Analysis

  • max time kernel
    161s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/10/2023, 15:24

General

  • Target

    NEAS.2b198aff602b3b9ed8acf4cfe5c3e6c668136a23382975f8153a715500a9be8bexe_JC.exe

  • Size

    829KB

  • MD5

    216adc8e8191cbd9ae4992f2e125f41c

  • SHA1

    fd7ae9673cb0b1c56a11b9b049adbf7179517c5a

  • SHA256

    2b198aff602b3b9ed8acf4cfe5c3e6c668136a23382975f8153a715500a9be8b

  • SHA512

    772858d85743fbdccc44d78d6d80e8a5d696f1a3a5b45eba9e93e9bcc06fee42295d80ea96d3993573ff82b7fe66ea066a32276d098ac1bacf82249d0daaef65

  • SSDEEP

    24576:ZycXSRbPFcK6gSCpgdZzo9bWlfixG2T8q8JFA:MbSGSdZU9DxnT18J

Malware Config

Extracted

Family

amadey

Version

3.87

C2

http://77.91.68.18/nice/index.php

Attributes
  • install_dir

    b40d11255d

  • install_file

    saves.exe

  • strings_key

    fa622dfc42544927a6471829ee1fa9fe

rc4.plain

Extracted

Family

redline

Botnet

mrak

C2

77.91.124.82:19071

Attributes
  • auth_value

    7d9a335ab5dfd42d374867c96fe25302

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.2b198aff602b3b9ed8acf4cfe5c3e6c668136a23382975f8153a715500a9be8bexe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.2b198aff602b3b9ed8acf4cfe5c3e6c668136a23382975f8153a715500a9be8bexe_JC.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5651440.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5651440.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4580
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9008876.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9008876.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4572
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2571223.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2571223.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2296
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7852185.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7852185.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4928
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a2595699.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a2595699.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4304
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b2186658.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b2186658.exe
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1628
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
                7⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:3912
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                  8⤵
                  • Creates scheduled task(s)
                  PID:4312
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4456
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    9⤵
                      PID:4976
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "saves.exe" /P "Admin:N"
                      9⤵
                        PID:1848
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "saves.exe" /P "Admin:R" /E
                        9⤵
                          PID:112
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                          9⤵
                            PID:4972
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\b40d11255d" /P "Admin:N"
                            9⤵
                              PID:1308
                            • C:\Windows\SysWOW64\cacls.exe
                              CACLS "..\b40d11255d" /P "Admin:R" /E
                              9⤵
                                PID:2836
                      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c4606788.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c4606788.exe
                        5⤵
                        • Executes dropped EXE
                        PID:2248
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:820
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:1504

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5651440.exe

                Filesize

                723KB

                MD5

                fa50c0e7dda96431e100a223860ae0c4

                SHA1

                ba446115af6ee1d3baa0b9eaf265cac22b02227e

                SHA256

                f59f252c4f1fd0eb56576e6b22ae3adbbe26435d0fb97a0f152c156b18d8615d

                SHA512

                b587d81220680abea7671bd728b7cc81556b07d7358e9c0df2e2a39a15091bc6f5d014d86b23b863290915a46cba11e1e25f9e91762df4dc58199da0a0711d41

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5651440.exe

                Filesize

                723KB

                MD5

                fa50c0e7dda96431e100a223860ae0c4

                SHA1

                ba446115af6ee1d3baa0b9eaf265cac22b02227e

                SHA256

                f59f252c4f1fd0eb56576e6b22ae3adbbe26435d0fb97a0f152c156b18d8615d

                SHA512

                b587d81220680abea7671bd728b7cc81556b07d7358e9c0df2e2a39a15091bc6f5d014d86b23b863290915a46cba11e1e25f9e91762df4dc58199da0a0711d41

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9008876.exe

                Filesize

                599KB

                MD5

                62bdecd4b02ff5bfe4910304ac78d328

                SHA1

                bce8bc2e31136c5438173eb52472652ca88f6810

                SHA256

                0f226be4668e344cb06bda7b062ed074e7004b1ae2c64040c781947ba66680a9

                SHA512

                29fb41b601a2308ae1b41a048f0bf3fbdafb4066fee830a09563cdb2aaee936b17c4098c95288b6da08c68ec4796e3da4af147f67f2266411dfd96ca5b7f8966

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9008876.exe

                Filesize

                599KB

                MD5

                62bdecd4b02ff5bfe4910304ac78d328

                SHA1

                bce8bc2e31136c5438173eb52472652ca88f6810

                SHA256

                0f226be4668e344cb06bda7b062ed074e7004b1ae2c64040c781947ba66680a9

                SHA512

                29fb41b601a2308ae1b41a048f0bf3fbdafb4066fee830a09563cdb2aaee936b17c4098c95288b6da08c68ec4796e3da4af147f67f2266411dfd96ca5b7f8966

