Analysis

  • max time kernel
    144s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-03-2024 19:16

General

  • Target

    34468074c946943518ab33be24c01ef9.bin.exe

  • Size

    442KB

  • MD5

    34468074c946943518ab33be24c01ef9

  • SHA1

    742cf7ff13dcab6a99b372dc99f362f45be3d69c

  • SHA256

    339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99

  • SHA512

    b13def10893e34d5efcb52d5b11b16c14881c27aca7f263d59a19fdad99e27681cd8cee85ba83762772ecbbf4e32eb373006627b932047eff00cbb725e9f942b

  • SSDEEP

    6144:9qIH8p8GgMyYRhuPTMCGzlmJDZWgECsFjKdJtH3s5ZBjnA:9d8p8GgAWP4CYE4BCsmdJFij0

Malware Config

Extracted

Family

amadey

Version

4.18

Attributes
  • install_dir

    154561dcbf

  • install_file

    Dctooux.exe

  • strings_key

    2cd47fa043c815e1a033c67832f3c6a5

  • url_paths

    /j4Fvskd3/index.php

rc4.plain

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

5.42.65.68:29093

Extracted

Family

amadey

Version

4.18

Attributes
  • strings_key

    2cd47fa043c815e1a033c67832f3c6a5

  • url_paths

    /j4Fvskd3/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 19 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\34468074c946943518ab33be24c01ef9.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\34468074c946943518ab33be24c01ef9.bin.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
      "C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2556
      • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
        "C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe"
        3⤵
          PID:2844
        • C:\Users\Admin\1000071002\nativecrypt6.exe
          "C:\Users\Admin\1000071002\nativecrypt6.exe"
          3⤵
          • Executes dropped EXE
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2444
        • C:\Users\Admin\AppData\Roaming\1000072000\nativecrypt6.exe
          "C:\Users\Admin\AppData\Roaming\1000072000\nativecrypt6.exe"
          3⤵
          • Executes dropped EXE
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2796
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main
          3⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1440
          • C:\Windows\system32\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main
            4⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1560
            • C:\Windows\system32\netsh.exe
              netsh wlan show profiles
              5⤵
                PID:1688
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\658372521424_Desktop.zip' -CompressionLevel Optimal
                5⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2116
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\clip64.dll, Main
            3⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            PID:956

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\1000071002\nativecrypt6.exe

        Filesize

        447KB

        MD5

        ef4b0d33ed0eb8ec64c7073ea8409cad

        SHA1

        b3c1b0b7e282a26bcc4ddb84cfac0437e3cff209

        SHA256

        37c593afa2791249363f27cb2818fe560338c9abdfb2b270b26a88696a87c3e9

        SHA512

        21076c222c0ee27ad88b682639bc82d8be50a0d369a5eec7a66023b0a8ced6cc9348b5b6cc7794c22269adc9b9faa38503276ba4b2d7e922beb1ce0e575a6228

      • C:\Users\Admin\AppData\Local\Temp\658372521424

        Filesize

        67KB

        MD5

        cc0e6473b2d9f62575bf6c26bf67acf6

        SHA1

        9a97c7cb4ccc16e78defea8398546f2d4bd40ec1

        SHA256

        6adb22b6c7c1af88b6246ade10ad7d351f809a8db3a42ec68d8046e3fb02c4be

        SHA512

        5db5194bd60edfa903db04a8f928fa100ccce299a5025e6bb71f4053b60d47af0a3216b4e8a5a948f4ffc26b51ecbaf0cd7687e2e4cffe77f97a6fc639805b92

      • C:\Users\Admin\AppData\Local\Temp\Tmp6C5A.tmp

        Filesize

        2KB

        MD5

        1420d30f964eac2c85b2ccfe968eebce

        SHA1

        bdf9a6876578a3e38079c4f8cf5d6c79687ad750

        SHA256

        f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

        SHA512

        6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

      • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\clip64.dll

        Filesize

        109KB

        MD5

        ca684dc5ebed4381701a39f1cc3a0fb2

        SHA1

        8c4a375aa583bd1c705597a7f45fd18934276770

        SHA256

        b8c5ad09c5b62fa8d8bcb8e1c317700274b4756d04fc964ccae38103c318ddd2

        SHA512

        8b414799e37d50f664e04e704ab06a8f6f25cb9f9c24f157e998a72aad9c0a0cd9435b42c629dc26643f039725d22a89ca3468dc39009d11d910420a80e9c510

      • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll

        Filesize

        1.2MB

        MD5

        4876ee75ce2712147c41ff1277cd2d30

        SHA1

        3733dc92318f0c6b92cb201e49151686281acda6

        SHA256

        bbfba2d40f48c16a53b5806555c08aff1982c3fe4a77964963edbab9d7e672ed

        SHA512

        9bf25d4d0dfebd287b0c84abb64612b3db00a26b0217490b35925e77487d6c872632c936cedf1205c46ecbf9d4dfc9bc7600bee05afc550b30ae0d0964c5afe9

      • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1658372521-4246568289-2509113762-1000\76b53b3ec448f7ccdda2063b15d2bfc3_f4bfc772-1e14-4cb7-967a-2360098b659f

        Filesize

        79B

        MD5

        bbc8da7d36df3f91c460984c2abe8419

        SHA1

        9a247c3d293022fde4f3abc8b56259275c4ef97c

        SHA256

        0399ccf5e780949a63400736a46cce7d1879903d0f45c6b7d194c960ba4dddc2

        SHA512

        facbe33baa35fccf8072fe207a4d5eda2a64c4ed067c8eecb23e49cb003747be4c3772cb4ae2dfb87f91aa711b9a8371a2e0d76dc40830e275098172318d7cb4

      • \Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe

        Filesize

        442KB

        MD5

        34468074c946943518ab33be24c01ef9

        SHA1

        742cf7ff13dcab6a99b372dc99f362f45be3d69c

        SHA256

        339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99

        SHA512

        b13def10893e34d5efcb52d5b11b16c14881c27aca7f263d59a19fdad99e27681cd8cee85ba83762772ecbbf4e32eb373006627b932047eff00cbb725e9f942b

      • \Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe

        Filesize

        128KB

        MD5

        5cab432821c94450adf1b2314cd42092

        SHA1

        84cd4da52c31664244d87601624415cb8642d088

        SHA256

        bd584435de36eb1f093953e99307736e7793772296f026d06b00627cb0323095

        SHA512

        172d11aab49f8185c91f06dc704da84331aede0bcad388b9d34f1fe9b0e04bcf8a044c88d9c27e9ac335f2743ee22958be477bb3ed34e02a6d32fb27c32f5450

      • \Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll

        Filesize

        777KB

        MD5

        6ba3d481e8a0c753967f3e002044b050

        SHA1

        3630d082e516fac7273d5e5c2a09c972ad3fcac5

        SHA256

        d62a26be85ee3bb0b7d4504f4367f505180adee48ddaf8cb72e301263114adfe

        SHA512

        33e7defd57654fa57a2e04ecfba0222a28103794dc1236272e0eaf493d92f130132e90a20244e2ed7c2704a34aaab681bc931671816a6c03a2bd8fd405a4a61c

