Analysis

  • max time kernel
    291s
  • max time network
    299s
  • platform
    windows10-1703_x64
  • resource
    win10-20230831-en
  • resource tags

    arch:x64arch:x86image:win10-20230831-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04/09/2023, 03:35

General

  • Target

    c2f8cd41bce88cbab2ad7420003aaa7121c8a7c7c6bd6905f98dbc5aadf3943e.exe

  • Size

    1.5MB

  • MD5

    deaf13fc1c09b2d102e32aa31ff66d0c

  • SHA1

    79d096fa489a637c1c9da39321538b89a0abcecc

  • SHA256

    c2f8cd41bce88cbab2ad7420003aaa7121c8a7c7c6bd6905f98dbc5aadf3943e

  • SHA512

    03fde286751a29f51dbeac658dd6f41f105db1a323f2173b45170ad6243f979f6391f4544ccd23dcfa05da299658bef39ed461afc438dc0cb3620da8593ada4d

  • SSDEEP

    49152:ZiOGG7/RqjKjEQ/HCoJEdWyOPqyWpP+sAD1:EwojKjEQ/DS0sY

Malware Config

Extracted

Family

amadey

Version

3.87

C2

77.91.68.18/nice/index.php

Attributes
  • install_dir

    b40d11255d

  • install_file

    saves.exe

  • strings_key

    fa622dfc42544927a6471829ee1fa9fe

rc4.plain

Extracted

Family

redline

Botnet

gena

C2

77.91.124.82:19071

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c2f8cd41bce88cbab2ad7420003aaa7121c8a7c7c6bd6905f98dbc5aadf3943e.exe
    "C:\Users\Admin\AppData\Local\Temp\c2f8cd41bce88cbab2ad7420003aaa7121c8a7c7c6bd6905f98dbc5aadf3943e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4987605.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4987605.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3236
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6267425.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6267425.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3264
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y5569856.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y5569856.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4800
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l1379573.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l1379573.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4544
            • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
              "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2036
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:940
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1452
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:1404
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "saves.exe" /P "Admin:N"
                    8⤵
                      PID:4464
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "saves.exe" /P "Admin:R" /E
                      8⤵
                        PID:4956
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:3128
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\b40d11255d" /P "Admin:N"
                          8⤵
                            PID:1068
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\b40d11255d" /P "Admin:R" /E
                            8⤵
                              PID:1760
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:4528
                      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m3932860.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m3932860.exe
                        5⤵
                        • Executes dropped EXE
                        PID:2292
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n4812960.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n4812960.exe
                      4⤵
                      • Executes dropped EXE
                      PID:2020
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:4784
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:432

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4987605.exe

                Filesize

                1.4MB

                MD5

                2acabd0302bd18126dd29aa0390eab8a

                SHA1

                e81d3981f720444eb20d3dec3f9aa647cfbca7fb

                SHA256

                5cb96b91f2ae6b0b20e57a0423eb4bac36f00c5247f08a39078ec607f9f05086

                SHA512

                05b1959512ff53d5dd5c59886f0e1cda8a5bb98347af37276ac7dd38eaf2717cd7e2aac9e816182dffea5d61685562401b7e7fd60e9932acce0f88925f852bee

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4987605.exe

                Filesize

                1.4MB

                MD5

                2acabd0302bd18126dd29aa0390eab8a

                SHA1

                e81d3981f720444eb20d3dec3f9aa647cfbca7fb

                SHA256

                5cb96b91f2ae6b0b20e57a0423eb4bac36f00c5247f08a39078ec607f9f05086

                SHA512

                05b1959512ff53d5dd5c59886f0e1cda8a5bb98347af37276ac7dd38eaf2717cd7e2aac9e816182dffea5d61685562401b7e7fd60e9932acce0f88925f852bee

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6267425.exe

                Filesize

                475KB

                MD5

                a6f0df170d1222bf9df9b51eca111fe4

                SHA1

                e2936c698415898dca4cbd0eac0b8f881c0a9b5c

                SHA256

                b5754286d8b151151c455f15cda0875932a76e55ed2cc9adab566a2001638099

                SHA512

                784696c44fff0e03aa0388b7ca64c51b7678c637eaa65856a39eecfe69ce28cfbd3f82dcbc7e4bec16d8d8cae42c19754015e3d1a873b58342e580be8c73860c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6267425.exe

