Analysis

  • max time kernel
    196s
  • max time network
    200s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-03-2024 04:51

General

  • Target

    339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99.exe

  • Size

    442KB

  • MD5

    34468074c946943518ab33be24c01ef9

  • SHA1

    742cf7ff13dcab6a99b372dc99f362f45be3d69c

  • SHA256

    339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99

  • SHA512

    b13def10893e34d5efcb52d5b11b16c14881c27aca7f263d59a19fdad99e27681cd8cee85ba83762772ecbbf4e32eb373006627b932047eff00cbb725e9f942b

  • SSDEEP

    6144:9qIH8p8GgMyYRhuPTMCGzlmJDZWgECsFjKdJtH3s5ZBjnA:9d8p8GgAWP4CYE4BCsmdJFij0

Malware Config

Extracted

Family

amadey

Version

4.18

Attributes
  • install_dir

    154561dcbf

  • install_file

    Dctooux.exe

  • strings_key

    2cd47fa043c815e1a033c67832f3c6a5

  • url_paths

    /j4Fvskd3/index.php

rc4.plain

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

5.42.65.68:29093

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 17 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99.exe
    "C:\Users\Admin\AppData\Local\Temp\339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
      "C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2996
      • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
        "C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe"
        3⤵
          PID:2432
        • C:\Users\Admin\1000071002\nativecrypt6.exe
          "C:\Users\Admin\1000071002\nativecrypt6.exe"
          3⤵
          • Executes dropped EXE
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2460
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main
          3⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1456
          • C:\Windows\system32\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main
            4⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2500
            • C:\Windows\system32\netsh.exe
              netsh wlan show profiles
              5⤵
                PID:2040
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\780967622241_Desktop.zip' -CompressionLevel Optimal
                5⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3024
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\clip64.dll, Main
            3⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            PID:992

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\1000071002\nativecrypt6.exe

        Filesize

        447KB

        MD5

        ef4b0d33ed0eb8ec64c7073ea8409cad

        SHA1

        b3c1b0b7e282a26bcc4ddb84cfac0437e3cff209

        SHA256

        37c593afa2791249363f27cb2818fe560338c9abdfb2b270b26a88696a87c3e9

        SHA512

        21076c222c0ee27ad88b682639bc82d8be50a0d369a5eec7a66023b0a8ced6cc9348b5b6cc7794c22269adc9b9faa38503276ba4b2d7e922beb1ce0e575a6228

      • C:\Users\Admin\1000071002\nativecrypt6.exe

        Filesize

        209KB

        MD5

        9dc9a30b108891bf4401c1228fbc2fd3

        SHA1

        022fb1f2afa939a3dd23fbacc96680e49e52cf29

        SHA256

        ae451a9151db8f679feee8190d7fb9ee7a87fc5772937a6c0ef1bbf3309d4f1e

        SHA512

        5998fe9c9c63efdb6cd7fa9b404f4b5dad8f0fa9dc355c7b0badc3cb3e7dff503e8eae576e61a4ecdb7516fb89dc65e62b7c544ff5a58201164223d38748773f

      • C:\Users\Admin\AppData\Local\Temp\780967622241

        Filesize

        72KB

        MD5

        7e322a31725a194aeeb73782d65b6955

        SHA1

        c9a938b4a9acb04f55eb83afd33ccfc989132275

        SHA256

        2b64997c4a78ab462429480f47f7278cde1f1c5a6abb389da82c22f4fa63b6bb

        SHA512

        4c1ca38122abcd8d3582e437791e71c91a23bf411ec4c55c9a3bd7d8078fd040e7bee4075bd65c5d48df5b9934ea5d477dc596be62bad042c10a634f3573e59e

      • C:\Users\Admin\AppData\Local\Temp\Tmp695E.tmp

        Filesize

        2KB

        MD5

        1420d30f964eac2c85b2ccfe968eebce

        SHA1

        bdf9a6876578a3e38079c4f8cf5d6c79687ad750

        SHA256

        f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

        SHA512

        6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

      • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\clip64.dll

        Filesize

        109KB

        MD5

        ca684dc5ebed4381701a39f1cc3a0fb2

        SHA1

        8c4a375aa583bd1c705597a7f45fd18934276770

        SHA256

        b8c5ad09c5b62fa8d8bcb8e1c317700274b4756d04fc964ccae38103c318ddd2

        SHA512

        8b414799e37d50f664e04e704ab06a8f6f25cb9f9c24f157e998a72aad9c0a0cd9435b42c629dc26643f039725d22a89ca3468dc39009d11d910420a80e9c510

      • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll

        Filesize

        1.2MB

        MD5

        4876ee75ce2712147c41ff1277cd2d30

        SHA1

        3733dc92318f0c6b92cb201e49151686281acda6

        SHA256

        bbfba2d40f48c16a53b5806555c08aff1982c3fe4a77964963edbab9d7e672ed

        SHA512

        9bf25d4d0dfebd287b0c84abb64612b3db00a26b0217490b35925e77487d6c872632c936cedf1205c46ecbf9d4dfc9bc7600bee05afc550b30ae0d0964c5afe9

      • \Users\Admin\1000071002\nativecrypt6.exe

        Filesize

        256KB

        MD5

        f595ffdebbeaa59b0f3df799fc248304

        SHA1

        fa73ec0145d4b8ebdcad4a547ccdb3aaf6d781cb

        SHA256

        5bfda9d3d6c679202fcc1b0c4e0697fb5d799a0a0aced08a7852fd4c329a2a57

        SHA512

        4d9f84aacaa87871a766ea8084bf894a69d295a06c0fa98ac8cb84c51cb95e9384dd08cb29d2db830e27cb210b19fc52699e0aca59b31caac7b04353f2359c15