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2571223.exe

                Filesize

                433KB

                MD5

                827e7c45fb0d67ed9847833da9143928

                SHA1

                96f197712bfa225cfa7ba9f74bb882cb035ca707

                SHA256

                da9eac8f73e5db7e46d484788305132fc806fed90d03d1d555df6200ef27c925

                SHA512

                e7f69c00b8bc69f0e5480a30f93a5d62ed61db68d1b29db976e81fff73131cc3a733dbe67ee380b7a0c016e226158395f0bf23fb9a18b786d756e62b3104e0cc

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2571223.exe

                Filesize

                433KB

                MD5

                827e7c45fb0d67ed9847833da9143928

                SHA1

                96f197712bfa225cfa7ba9f74bb882cb035ca707

                SHA256

                da9eac8f73e5db7e46d484788305132fc806fed90d03d1d555df6200ef27c925

                SHA512

                e7f69c00b8bc69f0e5480a30f93a5d62ed61db68d1b29db976e81fff73131cc3a733dbe67ee380b7a0c016e226158395f0bf23fb9a18b786d756e62b3104e0cc

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c4606788.exe

                Filesize

                174KB

                MD5

                61671dc45463122c6404e89f74f2fc74

                SHA1

                954f4012891145d12ec8a791c8326bb51c1c163b

                SHA256

                842fa8287a23c4ed02d59be8191337d308a69fdfb4ba528304a15b37d48f8a48

                SHA512

                2a3403fc38f9ead35d5214aa77954ead585326aafec58805352c0df77ae0266402c21742aa6205b6acbbe2620b867284aa34a91097dac83c70876ab005b80394

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c4606788.exe

                Filesize

                174KB

                MD5

                61671dc45463122c6404e89f74f2fc74

                SHA1

                954f4012891145d12ec8a791c8326bb51c1c163b

                SHA256

                842fa8287a23c4ed02d59be8191337d308a69fdfb4ba528304a15b37d48f8a48

                SHA512

                2a3403fc38f9ead35d5214aa77954ead585326aafec58805352c0df77ae0266402c21742aa6205b6acbbe2620b867284aa34a91097dac83c70876ab005b80394

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7852185.exe

                Filesize

                277KB

                MD5

                f70efe5f2c4276941b8eb003c1364390

                SHA1

                e28d70600889c4bc4b4366c08300b341f0a495d8

                SHA256

                4ada59b1eb198ebd8d5ca40855c02a62e1fb25221555fde9b439091eb2c0b3aa

                SHA512

                89ba959aff10852959f39c4c6f0a92da6b4185b199f4bc2c0e6f3ad6336a44762f0f83a1e9b2854ebb91815016d4439362390fbb8804decde72c610b4f537aaf

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7852185.exe

                Filesize

                277KB

                MD5

                f70efe5f2c4276941b8eb003c1364390

                SHA1

                e28d70600889c4bc4b4366c08300b341f0a495d8

                SHA256

                4ada59b1eb198ebd8d5ca40855c02a62e1fb25221555fde9b439091eb2c0b3aa

                SHA512

                89ba959aff10852959f39c4c6f0a92da6b4185b199f4bc2c0e6f3ad6336a44762f0f83a1e9b2854ebb91815016d4439362390fbb8804decde72c610b4f537aaf

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a2595699.exe

                Filesize

                11KB

                MD5

                bbd440498315e029d0707a934d76cb98

                SHA1

                36503d21cccc67be0c8143f51d066f7c0d9ad3b0

                SHA256

                5256ce16ffd51bb8705484957104fd08108954094c1a63e96af68624a4ec23a3

                SHA512

                5d42afbcdcfa1ceab806af9a6547f9c1b880ba8ed8ef75d4abaa6c8523ca91018afc8d852ab6f4b63833db6d8edb2e48dae4bab12709140ddcd8fd3c978c3cd3

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a2595699.exe

                Filesize

                11KB

                MD5

                bbd440498315e029d0707a934d76cb98

                SHA1

                36503d21cccc67be0c8143f51d066f7c0d9ad3b0

                SHA256

                5256ce16ffd51bb8705484957104fd08108954094c1a63e96af68624a4ec23a3

                SHA512

                5d42afbcdcfa1ceab806af9a6547f9c1b880ba8ed8ef75d4abaa6c8523ca91018afc8d852ab6f4b63833db6d8edb2e48dae4bab12709140ddcd8fd3c978c3cd3

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b2186658.exe

                Filesize

                338KB

                MD5

                9058fce4d8601c64ffcce94edf58d97e

                SHA1

                d5b958f8488fee81b687e034f353a5f1d9854dc8

                SHA256

                22d507c4b58e8a7de8ef53e3eb748c7a0edc5af444f3ef734f03612d825dddf0

                SHA512

                c5639565369ba89a9cb8cc9c223cf05a6efa8e0dfe7cf4bf01d8c9e34eeecd26a40f3aae7048eb982e4fff3446697452eb5f7b8d48e8f3779f3c74ab929ecfba

