Analysis

  • max time kernel
    13s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-11-2023 07:42

General

  • Target

    14036ad3ff4a39661fe959372026978a0f8a187e1c60d5894b204ea5a71b3af7.exe

  • Size

    706KB

  • MD5

    2cdd911dbcaf5da3660dc87782356340

  • SHA1

    ae6e61a78334287d7b28b585776702f789c4052e

  • SHA256

    14036ad3ff4a39661fe959372026978a0f8a187e1c60d5894b204ea5a71b3af7

  • SHA512

    5e7bda3a6246e0267a43bbdc36f597b95d79d23f8273811d00a07c2ddb373d6631bfa25a96ef796fb32c7eed55a79cff1a4522c69107b02e04233b2b6973fd2a

  • SSDEEP

    12288:TMr5y90xy53WsfYUIKkOtMqnou0RrmMu8RELL0XVr3AbWstxlC3VVyIkd5E4:yyX5msdI4WqnozrmMucy0lrAb3lC3VVi

Malware Config

Extracted

Family

amadey

Version

3.87

C2

http://77.91.68.18/nice/index.php

Attributes
  • install_dir

    b40d11255d

  • install_file

    saves.exe

  • strings_key

    fa622dfc42544927a6471829ee1fa9fe

rc4.plain

Extracted

Family

redline

Botnet

gena

C2

77.91.124.82:19071

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Mystic stealer payload 2 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14036ad3ff4a39661fe959372026978a0f8a187e1c60d5894b204ea5a71b3af7.exe
    "C:\Users\Admin\AppData\Local\Temp\14036ad3ff4a39661fe959372026978a0f8a187e1c60d5894b204ea5a71b3af7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5004
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6879622.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6879622.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1120
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1005189.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1005189.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4176
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\q3496115.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\q3496115.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1740
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r1332548.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r1332548.exe
          4⤵
          • Executes dropped EXE
          PID:4364
          • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
            "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
            5⤵
              PID:1656
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s3751359.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s3751359.exe
          3⤵
            PID:2252
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t1406730.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t1406730.exe
          2⤵
            PID:1612
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
          1⤵
            PID:1700
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              2⤵
                PID:2688
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "saves.exe" /P "Admin:N"
                2⤵
                  PID:4504
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\b40d11255d" /P "Admin:N"
                  2⤵
                    PID:4260
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\b40d11255d" /P "Admin:R" /E
                    2⤵
                      PID:4300
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      2⤵
                        PID:2536
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "saves.exe" /P "Admin:R" /E
                        2⤵
                          PID:1516
                      • C:\Windows\SysWOW64\schtasks.exe
                        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                        1⤵
                        • Creates scheduled task(s)
                        PID:532
                      • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                        C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                        1⤵
                          PID:4040
                        • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                          C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                          1⤵
                            PID:4696

                          Network

                          MITRE ATT&CK Matrix ATT&CK v13

                          Execution

                          Scheduled Task/Job

                          1
                          T1053

                          Persistence

                          Create or Modify System Process

                          1
                          T1543

                          Windows Service

                          1
                          T1543.003

                          Boot or Logon Autostart Execution

                          1
                          T1547

                          Registry Run Keys / Startup Folder

                          1
                          T1547.001

                          Scheduled Task/Job

                          1
                          T1053

                          Privilege Escalation

                          Create or Modify System Process

                          1
                          T1543

                          Windows Service

                          1
                          T1543.003

                          Boot or Logon Autostart Execution

                          1
                          T1547

                          Registry Run Keys / Startup Folder

                          1
                          T1547.001

                          Scheduled Task/Job

                          1
                          T1053

                          Defense Evasion

                          Modify Registry

                          3
                          T1112

                          Impair Defenses

                          2
                          T1562

                          Disable or Modify Tools

                          2
                          T1562.001

                          Discovery

                          System Information Discovery

                          1
                          T1082

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t1406730.exe
                            Filesize

                            174KB

                            MD5

                            5e1bd94281ec6ee28e7ae55f08edb8fa

                            SHA1

                            60f6b7804df8ef9474c72cb64f937ecc708fc2d8

                            SHA256

                            7ec7ab3ea18594dbe37f844021e2534352a827728528a810f805c929fce28965

                            SHA512

                            9db3f4c96efdd40aeb9f753b0b672768d50ee2dd29da70f7add44b1aef4f1ecfd0eaccb815eec8b38d2d53e588b4361a9ee83baffc3c47f3524ca2d6881e40f5

                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t1406730.exe
                            Filesize

