Analysis

  • max time kernel
    136s
  • max time network
    150s
  • platform
    windows10-1703_x64
  • resource
    win10-20230831-en
  • resource tags

    arch:x64arch:x86image:win10-20230831-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01/09/2023, 07:38

General

  • Target

    5c03b0426a06d2fa9d657df47d79e19757e3b693cb47f0b8234dabd5d85ac0f2.exe

  • Size

    1.4MB

  • MD5

    e6737ab3451790b759609ee52f97a727

  • SHA1

    7094ca19671848b5bd6f3cb16d5e5bcd0c422015

  • SHA256

    5c03b0426a06d2fa9d657df47d79e19757e3b693cb47f0b8234dabd5d85ac0f2

  • SHA512

    a2f2f1fedc7c1951ef3d45aefff78b6d415ef14f92e0ed6b99b820bb01831978a213972b1241292cb2811010cc34eda6270d1f08a9742e377f4b603b06bcd445

  • SSDEEP

    24576:uyY8RB+mmNBdLhZ5fKaFf14H9zCn5JtcyoNwyb6ptPG8PqqzyQcU8F3gbhKOpaAl:9YFlLzBKaFfWH9zCn5EtNw26DnyquU8w

Malware Config

Extracted

Family

amadey

Version

3.87

C2

77.91.68.18/nice/index.php

Attributes
  • install_dir

    b40d11255d

  • install_file

    saves.exe

  • strings_key

    fa622dfc42544927a6471829ee1fa9fe

rc4.plain

Extracted

Family

redline

Botnet

jang

C2

77.91.124.82:19071

Attributes
  • auth_value

    662102010afcbe9e22b13116b1c1a088

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Downloads MZ/PE file
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c03b0426a06d2fa9d657df47d79e19757e3b693cb47f0b8234dabd5d85ac0f2.exe
    "C:\Users\Admin\AppData\Local\Temp\5c03b0426a06d2fa9d657df47d79e19757e3b693cb47f0b8234dabd5d85ac0f2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2920
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2099217.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2099217.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:68
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0952214.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0952214.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2804
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y9766192.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y9766192.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3908
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3479260.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3479260.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3972
            • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
              "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1536
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:220
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2272
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:1756
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "saves.exe" /P "Admin:N"
                    8⤵
                      PID:5008
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "saves.exe" /P "Admin:R" /E
                      8⤵
                        PID:4972
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:4816
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\b40d11255d" /P "Admin:N"
                          8⤵
                            PID:516
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\b40d11255d" /P "Admin:R" /E
                            8⤵
                              PID:4668
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:4232
                      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m6610269.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m6610269.exe
                        5⤵
                        • Executes dropped EXE
                        PID:2696
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n0566086.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n0566086.exe
                      4⤵
                      • Executes dropped EXE
                      PID:4416
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:1812
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:4456
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:4952

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2099217.exe

                Filesize

                1.3MB

                MD5

                bce8c72506a8ab306e4065faebd2ff0b

                SHA1

                bb0d27acf53df020c39cffc94030c2c3ee5c8d4b

                SHA256

                23fe8c5c5438b42b523ec1808292a107f62c46f6d832f43d10e396a58ebcb0f5

                SHA512

                84ce12fef051156d12a9be663c91213129616e135abd07c67d43511c999fcf0091fbdde2485000488736f2e5da37a6497c26c14114416d05e665ba5b969e23bd

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2099217.exe

                Filesize

                1.3MB

                MD5

                bce8c72506a8ab306e4065faebd2ff0b

                SHA1

                bb0d27acf53df020c39cffc94030c2c3ee5c8d4b

                SHA256

                23fe8c5c5438b42b523ec1808292a107f62c46f6d832f43d10e396a58ebcb0f5

                SHA512

                84ce12fef051156d12a9be663c91213129616e135abd07c67d43511c999fcf0091fbdde2485000488736f2e5da37a6497c26c14114416d05e665ba5b969e23bd

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0952214.exe

                Filesize

                475KB

                MD5

                6401efceef67f4f46d426362379995bb

                SHA1

                e9aaefa21185fe2ce01bfd2edf7680af10202fd9

                SHA256

                67eb1b6719a2f2af0284432459dabe449ba8bbc7f39e046ae107e98d9c6f069b

                SHA512

                84b019678dff80da6393bbbc82c843a5c8c694212d13a076204375ef2eb312028a01d03dd03cbbfaa90ce66c489e613dbe308a130ae9aaa1ba3e890046114559