      • memory/2116-137-0x000007FEF5280000-0x000007FEF5C1D000-memory.dmp

        Filesize

        9.6MB

      • memory/2116-138-0x0000000002870000-0x00000000028F0000-memory.dmp

        Filesize

        512KB

      • memory/2116-139-0x000007FEF5280000-0x000007FEF5C1D000-memory.dmp

        Filesize

        9.6MB

      • memory/2116-136-0x0000000002650000-0x0000000002658000-memory.dmp

        Filesize

        32KB

      • memory/2116-135-0x000000001B390000-0x000000001B672000-memory.dmp

        Filesize

        2.9MB

      • memory/2116-140-0x0000000002870000-0x00000000028F0000-memory.dmp

        Filesize

        512KB

      • memory/2116-141-0x0000000002870000-0x00000000028F0000-memory.dmp

        Filesize

        512KB

      • memory/2116-142-0x000007FEF5280000-0x000007FEF5C1D000-memory.dmp

        Filesize

        9.6MB

      • memory/2444-62-0x0000000000400000-0x0000000000B19000-memory.dmp

        Filesize

        7.1MB

      • memory/2444-134-0x0000000000CD0000-0x0000000000DD0000-memory.dmp

        Filesize

        1024KB

      • memory/2444-77-0x0000000004FD0000-0x0000000005026000-memory.dmp

        Filesize

        344KB

      • memory/2444-78-0x0000000002810000-0x0000000002850000-memory.dmp

        Filesize

        256KB

      • memory/2444-76-0x0000000002810000-0x0000000002850000-memory.dmp

        Filesize

        256KB

      • memory/2444-171-0x0000000000CD0000-0x0000000000DD0000-memory.dmp

        Filesize

        1024KB

      • memory/2444-80-0x0000000073310000-0x00000000739FE000-memory.dmp

        Filesize

        6.9MB

      • memory/2444-81-0x0000000002810000-0x0000000002850000-memory.dmp

        Filesize

        256KB

      • memory/2444-170-0x0000000073310000-0x00000000739FE000-memory.dmp

        Filesize

        6.9MB

      • memory/2444-169-0x0000000000400000-0x0000000000B19000-memory.dmp

        Filesize

        7.1MB

      • memory/2444-165-0x0000000002810000-0x0000000002850000-memory.dmp

        Filesize

        256KB

      • memory/2444-164-0x0000000073310000-0x00000000739FE000-memory.dmp

        Filesize

        6.9MB

      • memory/2444-148-0x0000000002810000-0x0000000002850000-memory.dmp

        Filesize

        256KB

      • memory/2444-52-0x0000000000CD0000-0x0000000000DD0000-memory.dmp

        Filesize

        1024KB

      • memory/2444-61-0x0000000000220000-0x000000000027F000-memory.dmp

        Filesize

        380KB

      • memory/2556-107-0x0000000000400000-0x0000000000B17000-memory.dmp

        Filesize

        7.1MB

      • memory/2556-20-0x0000000000C70000-0x0000000000D70000-memory.dmp

        Filesize

        1024KB

      • memory/2556-128-0x0000000000C70000-0x0000000000D70000-memory.dmp

        Filesize

        1024KB

      • memory/2556-168-0x0000000000400000-0x0000000000B17000-memory.dmp

        Filesize

        7.1MB

      • memory/2556-21-0x0000000000400000-0x0000000000B17000-memory.dmp

        Filesize

        7.1MB

      • memory/2556-129-0x0000000000400000-0x0000000000B17000-memory.dmp

        Filesize

        7.1MB

      • memory/2796-175-0x0000000000400000-0x0000000000B19000-memory.dmp

        Filesize

        7.1MB

      • memory/2796-177-0x0000000073310000-0x00000000739FE000-memory.dmp

        Filesize

        6.9MB

      • memory/2796-176-0x0000000000C60000-0x0000000000D60000-memory.dmp

        Filesize

        1024KB

      • memory/2796-73-0x0000000000400000-0x0000000000B19000-memory.dmp

        Filesize

        7.1MB

      • memory/2796-144-0x0000000073310000-0x00000000739FE000-memory.dmp

        Filesize

        6.9MB

      • memory/2796-146-0x0000000000C60000-0x0000000000D60000-memory.dmp

        Filesize

        1024KB

      • memory/2796-147-0x0000000004FC0000-0x0000000005000000-memory.dmp

        Filesize

        256KB

      • memory/2796-79-0x0000000004FC0000-0x0000000005000000-memory.dmp

        Filesize

        256KB

      • memory/2796-149-0x0000000004FC0000-0x0000000005000000-memory.dmp

        Filesize

        256KB

      • memory/2796-74-0x0000000004EE0000-0x0000000004F38000-memory.dmp

        Filesize

        352KB

      • memory/2796-72-0x0000000000C60000-0x0000000000D60000-memory.dmp

        Filesize

        1024KB

      • memory/2796-75-0x0000000073310000-0x00000000739FE000-memory.dmp

        Filesize

        6.9MB

      • memory/2796-123-0x0000000000400000-0x0000000000B19000-memory.dmp

        Filesize

        7.1MB

      • memory/2972-17-0x0000000000400000-0x0000000000B17000-memory.dmp

        Filesize

        7.1MB

      • memory/2972-2-0x0000000000B20000-0x0000000000B8F000-memory.dmp

        Filesize

        444KB

      • memory/2972-1-0x0000000000250000-0x0000000000350000-memory.dmp

        Filesize

        1024KB

      • memory/2972-3-0x0000000000400000-0x0000000000B17000-memory.dmp

        Filesize

        7.1MB

      • memory/2972-5-0x0000000002490000-0x0000000002491000-memory.dmp

        Filesize

        4KB

      • memory/2972-19-0x0000000000250000-0x0000000000350000-memory.dmp

        Filesize

        1024KB