                            174KB

                            MD5

                            5e1bd94281ec6ee28e7ae55f08edb8fa

                            SHA1

                            60f6b7804df8ef9474c72cb64f937ecc708fc2d8

                            SHA256

                            7ec7ab3ea18594dbe37f844021e2534352a827728528a810f805c929fce28965

                            SHA512

                            9db3f4c96efdd40aeb9f753b0b672768d50ee2dd29da70f7add44b1aef4f1ecfd0eaccb815eec8b38d2d53e588b4361a9ee83baffc3c47f3524ca2d6881e40f5

                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6879622.exe
                            Filesize

                            550KB

                            MD5

                            7ea441a830054683f511e820e7c565b8

                            SHA1

                            b8b570a4c9c7966fb7f9bac284511d71e2f66b58

                            SHA256

                            8061dcf2211a05ccc9f46629df5b9824bfe7454d2051b3a833c3103c9288f0ff

                            SHA512

                            38d33c603a05dde35ab32858ec6ed56b416698c889d91da65c547e5bf8f60a021a069ceba4677354436c2485f66bd475e8f65c28e94277cf07e2b91c2d513f89

                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6879622.exe
                            Filesize

                            550KB

                            MD5

                            7ea441a830054683f511e820e7c565b8

                            SHA1

                            b8b570a4c9c7966fb7f9bac284511d71e2f66b58

                            SHA256

                            8061dcf2211a05ccc9f46629df5b9824bfe7454d2051b3a833c3103c9288f0ff

                            SHA512

                            38d33c603a05dde35ab32858ec6ed56b416698c889d91da65c547e5bf8f60a021a069ceba4677354436c2485f66bd475e8f65c28e94277cf07e2b91c2d513f89

                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s3751359.exe
                            Filesize

                            141KB

                            MD5

                            d992c7858ab71d88a84f38c0b696f5ac

                            SHA1

                            739c1b028f123dfd318666c193e5d7c7f6089474

                            SHA256

                            cea420d575cb741812097cef74644505d558704fe2f8f9f97cb22362c8c8deb6

                            SHA512

                            ed32bdb91699ab5336ffca4b30373984522c395ab852ee2dff2259dc9e9820f1182b9ab93c590e84e9d4749b599a43477bcc545ad57f194bbf99344949aa78bd

                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s3751359.exe
                            Filesize

                            141KB

                            MD5

                            d992c7858ab71d88a84f38c0b696f5ac

                            SHA1

                            739c1b028f123dfd318666c193e5d7c7f6089474

                            SHA256

                            cea420d575cb741812097cef74644505d558704fe2f8f9f97cb22362c8c8deb6

                            SHA512

                            ed32bdb91699ab5336ffca4b30373984522c395ab852ee2dff2259dc9e9820f1182b9ab93c590e84e9d4749b599a43477bcc545ad57f194bbf99344949aa78bd

                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1005189.exe
                            Filesize

                            384KB

                            MD5

                            e5f62f5c02f8e9301d89f57b0db74f3a

                            SHA1

                            ce7969ce04cafaba28d3f235f7cc777073666865

                            SHA256

                            02106984a465ca9b56e6f0b131375279d67e8f6ac0fa5a197be9e68afadd9504

                            SHA512

                            b8a8ea5b98591fcc50a3ce7e2991bb7d6ef8a75b933cec7cd2c09ff896db2eecae72eaaa319643437d955efb1ad7e3ae8b14eff3f9d9cfeb541d646257d4401d

                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1005189.exe
                            Filesize

                            384KB

                            MD5

                            e5f62f5c02f8e9301d89f57b0db74f3a

                            SHA1

                            ce7969ce04cafaba28d3f235f7cc777073666865

                            SHA256

                            02106984a465ca9b56e6f0b131375279d67e8f6ac0fa5a197be9e68afadd9504

                            SHA512

                            b8a8ea5b98591fcc50a3ce7e2991bb7d6ef8a75b933cec7cd2c09ff896db2eecae72eaaa319643437d955efb1ad7e3ae8b14eff3f9d9cfeb541d646257d4401d

                          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\q3496115.exe
                            Filesize

                            185KB

                            MD5

                            ab2e09a601f713d2fc428f0d8c816b92

                            SHA1

                            8fdeab1ead3ba16c265720a201324531665b56ed

                            SHA256

                            676f1c4504bfc713e3caba5c58d7e7f2a20a8f0f24fd43f329f149bf9535fcc7

                            SHA512

                            994249fd787d445b0886ec47030e8010c6f88a321d98dc76a209fe0d91c1befe1188b98216d68c6a469393fc45f67535308bc567831207ff25f799be63b5a5dc