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0952214.exe

                Filesize

                475KB

                MD5

                6401efceef67f4f46d426362379995bb

                SHA1

                e9aaefa21185fe2ce01bfd2edf7680af10202fd9

                SHA256

                67eb1b6719a2f2af0284432459dabe449ba8bbc7f39e046ae107e98d9c6f069b

                SHA512

                84b019678dff80da6393bbbc82c843a5c8c694212d13a076204375ef2eb312028a01d03dd03cbbfaa90ce66c489e613dbe308a130ae9aaa1ba3e890046114559

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n0566086.exe

                Filesize

                174KB

                MD5

                404467f12a8082611f292f728c51441f

                SHA1

                af34b5cc65f46b681a1fef88e290157a88881cfd

                SHA256

                a2ecd2152ea4fae3bec972d9d608212c4b0bcf73e0901992a61008e9096bea3a

                SHA512

                31624ce212d47ec1aeb8a2f8b91a68561b03f9deae40456326eff62123cc973c1d339768a27dc9629e12c71091c7d14d3203de49f142bc434ede9d89742ae2e3

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n0566086.exe

                Filesize

                174KB

                MD5

                404467f12a8082611f292f728c51441f

                SHA1

                af34b5cc65f46b681a1fef88e290157a88881cfd

                SHA256

                a2ecd2152ea4fae3bec972d9d608212c4b0bcf73e0901992a61008e9096bea3a

                SHA512

                31624ce212d47ec1aeb8a2f8b91a68561b03f9deae40456326eff62123cc973c1d339768a27dc9629e12c71091c7d14d3203de49f142bc434ede9d89742ae2e3

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y9766192.exe

                Filesize

                319KB

                MD5

                77bb7b0d4800601f37885db3daab5abd

                SHA1

                4b5b0ef7daae3a43e4b65dfa005878f6713f8ada

                SHA256

                41edaefe830f41993906cb8e3f4e5d51c6064476bcd4003a7ca9e8e39dbf9475

                SHA512

                27d2f1a88913887c4fd41e1893dedef580243559d21bb174efc6e5af87195098b2494798ea28d18f9daefbf5cd14efcafdea83a8d4010e9bdcbc7c76aedb1f60

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y9766192.exe

                Filesize

                319KB

                MD5

                77bb7b0d4800601f37885db3daab5abd

                SHA1

                4b5b0ef7daae3a43e4b65dfa005878f6713f8ada

                SHA256

                41edaefe830f41993906cb8e3f4e5d51c6064476bcd4003a7ca9e8e39dbf9475

                SHA512

                27d2f1a88913887c4fd41e1893dedef580243559d21bb174efc6e5af87195098b2494798ea28d18f9daefbf5cd14efcafdea83a8d4010e9bdcbc7c76aedb1f60

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3479260.exe

                Filesize

                330KB

                MD5

                41366f8e99b10daa19a5c36d3d929bb0

                SHA1

                6038f7140bc9736e54ade39d216cd1d4094f0912

                SHA256

                2a9bdd180c8047cc020719af95e6974a9debe9313ecd52dad52fdcd482dd8da6

                SHA512

                f3bf59bb275d4da2d9459a1ef43954a63e0c85e599cf0b58ab121bf581f317fd726b5a0f9ab68f3ec429e8ad4732d6e0308cac9c9233cf24c5c923dad3a8695b

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3479260.exe

                Filesize

                330KB

                MD5

                41366f8e99b10daa19a5c36d3d929bb0

                SHA1

                6038f7140bc9736e54ade39d216cd1d4094f0912

                SHA256

                2a9bdd180c8047cc020719af95e6974a9debe9313ecd52dad52fdcd482dd8da6

                SHA512

                f3bf59bb275d4da2d9459a1ef43954a63e0c85e599cf0b58ab121bf581f317fd726b5a0f9ab68f3ec429e8ad4732d6e0308cac9c9233cf24c5c923dad3a8695b

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m6610269.exe

                Filesize

                141KB

                MD5

                e6da0ef6b39ee67b3e84cc99e4e7df06

                SHA1

                4f351fb2ceca0bd1f18be41e2324eae2bdd69c8a

                SHA256

                77de41f506cd5f807bd7ebf4ae4f6262d56d801406306e9ffdccf0b1b756bb0b

                SHA512

                ecbe80fe230a6f80efb9dbb1bcc09ec31d1fc5f7342f16ef553439c38990f41718bd4ebe592ba7e7a5e71d1698b1a2414fa2e6193b8dcddab157fe6cb0b3db58

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m6610269.exe

                Filesize

                141KB

                MD5

                e6da0ef6b39ee67b3e84cc99e4e7df06

                SHA1

                4f351fb2ceca0bd1f18be41e2324eae2bdd69c8a

                SHA256

                77de41f506cd5f807bd7ebf4ae4f6262d56d801406306e9ffdccf0b1b756bb0b

                SHA512

                ecbe80fe230a6f80efb9dbb1bcc09ec31d1fc5f7342f16ef553439c38990f41718bd4ebe592ba7e7a5e71d1698b1a2414fa2e6193b8dcddab157fe6cb0b3db58