                Filesize

                475KB

                MD5

                a6f0df170d1222bf9df9b51eca111fe4

                SHA1

                e2936c698415898dca4cbd0eac0b8f881c0a9b5c

                SHA256

                b5754286d8b151151c455f15cda0875932a76e55ed2cc9adab566a2001638099

                SHA512

                784696c44fff0e03aa0388b7ca64c51b7678c637eaa65856a39eecfe69ce28cfbd3f82dcbc7e4bec16d8d8cae42c19754015e3d1a873b58342e580be8c73860c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n4812960.exe

                Filesize

                174KB

                MD5

                af5dd0e64289b7ac5286b829b55a68ec

                SHA1

                a7464d6fa57a61772a302879118a9122eb023850

                SHA256

                364444f01be8b271d3a1751c5d2a99f50deb2dd6f7ff01db5de6e74f459ef878

                SHA512

                2277e8b1c8e90d4bcf4593a3cefa1b6cc559529165176bdee62828078503690eb4acce14905ce3d34add6bb56a66981a5887900b9f2db2aba0af16f2c528cebc

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n4812960.exe

                Filesize

                174KB

                MD5

                af5dd0e64289b7ac5286b829b55a68ec

                SHA1

                a7464d6fa57a61772a302879118a9122eb023850

                SHA256

                364444f01be8b271d3a1751c5d2a99f50deb2dd6f7ff01db5de6e74f459ef878

                SHA512

                2277e8b1c8e90d4bcf4593a3cefa1b6cc559529165176bdee62828078503690eb4acce14905ce3d34add6bb56a66981a5887900b9f2db2aba0af16f2c528cebc

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y5569856.exe

                Filesize

                319KB

                MD5

                904c84988351acf59112cdfe286b1f2a

                SHA1

                b152e9003e18d1f501cb33e199e70f4ad421e32f

                SHA256

                435d2ed905f5e863b750ab25fc01ec8970cd2a1697c62992cd68dc7cc3910506

                SHA512

                a84f352bf7240130b0e382b8a2113a7e5f269d6ce927ff493bef5da2b551e3dc47936ba3cb13e7585af837a64c0d6b105943ed866a72599331b899f5d4ad5795

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y5569856.exe

                Filesize

                319KB

                MD5

                904c84988351acf59112cdfe286b1f2a

                SHA1

                b152e9003e18d1f501cb33e199e70f4ad421e32f

                SHA256

                435d2ed905f5e863b750ab25fc01ec8970cd2a1697c62992cd68dc7cc3910506

                SHA512

                a84f352bf7240130b0e382b8a2113a7e5f269d6ce927ff493bef5da2b551e3dc47936ba3cb13e7585af837a64c0d6b105943ed866a72599331b899f5d4ad5795

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l1379573.exe

                Filesize

                334KB

                MD5

                d7c387961476f19954a0d79510d94995

                SHA1

                941aca862a40ab5d23a36d98f652a97954e99f36

                SHA256

                b3d0c7103619e241ec4823e091b4dfe1c8d8107347c824b8f2f5c1028804d76f

                SHA512

                8b896aa9a958d89d9b6290d4c15c2b98b9ff3cbaac0a892b60a4baa32564712d2bed98d2c1e0b56841a7c38dcf58b32a8646e76a644d76938c9c1e00c67bc088

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l1379573.exe

                Filesize

                334KB

                MD5

                d7c387961476f19954a0d79510d94995

                SHA1

                941aca862a40ab5d23a36d98f652a97954e99f36

                SHA256

                b3d0c7103619e241ec4823e091b4dfe1c8d8107347c824b8f2f5c1028804d76f

                SHA512

                8b896aa9a958d89d9b6290d4c15c2b98b9ff3cbaac0a892b60a4baa32564712d2bed98d2c1e0b56841a7c38dcf58b32a8646e76a644d76938c9c1e00c67bc088

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m3932860.exe

                Filesize

                140KB

                MD5

                63f2b0a3437cd6e53bc87ed500515f84

                SHA1

                73ba20e315059fa0eed87c520cc4d8d9f55b21ab

                SHA256

                c2e24d72af0343bd89896469bcd9a05393f4346bf2049f9bb7497feb8d39c730

                SHA512

                09fe709176a132f560c41fbd199aeea367a2fc0b1e57d5ad01a15923f4db15e01a2807db22bc46232241852bc0d45729714be042383eee688969d8c9aebf8681

