /E
                      8⤵
                        PID:4768
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:4516
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\b40d11255d" /P "Admin:N"
                          8⤵
                            PID:1748
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\b40d11255d" /P "Admin:R" /E
                            8⤵
                              PID:3240
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:5056
                      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m7116212.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m7116212.exe
                        5⤵
                        • Executes dropped EXE
                        PID:4712
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n2949316.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n2949316.exe
                      4⤵
                      • Executes dropped EXE
                      PID:3576
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:216
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:2136
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:3428

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6388836.exe

                Filesize

                1.3MB

                MD5

                048361369dd9b511e99ee47a00239bd6

                SHA1

                a94f2e99c3fe098e792e2204f7ba5e5a371c3184

                SHA256

                f6e125549ff3f67b06b089371988c4b7141d48caebe0f660e7bed986feb6bdf0

                SHA512

                cec107240026fbfa5696c04829ed70f30683d2b71e21fbfb812f60a4a95c188f4b2ca341524fcc7808b2ae42d7670226b414ef2ea8e5dda8263d9b509db45132

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6388836.exe

                Filesize

                1.3MB

                MD5

                048361369dd9b511e99ee47a00239bd6

                SHA1

                a94f2e99c3fe098e792e2204f7ba5e5a371c3184

                SHA256

                f6e125549ff3f67b06b089371988c4b7141d48caebe0f660e7bed986feb6bdf0

                SHA512

                cec107240026fbfa5696c04829ed70f30683d2b71e21fbfb812f60a4a95c188f4b2ca341524fcc7808b2ae42d7670226b414ef2ea8e5dda8263d9b509db45132

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3377175.exe

                Filesize

                475KB

                MD5

                a9a76ff9e68b5d3ba8a0de4a8d9dd682

                SHA1

                d573c9c448509f8f0ca4b71b7a491feecdd8fbe1

                SHA256

                062397cb88e805b95b1ab431eff7b3c81a9b82461edbddac7b7c5688727c4d56

                SHA512

                ad0a495a6b8df00d25310af81fa28f89fdd46c4963e194bfbf6948171aae7bddbc28fb68a37b2e16bf8a08fafdb9124bb4f2d6a4d6feda20702d3a1f83b45f62

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3377175.exe

                Filesize

                475KB

                MD5

                a9a76ff9e68b5d3ba8a0de4a8d9dd682

                SHA1

                d573c9c448509f8f0ca4b71b7a491feecdd8fbe1

                SHA256

                062397cb88e805b95b1ab431eff7b3c81a9b82461edbddac7b7c5688727c4d56

                SHA512

                ad0a495a6b8df00d25310af81fa28f89fdd46c4963e194bfbf6948171aae7bddbc28fb68a37b2e16bf8a08fafdb9124bb4f2d6a4d6feda20702d3a1f83b45f62

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n2949316.exe

                Filesize

                174KB

                MD5

                0eb84db69076963cb88408c4090aaa84

                SHA1

                5dd2fc54db9b5bf7b0790321f87b6b1521d3a741

                SHA256

                10e25d4801c2a8a95dd2423ca82b67337b6d89e19b89efc9f066f25b7b6a9db8

                SHA512

                c6833bae1f51755dd07adf6c9413210bff3e988455fe3fa75467caef0c8457da6239753c66a01b504f25befe2076f79fe5856550f36948b45441b9f9be2bb760

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n2949316.exe

                Filesize

                174KB

                MD5

                0eb84db69076963cb88408c4090aaa84

                SHA1

                5dd2fc54db9b5bf7b0790321f87b6b1521d3a741

                SHA256

                10e25d4801c2a8a95dd2423ca82b67337b6d89e19b89efc9f066f25b7b6a9db8

                SHA512

                c6833bae1f51755dd07adf6c9413210bff3e988455fe3fa75467caef0c8457da6239753c66a01b504f25befe2076f79fe5856550f36948b45441b9f9be2bb760