      • \Users\Admin\1000071002\nativecrypt6.exe

        Filesize

        263KB

        MD5

        e718c5d7462bb9b897f7b6777147f300

        SHA1

        1c8ea8a7848933c404bb2e290d91aeacf1e96f38

        SHA256

        c6be0116cb1a332c8e17272eadb73ddcc253563197a2e440793dd20e956dfe10

        SHA512

        0ed726d66305b66d1887f0756899f93b1bd8bf78555b6bb81c13f4ae7f96d2d9b6804fc3f1c5a57a70b8359cb1a68d3244d6afae098f040ae4e3b19ace879d01

      • \Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe

        Filesize

        442KB

        MD5

        34468074c946943518ab33be24c01ef9

        SHA1

        742cf7ff13dcab6a99b372dc99f362f45be3d69c

        SHA256

        339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99

        SHA512

        b13def10893e34d5efcb52d5b11b16c14881c27aca7f263d59a19fdad99e27681cd8cee85ba83762772ecbbf4e32eb373006627b932047eff00cbb725e9f942b

      • memory/2208-5-0x0000000002570000-0x0000000002571000-memory.dmp

        Filesize

        4KB

      • memory/2208-19-0x0000000000BE0000-0x0000000000CE0000-memory.dmp

        Filesize

        1024KB

      • memory/2208-17-0x0000000000400000-0x0000000000B17000-memory.dmp

        Filesize

        7.1MB

      • memory/2208-3-0x0000000000400000-0x0000000000B17000-memory.dmp

        Filesize

        7.1MB

      • memory/2208-2-0x00000000002F0000-0x000000000035F000-memory.dmp

        Filesize

        444KB

      • memory/2208-1-0x0000000000BE0000-0x0000000000CE0000-memory.dmp

        Filesize

        1024KB

      • memory/2460-60-0x0000000002840000-0x0000000002896000-memory.dmp

        Filesize

        344KB

      • memory/2460-103-0x0000000073450000-0x0000000073B3E000-memory.dmp

        Filesize

        6.9MB

      • memory/2460-51-0x0000000005080000-0x00000000050C0000-memory.dmp

        Filesize

        256KB

      • memory/2460-49-0x0000000000400000-0x0000000000B19000-memory.dmp

        Filesize

        7.1MB

      • memory/2460-52-0x0000000002750000-0x00000000027A8000-memory.dmp

        Filesize

        352KB

      • memory/2460-58-0x0000000005080000-0x00000000050C0000-memory.dmp

        Filesize

        256KB

      • memory/2460-59-0x0000000005080000-0x00000000050C0000-memory.dmp

        Filesize

        256KB

      • memory/2460-48-0x0000000000220000-0x000000000027F000-memory.dmp

        Filesize

        380KB

      • memory/2460-61-0x0000000005080000-0x00000000050C0000-memory.dmp

        Filesize

        256KB

      • memory/2460-47-0x0000000000C70000-0x0000000000D70000-memory.dmp

        Filesize

        1024KB

      • memory/2460-130-0x0000000073450000-0x0000000073B3E000-memory.dmp

        Filesize

        6.9MB

      • memory/2460-129-0x0000000000C70000-0x0000000000D70000-memory.dmp

        Filesize

        1024KB

      • memory/2460-128-0x0000000000400000-0x0000000000B19000-memory.dmp

        Filesize

        7.1MB

      • memory/2460-93-0x0000000000C70000-0x0000000000D70000-memory.dmp

        Filesize

        1024KB

      • memory/2460-112-0x0000000005080000-0x00000000050C0000-memory.dmp

        Filesize

        256KB

      • memory/2460-50-0x0000000073450000-0x0000000073B3E000-memory.dmp

        Filesize

        6.9MB

      • memory/2460-110-0x0000000005080000-0x00000000050C0000-memory.dmp

        Filesize

        256KB

      • memory/2996-102-0x0000000000400000-0x0000000000B17000-memory.dmp

        Filesize

        7.1MB

      • memory/2996-75-0x0000000000400000-0x0000000000B17000-memory.dmp

        Filesize

        7.1MB

      • memory/2996-76-0x0000000000C60000-0x0000000000D60000-memory.dmp

        Filesize

        1024KB

      • memory/2996-21-0x0000000000400000-0x0000000000B17000-memory.dmp

        Filesize

        7.1MB

      • memory/2996-20-0x0000000000C60000-0x0000000000D60000-memory.dmp

        Filesize

        1024KB

      • memory/3024-111-0x0000000002480000-0x0000000002500000-memory.dmp

        Filesize

        512KB

      • memory/3024-105-0x0000000002560000-0x0000000002568000-memory.dmp

        Filesize

        32KB

      • memory/3024-104-0x000000001B1E0000-0x000000001B4C2000-memory.dmp

        Filesize

        2.9MB

      • memory/3024-113-0x000000000248B000-0x00000000024F2000-memory.dmp

        Filesize

        412KB

      • memory/3024-114-0x000007FEF51A0000-0x000007FEF5B3D000-memory.dmp

        Filesize

        9.6MB

      • memory/3024-109-0x0000000002480000-0x0000000002500000-memory.dmp

        Filesize

        512KB

      • memory/3024-108-0x000007FEF51A0000-0x000007FEF5B3D000-memory.dmp

        Filesize

        9.6MB

      • memory/3024-107-0x0000000002480000-0x0000000002500000-memory.dmp

        Filesize

        512KB

      • memory/3024-106-0x000007FEF51A0000-0x000007FEF5B3D000-memory.dmp

        Filesize

        9.6MB