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b2186658.exe

                Filesize

                338KB

                MD5

                9058fce4d8601c64ffcce94edf58d97e

                SHA1

                d5b958f8488fee81b687e034f353a5f1d9854dc8

                SHA256

                22d507c4b58e8a7de8ef53e3eb748c7a0edc5af444f3ef734f03612d825dddf0

                SHA512

                c5639565369ba89a9cb8cc9c223cf05a6efa8e0dfe7cf4bf01d8c9e34eeecd26a40f3aae7048eb982e4fff3446697452eb5f7b8d48e8f3779f3c74ab929ecfba

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                338KB

                MD5

                9058fce4d8601c64ffcce94edf58d97e

                SHA1

                d5b958f8488fee81b687e034f353a5f1d9854dc8

                SHA256

                22d507c4b58e8a7de8ef53e3eb748c7a0edc5af444f3ef734f03612d825dddf0

                SHA512

                c5639565369ba89a9cb8cc9c223cf05a6efa8e0dfe7cf4bf01d8c9e34eeecd26a40f3aae7048eb982e4fff3446697452eb5f7b8d48e8f3779f3c74ab929ecfba

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                338KB

                MD5

                9058fce4d8601c64ffcce94edf58d97e

                SHA1

                d5b958f8488fee81b687e034f353a5f1d9854dc8

                SHA256

                22d507c4b58e8a7de8ef53e3eb748c7a0edc5af444f3ef734f03612d825dddf0

                SHA512

                c5639565369ba89a9cb8cc9c223cf05a6efa8e0dfe7cf4bf01d8c9e34eeecd26a40f3aae7048eb982e4fff3446697452eb5f7b8d48e8f3779f3c74ab929ecfba

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                338KB

                MD5

                9058fce4d8601c64ffcce94edf58d97e

                SHA1

                d5b958f8488fee81b687e034f353a5f1d9854dc8

                SHA256

                22d507c4b58e8a7de8ef53e3eb748c7a0edc5af444f3ef734f03612d825dddf0

                SHA512

                c5639565369ba89a9cb8cc9c223cf05a6efa8e0dfe7cf4bf01d8c9e34eeecd26a40f3aae7048eb982e4fff3446697452eb5f7b8d48e8f3779f3c74ab929ecfba

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                338KB

                MD5

                9058fce4d8601c64ffcce94edf58d97e

                SHA1

                d5b958f8488fee81b687e034f353a5f1d9854dc8

                SHA256

                22d507c4b58e8a7de8ef53e3eb748c7a0edc5af444f3ef734f03612d825dddf0

                SHA512

                c5639565369ba89a9cb8cc9c223cf05a6efa8e0dfe7cf4bf01d8c9e34eeecd26a40f3aae7048eb982e4fff3446697452eb5f7b8d48e8f3779f3c74ab929ecfba

              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe

                Filesize

                338KB

                MD5

                9058fce4d8601c64ffcce94edf58d97e

                SHA1

                d5b958f8488fee81b687e034f353a5f1d9854dc8

                SHA256

                22d507c4b58e8a7de8ef53e3eb748c7a0edc5af444f3ef734f03612d825dddf0

                SHA512

                c5639565369ba89a9cb8cc9c223cf05a6efa8e0dfe7cf4bf01d8c9e34eeecd26a40f3aae7048eb982e4fff3446697452eb5f7b8d48e8f3779f3c74ab929ecfba

              • memory/2248-58-0x0000000004C30000-0x0000000004D3A000-memory.dmp

                Filesize

                1.0MB

              • memory/2248-60-0x0000000004A10000-0x0000000004A20000-memory.dmp

                Filesize

                64KB

              • memory/2248-55-0x00000000733B0000-0x0000000073B60000-memory.dmp

                Filesize

                7.7MB

              • memory/2248-56-0x0000000002460000-0x0000000002466000-memory.dmp

                Filesize

                24KB

              • memory/2248-57-0x0000000005140000-0x0000000005758000-memory.dmp

                Filesize

                6.1MB

              • memory/2248-64-0x0000000004A10000-0x0000000004A20000-memory.dmp

                Filesize

                64KB

              • memory/2248-59-0x00000000049E0000-0x00000000049F2000-memory.dmp

                Filesize

                72KB

              • memory/2248-54-0x0000000000030000-0x0000000000060000-memory.dmp

                Filesize

                192KB

              • memory/2248-61-0x0000000004B60000-0x0000000004B9C000-memory.dmp

                Filesize

                240KB

              • memory/2248-62-0x0000000004BA0000-0x0000000004BEC000-memory.dmp

                Filesize

                304KB

              • memory/2248-63-0x00000000733B0000-0x0000000073B60000-memory.dmp

                Filesize

                7.7MB

              • memory/4304-38-0x00007FFE44B30000-0x00007FFE455F1000-memory.dmp

                Filesize

                10.8MB

              • memory/4304-35-0x00000000004D0000-0x00000000004DA000-memory.dmp

                Filesize

                40KB

              • memory/4304-36-0x00007FFE44B30000-0x00007FFE455F1000-memory.dmp

                Filesize

                10.8MB