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y6793293.exe

                Filesize

                319KB

                MD5

                194108411236bbff99d4d777ee85d637

                SHA1

                9ead4cc61e57a120f0a2314001e6d4dfe2316b0a

                SHA256

                81de9c6117895394b8049fc5ecb3a8ab9a03476156b8cbe04d1bc8987a5920ae

                SHA512

                8591858aeb7064e8b3119fbc7c9e1c86cd992a8e0fb6ea4c10dae64900b54a6c896581214c9e0ca3bc79df4bc34a1e213171894143e21f067ccf2bdcc1423e89

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y6793293.exe

                Filesize

                319KB

                MD5

                194108411236bbff99d4d777ee85d637

                SHA1

                9ead4cc61e57a120f0a2314001e6d4dfe2316b0a

                SHA256

                81de9c6117895394b8049fc5ecb3a8ab9a03476156b8cbe04d1bc8987a5920ae

                SHA512

                8591858aeb7064e8b3119fbc7c9e1c86cd992a8e0fb6ea4c10dae64900b54a6c896581214c9e0ca3bc79df4bc34a1e213171894143e21f067ccf2bdcc1423e89

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l1901421.exe

                Filesize

                329KB

                MD5

                d572e9e758216bcb1c9a12136c0b482a

                SHA1

                b120ad31e5a6ed9e0fe76a08b053418be164ff9a

                SHA256

                de8608844911dab1d00ab3d6d1fe1c82293f1ff8ba9545b6b5300fc999b23363

                SHA512

                5371970be14742d75716bca25d430660f781aead282d004fc16ace49e66c6eb050a77c053f505669c8503f3463618242ccbd4713cba6efd168e5923ed25c02d8

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l1901421.exe

                Filesize

                329KB

                MD5

                d572e9e758216bcb1c9a12136c0b482a

                SHA1

                b120ad31e5a6ed9e0fe76a08b053418be164ff9a

                SHA256

                de8608844911dab1d00ab3d6d1fe1c82293f1ff8ba9545b6b5300fc999b23363

                SHA512

                5371970be14742d75716bca25d430660f781aead282d004fc16ace49e66c6eb050a77c053f505669c8503f3463618242ccbd4713cba6efd168e5923ed25c02d8

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m7116212.exe

                Filesize

                141KB

                MD5

                a1017a9a18a070ad9896eb733450381d

                SHA1

                6a23189167b80b4b452cb1801a98a6da79b196c4

                SHA256

                37bfdde568d5a4decb41c18a52a6b89ed785a5fb79ebd00796cf59aad6dea53b

                SHA512

                2351dc88cddef6fbfe8af3a5a9abb10c6e95ebff4cdbd5f5a48963dd77bb64297cb0a037beaec03c14d89c50ce9380c9a82438db80ffee10d0b7bd02a73a30c7

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m7116212.exe

                Filesize

                141KB

                MD5

                a1017a9a18a070ad9896eb733450381d

                SHA1

                6a23189167b80b4b452cb1801a98a6da79b196c4

                SHA256

                37bfdde568d5a4decb41c18a52a6b89ed785a5fb79ebd00796cf59aad6dea53b

                SHA512

                2351dc88cddef6fbfe8af3a5a9abb10c6e95ebff4cdbd5f5a48963dd77bb64297cb0a037beaec03c14d89c50ce9380c9a82438db80ffee10d0b7bd02a73a30c7

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                329KB

                MD5

                d572e9e758216bcb1c9a12136c0b482a

                SHA1

                b120ad31e5a6ed9e0fe76a08b053418be164ff9a

                SHA256

                de8608844911dab1d00ab3d6d1fe1c82293f1ff8ba9545b6b5300fc999b23363

                SHA512

                5371970be14742d75716bca25d430660f781aead282d004fc16ace49e66c6eb050a77c053f505669c8503f3463618242ccbd4713cba6efd168e5923ed25c02d8