                          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\q3496115.exe
                            Filesize

                            185KB

                            MD5

                            ab2e09a601f713d2fc428f0d8c816b92

                            SHA1

                            8fdeab1ead3ba16c265720a201324531665b56ed

                            SHA256

                            676f1c4504bfc713e3caba5c58d7e7f2a20a8f0f24fd43f329f149bf9535fcc7

                            SHA512

                            994249fd787d445b0886ec47030e8010c6f88a321d98dc76a209fe0d91c1befe1188b98216d68c6a469393fc45f67535308bc567831207ff25f799be63b5a5dc

                          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r1332548.exe
                            Filesize

                            335KB

                            MD5

                            4bb1289b914222fa55d34778731f3ae8

                            SHA1

                            27fcfedaedfa4a74213a47e7bd36690fb5b84bed

                            SHA256

                            1e998aa7145a4b7dd3d1533a1fd6842181e3d98eb6aef5de0a5e060c7e72695d

                            SHA512

                            9fd8ec72d3799445b66aec485e1e89276396954083bb98325550765d2b9a83b3e30e2406d0745163c68be3944104a590a16103ab727ee36ded58bac53c1e0e2e

                          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r1332548.exe
                            Filesize

                            335KB

                            MD5

                            4bb1289b914222fa55d34778731f3ae8

                            SHA1

                            27fcfedaedfa4a74213a47e7bd36690fb5b84bed

                            SHA256

                            1e998aa7145a4b7dd3d1533a1fd6842181e3d98eb6aef5de0a5e060c7e72695d

                            SHA512

                            9fd8ec72d3799445b66aec485e1e89276396954083bb98325550765d2b9a83b3e30e2406d0745163c68be3944104a590a16103ab727ee36ded58bac53c1e0e2e

                          • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                            Filesize

                            335KB

                            MD5

                            4bb1289b914222fa55d34778731f3ae8

                            SHA1

                            27fcfedaedfa4a74213a47e7bd36690fb5b84bed

                            SHA256

                            1e998aa7145a4b7dd3d1533a1fd6842181e3d98eb6aef5de0a5e060c7e72695d

                            SHA512

                            9fd8ec72d3799445b66aec485e1e89276396954083bb98325550765d2b9a83b3e30e2406d0745163c68be3944104a590a16103ab727ee36ded58bac53c1e0e2e

                          • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                            Filesize

                            335KB

                            MD5

                            4bb1289b914222fa55d34778731f3ae8

                            SHA1

                            27fcfedaedfa4a74213a47e7bd36690fb5b84bed

                            SHA256

                            1e998aa7145a4b7dd3d1533a1fd6842181e3d98eb6aef5de0a5e060c7e72695d

                            SHA512

                            9fd8ec72d3799445b66aec485e1e89276396954083bb98325550765d2b9a83b3e30e2406d0745163c68be3944104a590a16103ab727ee36ded58bac53c1e0e2e

                          • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                            Filesize

                            335KB

                            MD5

                            4bb1289b914222fa55d34778731f3ae8

                            SHA1

                            27fcfedaedfa4a74213a47e7bd36690fb5b84bed

                            SHA256

                            1e998aa7145a4b7dd3d1533a1fd6842181e3d98eb6aef5de0a5e060c7e72695d

                            SHA512

                            9fd8ec72d3799445b66aec485e1e89276396954083bb98325550765d2b9a83b3e30e2406d0745163c68be3944104a590a16103ab727ee36ded58bac53c1e0e2e

                          • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                            Filesize

                            335KB

                            MD5

                            4bb1289b914222fa55d34778731f3ae8

                            SHA1

                            27fcfedaedfa4a74213a47e7bd36690fb5b84bed

                            SHA256

                            1e998aa7145a4b7dd3d1533a1fd6842181e3d98eb6aef5de0a5e060c7e72695d

                            SHA512

                            9fd8ec72d3799445b66aec485e1e89276396954083bb98325550765d2b9a83b3e30e2406d0745163c68be3944104a590a16103ab727ee36ded58bac53c1e0e2e

                          • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                            Filesize

                            335KB

                            MD5

                            4bb1289b914222fa55d34778731f3ae8

                            SHA1

                            27fcfedaedfa4a74213a47e7bd36690fb5b84bed

                            SHA256

                            1e998aa7145a4b7dd3d1533a1fd6842181e3d98eb6aef5de0a5e060c7e72695d

                            SHA512

                            9fd8ec72d3799445b66aec485e1e89276396954083bb98325550765d2b9a83b3e30e2406d0745163c68be3944104a590a16103ab727ee36ded58bac53c1e0e2e