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m3932860.exe

                Filesize

                140KB

                MD5

                63f2b0a3437cd6e53bc87ed500515f84

                SHA1

                73ba20e315059fa0eed87c520cc4d8d9f55b21ab

                SHA256

                c2e24d72af0343bd89896469bcd9a05393f4346bf2049f9bb7497feb8d39c730

                SHA512

                09fe709176a132f560c41fbd199aeea367a2fc0b1e57d5ad01a15923f4db15e01a2807db22bc46232241852bc0d45729714be042383eee688969d8c9aebf8681

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                334KB

                MD5

                d7c387961476f19954a0d79510d94995

                SHA1

                941aca862a40ab5d23a36d98f652a97954e99f36

                SHA256

                b3d0c7103619e241ec4823e091b4dfe1c8d8107347c824b8f2f5c1028804d76f

                SHA512

                8b896aa9a958d89d9b6290d4c15c2b98b9ff3cbaac0a892b60a4baa32564712d2bed98d2c1e0b56841a7c38dcf58b32a8646e76a644d76938c9c1e00c67bc088

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                334KB

                MD5

                d7c387961476f19954a0d79510d94995

                SHA1

                941aca862a40ab5d23a36d98f652a97954e99f36

                SHA256

                b3d0c7103619e241ec4823e091b4dfe1c8d8107347c824b8f2f5c1028804d76f

                SHA512

                8b896aa9a958d89d9b6290d4c15c2b98b9ff3cbaac0a892b60a4baa32564712d2bed98d2c1e0b56841a7c38dcf58b32a8646e76a644d76938c9c1e00c67bc088

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                334KB

                MD5

                d7c387961476f19954a0d79510d94995

                SHA1

                941aca862a40ab5d23a36d98f652a97954e99f36

                SHA256

                b3d0c7103619e241ec4823e091b4dfe1c8d8107347c824b8f2f5c1028804d76f

                SHA512

                8b896aa9a958d89d9b6290d4c15c2b98b9ff3cbaac0a892b60a4baa32564712d2bed98d2c1e0b56841a7c38dcf58b32a8646e76a644d76938c9c1e00c67bc088

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                334KB

                MD5

                d7c387961476f19954a0d79510d94995

                SHA1

                941aca862a40ab5d23a36d98f652a97954e99f36

                SHA256

                b3d0c7103619e241ec4823e091b4dfe1c8d8107347c824b8f2f5c1028804d76f

                SHA512

                8b896aa9a958d89d9b6290d4c15c2b98b9ff3cbaac0a892b60a4baa32564712d2bed98d2c1e0b56841a7c38dcf58b32a8646e76a644d76938c9c1e00c67bc088

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                334KB

                MD5

                d7c387961476f19954a0d79510d94995

                SHA1

                941aca862a40ab5d23a36d98f652a97954e99f36

                SHA256

                b3d0c7103619e241ec4823e091b4dfe1c8d8107347c824b8f2f5c1028804d76f

                SHA512

                8b896aa9a958d89d9b6290d4c15c2b98b9ff3cbaac0a892b60a4baa32564712d2bed98d2c1e0b56841a7c38dcf58b32a8646e76a644d76938c9c1e00c67bc088

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                374bfdcfcf19f4edfe949022092848d2

                SHA1

                df5ee40497e98efcfba30012452d433373d287d4

                SHA256

                224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f

                SHA512

                bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                5bc0153d2973241b72a38c51a2f72116

                SHA1

                cd9c689663557452631d9f8ff609208b01884a32

                SHA256

                68ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554

                SHA512

                2eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b

              • memory/2020-40-0x0000000000A40000-0x0000000000A70000-memory.dmp

                Filesize

                192KB

              • memory/2020-47-0x0000000005410000-0x000000000545B000-memory.dmp

                Filesize

                300KB

              • memory/2020-48-0x00000000722E0000-0x00000000729CE000-memory.dmp

                Filesize

                6.9MB

              • memory/2020-46-0x00000000053D0000-0x000000000540E000-memory.dmp

                Filesize

                248KB

              • memory/2020-45-0x0000000005250000-0x0000000005262000-memory.dmp

                Filesize

                72KB

              • memory/2020-44-0x00000000054E0000-0x00000000055EA000-memory.dmp

                Filesize

                1.0MB

              • memory/2020-43-0x00000000059E0000-0x0000000005FE6000-memory.dmp

                Filesize

                6.0MB

              • memory/2020-42-0x0000000001370000-0x0000000001376000-memory.dmp

                Filesize

                24KB

              • memory/2020-41-0x00000000722E0000-0x00000000729CE000-memory.dmp

                Filesize

                6.9MB