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                330KB

                MD5

                41366f8e99b10daa19a5c36d3d929bb0

                SHA1

                6038f7140bc9736e54ade39d216cd1d4094f0912

                SHA256

                2a9bdd180c8047cc020719af95e6974a9debe9313ecd52dad52fdcd482dd8da6

                SHA512

                f3bf59bb275d4da2d9459a1ef43954a63e0c85e599cf0b58ab121bf581f317fd726b5a0f9ab68f3ec429e8ad4732d6e0308cac9c9233cf24c5c923dad3a8695b

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                330KB

                MD5

                41366f8e99b10daa19a5c36d3d929bb0

                SHA1

                6038f7140bc9736e54ade39d216cd1d4094f0912

                SHA256

                2a9bdd180c8047cc020719af95e6974a9debe9313ecd52dad52fdcd482dd8da6

                SHA512

                f3bf59bb275d4da2d9459a1ef43954a63e0c85e599cf0b58ab121bf581f317fd726b5a0f9ab68f3ec429e8ad4732d6e0308cac9c9233cf24c5c923dad3a8695b

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                330KB

                MD5

                41366f8e99b10daa19a5c36d3d929bb0

                SHA1

                6038f7140bc9736e54ade39d216cd1d4094f0912

                SHA256

                2a9bdd180c8047cc020719af95e6974a9debe9313ecd52dad52fdcd482dd8da6

                SHA512

                f3bf59bb275d4da2d9459a1ef43954a63e0c85e599cf0b58ab121bf581f317fd726b5a0f9ab68f3ec429e8ad4732d6e0308cac9c9233cf24c5c923dad3a8695b

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                330KB

                MD5

                41366f8e99b10daa19a5c36d3d929bb0

                SHA1

                6038f7140bc9736e54ade39d216cd1d4094f0912

                SHA256

                2a9bdd180c8047cc020719af95e6974a9debe9313ecd52dad52fdcd482dd8da6

                SHA512

                f3bf59bb275d4da2d9459a1ef43954a63e0c85e599cf0b58ab121bf581f317fd726b5a0f9ab68f3ec429e8ad4732d6e0308cac9c9233cf24c5c923dad3a8695b

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                330KB

                MD5

                41366f8e99b10daa19a5c36d3d929bb0

                SHA1

                6038f7140bc9736e54ade39d216cd1d4094f0912

                SHA256

                2a9bdd180c8047cc020719af95e6974a9debe9313ecd52dad52fdcd482dd8da6

                SHA512

                f3bf59bb275d4da2d9459a1ef43954a63e0c85e599cf0b58ab121bf581f317fd726b5a0f9ab68f3ec429e8ad4732d6e0308cac9c9233cf24c5c923dad3a8695b

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                330KB

                MD5

                41366f8e99b10daa19a5c36d3d929bb0

                SHA1

                6038f7140bc9736e54ade39d216cd1d4094f0912

                SHA256

                2a9bdd180c8047cc020719af95e6974a9debe9313ecd52dad52fdcd482dd8da6

                SHA512

                f3bf59bb275d4da2d9459a1ef43954a63e0c85e599cf0b58ab121bf581f317fd726b5a0f9ab68f3ec429e8ad4732d6e0308cac9c9233cf24c5c923dad3a8695b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • memory/4416-40-0x0000000000590000-0x00000000005C0000-memory.dmp

                Filesize

                192KB

              • memory/4416-47-0x000000000A4B0000-0x000000000A4FB000-memory.dmp

                Filesize

                300KB

              • memory/4416-46-0x000000000A330000-0x000000000A36E000-memory.dmp

                Filesize

                248KB

              • memory/4416-49-0x0000000071CC0000-0x00000000723AE000-memory.dmp

                Filesize

                6.9MB

              • memory/4416-45-0x000000000A2D0000-0x000000000A2E2000-memory.dmp

                Filesize

                72KB

              • memory/4416-44-0x000000000A3A0000-0x000000000A4AA000-memory.dmp

                Filesize

                1.0MB

              • memory/4416-43-0x000000000A810000-0x000000000AE16000-memory.dmp

                Filesize

                6.0MB

              • memory/4416-41-0x0000000071CC0000-0x00000000723AE000-memory.dmp

                Filesize

                6.9MB

              • memory/4416-42-0x00000000071E0000-0x00000000071E6000-memory.dmp

                Filesize

                24KB