                          • memory/1612-81-0x0000000005620000-0x0000000005632000-memory.dmp
                            Filesize

                            72KB

                          • memory/1612-79-0x0000000005C40000-0x0000000006258000-memory.dmp
                            Filesize

                            6.1MB

                          • memory/1612-82-0x00000000054D0000-0x00000000054E0000-memory.dmp
                            Filesize

                            64KB

                          • memory/1612-80-0x0000000005730000-0x000000000583A000-memory.dmp
                            Filesize

                            1.0MB

                          • memory/1612-77-0x0000000073870000-0x0000000074020000-memory.dmp
                            Filesize

                            7.7MB

                          • memory/1612-78-0x0000000001550000-0x0000000001556000-memory.dmp
                            Filesize

                            24KB

                          • memory/1612-76-0x0000000000C90000-0x0000000000CC0000-memory.dmp
                            Filesize

                            192KB

                          • memory/1612-83-0x0000000005680000-0x00000000056BC000-memory.dmp
                            Filesize

                            240KB

                          • memory/1612-84-0x00000000056C0000-0x000000000570C000-memory.dmp
                            Filesize

                            304KB

                          • memory/1612-85-0x0000000073870000-0x0000000074020000-memory.dmp
                            Filesize

                            7.7MB

                          • memory/1612-86-0x00000000054D0000-0x00000000054E0000-memory.dmp
                            Filesize

                            64KB

                          • memory/1740-26-0x0000000004AB0000-0x0000000005054000-memory.dmp
                            Filesize

                            5.6MB

                          • memory/1740-28-0x00000000050A0000-0x00000000050B6000-memory.dmp
                            Filesize

                            88KB

                          • memory/1740-29-0x00000000050A0000-0x00000000050B6000-memory.dmp
                            Filesize

                            88KB

                          • memory/1740-57-0x00000000748E0000-0x0000000075090000-memory.dmp
                            Filesize

                            7.7MB

                          • memory/1740-33-0x00000000050A0000-0x00000000050B6000-memory.dmp
                            Filesize

                            88KB

                          • memory/1740-35-0x00000000050A0000-0x00000000050B6000-memory.dmp
                            Filesize

                            88KB

                          • memory/1740-55-0x00000000050A0000-0x00000000050B6000-memory.dmp
                            Filesize

                            88KB

                          • memory/1740-53-0x00000000050A0000-0x00000000050B6000-memory.dmp
                            Filesize

                            88KB

                          • memory/1740-51-0x00000000050A0000-0x00000000050B6000-memory.dmp
                            Filesize

                            88KB

                          • memory/1740-37-0x00000000050A0000-0x00000000050B6000-memory.dmp
                            Filesize

                            88KB

                          • memory/1740-49-0x00000000050A0000-0x00000000050B6000-memory.dmp
                            Filesize

                            88KB

                          • memory/1740-39-0x00000000050A0000-0x00000000050B6000-memory.dmp
                            Filesize

                            88KB

                          • memory/1740-41-0x00000000050A0000-0x00000000050B6000-memory.dmp
                            Filesize

                            88KB

                          • memory/1740-43-0x00000000050A0000-0x00000000050B6000-memory.dmp
                            Filesize

                            88KB

                          • memory/1740-47-0x00000000050A0000-0x00000000050B6000-memory.dmp
                            Filesize

                            88KB

                          • memory/1740-45-0x00000000050A0000-0x00000000050B6000-memory.dmp
                            Filesize

                            88KB

                          • memory/1740-31-0x00000000050A0000-0x00000000050B6000-memory.dmp
                            Filesize

                            88KB

                          • memory/1740-27-0x00000000050A0000-0x00000000050BC000-memory.dmp
                            Filesize

                            112KB

                          • memory/1740-25-0x00000000025E0000-0x00000000025F0000-memory.dmp
                            Filesize

                            64KB

                          • memory/1740-23-0x00000000025E0000-0x00000000025F0000-memory.dmp
                            Filesize

                            64KB

                          • memory/1740-24-0x00000000025E0000-0x00000000025F0000-memory.dmp
                            Filesize

                            64KB

                          • memory/1740-22-0x00000000748E0000-0x0000000075090000-memory.dmp
                            Filesize

                            7.7MB

                          • memory/1740-21-0x00000000025C0000-0x00000000025DE000-memory.dmp
                            Filesize

                            120KB