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                329KB

                MD5

                d572e9e758216bcb1c9a12136c0b482a

                SHA1

                b120ad31e5a6ed9e0fe76a08b053418be164ff9a

                SHA256

                de8608844911dab1d00ab3d6d1fe1c82293f1ff8ba9545b6b5300fc999b23363

                SHA512

                5371970be14742d75716bca25d430660f781aead282d004fc16ace49e66c6eb050a77c053f505669c8503f3463618242ccbd4713cba6efd168e5923ed25c02d8

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                329KB

                MD5

                d572e9e758216bcb1c9a12136c0b482a

                SHA1

                b120ad31e5a6ed9e0fe76a08b053418be164ff9a

                SHA256

                de8608844911dab1d00ab3d6d1fe1c82293f1ff8ba9545b6b5300fc999b23363

                SHA512

                5371970be14742d75716bca25d430660f781aead282d004fc16ace49e66c6eb050a77c053f505669c8503f3463618242ccbd4713cba6efd168e5923ed25c02d8

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                329KB

                MD5

                d572e9e758216bcb1c9a12136c0b482a

                SHA1

                b120ad31e5a6ed9e0fe76a08b053418be164ff9a

                SHA256

                de8608844911dab1d00ab3d6d1fe1c82293f1ff8ba9545b6b5300fc999b23363

                SHA512

                5371970be14742d75716bca25d430660f781aead282d004fc16ace49e66c6eb050a77c053f505669c8503f3463618242ccbd4713cba6efd168e5923ed25c02d8

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                329KB

                MD5

                d572e9e758216bcb1c9a12136c0b482a

                SHA1

                b120ad31e5a6ed9e0fe76a08b053418be164ff9a

                SHA256

                de8608844911dab1d00ab3d6d1fe1c82293f1ff8ba9545b6b5300fc999b23363

                SHA512

                5371970be14742d75716bca25d430660f781aead282d004fc16ace49e66c6eb050a77c053f505669c8503f3463618242ccbd4713cba6efd168e5923ed25c02d8

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                329KB

                MD5

                d572e9e758216bcb1c9a12136c0b482a

                SHA1

                b120ad31e5a6ed9e0fe76a08b053418be164ff9a

                SHA256

                de8608844911dab1d00ab3d6d1fe1c82293f1ff8ba9545b6b5300fc999b23363

                SHA512

                5371970be14742d75716bca25d430660f781aead282d004fc16ace49e66c6eb050a77c053f505669c8503f3463618242ccbd4713cba6efd168e5923ed25c02d8

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                374bfdcfcf19f4edfe949022092848d2

                SHA1

                df5ee40497e98efcfba30012452d433373d287d4

                SHA256

                224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f

                SHA512

                bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • memory/3576-40-0x00000000009C0000-0x00000000009F0000-memory.dmp

                Filesize

                192KB

              • memory/3576-48-0x00000000727C0000-0x0000000072EAE000-memory.dmp

                Filesize

                6.9MB

              • memory/3576-47-0x000000000A8F0000-0x000000000A93B000-memory.dmp

                Filesize

                300KB

              • memory/3576-46-0x000000000A760000-0x000000000A79E000-memory.dmp

                Filesize

                248KB

              • memory/3576-45-0x000000000A700000-0x000000000A712000-memory.dmp

                Filesize

                72KB

              • memory/3576-44-0x000000000A7E0000-0x000000000A8EA000-memory.dmp

                Filesize

                1.0MB

              • memory/3576-43-0x000000000ACA0000-0x000000000B2A6000-memory.dmp

                Filesize

                6.0MB

              • memory/3576-42-0x0000000001240000-0x0000000001246000-memory.dmp

                Filesize

                24KB

              • memory/3576-41-0x00000000727C0000-0x0000000072EAE000-memory.dmp

                Filesize

                6.9MB