Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 18:20

General

  • Target

    bc0667bb8d76b0eceab17620f9c43835fd5dbd1eebbf9f51744ad7e0c3852c75.exe

  • Size

    662KB

  • MD5

    c693bd5e0c62bb8c0044d52c931c31c8

  • SHA1

    1693df1c3dff75041377f4480a6a54ead046f278

  • SHA256

    bc0667bb8d76b0eceab17620f9c43835fd5dbd1eebbf9f51744ad7e0c3852c75

  • SHA512

    097c0fc5b6b02889a4f67601a653fd8d4a2b1d574b6b6cbf2004b934eb02ab571236dea6322a4fcedaa5a5281abc08a17d62403bd4f56ed0b199d28b189c9d55

  • SSDEEP

    12288:ZMr+y90FaweLM0qcVycy0YlxW0U20+ba9lK1NDlawUX3vPDr:vyW4M1cVZ0W4eiNDlawYPH

Malware Config

Extracted

Family

amadey

Version

3.87

Botnet

59b440

C2

http://77.91.68.18

Attributes
  • install_dir

    b40d11255d

  • install_file

    saves.exe

  • strings_key

    fa622dfc42544927a6471829ee1fa9fe

  • url_paths

    /nice/index.php

rc4.plain

Extracted

Family

redline

Botnet

mrak

C2

77.91.124.82:19071

Attributes
  • auth_value

    7d9a335ab5dfd42d374867c96fe25302

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc0667bb8d76b0eceab17620f9c43835fd5dbd1eebbf9f51744ad7e0c3852c75.exe
    "C:\Users\Admin\AppData\Local\Temp\bc0667bb8d76b0eceab17620f9c43835fd5dbd1eebbf9f51744ad7e0c3852c75.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1564
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9624893.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9624893.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4460
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6904757.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6904757.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1080
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5959911.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5959911.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3340
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1942204.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1942204.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:932
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5272880.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5272880.exe
            5⤵
            • Executes dropped EXE
            PID:3168
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1358817.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1358817.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:5040
          • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
            "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:964
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:4084
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4372
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:4976
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "saves.exe" /P "Admin:N"
                  7⤵
                    PID:4424
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "saves.exe" /P "Admin:R" /E
                    7⤵
                      PID:1688
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:928
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\b40d11255d" /P "Admin:N"
                        7⤵
                          PID:2232
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\b40d11255d" /P "Admin:R" /E
                          7⤵
                            PID:3280
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d3979825.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d3979825.exe
                    3⤵
                    • Executes dropped EXE
                    PID:2944
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:2972
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:1120
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe start wuauserv
                1⤵
                • Launches sc.exe
                PID:1448

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9624893.exe

                Filesize

                537KB

                MD5

                f163f33762bb175df46c575b1eaa9a7d

                SHA1

                ba2d86a4f0b2a467667d00b4799f30f7b8003f28

                SHA256

                ee53cdd7be7322f2b3eb33f7f8938d2a760362c626426364e08ee9790f6322bd

                SHA512

                5158d33f26296f5e336335044eff647ec69793c3b4d6d2002be07c520182d57dfe569f84e0cff7d983f192aed2cb3661990a887a6cd29fa441aea11a47dc2946

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d3979825.exe

                Filesize

                174KB

                MD5

                4c101c485b1926795eb0d70b6a9e9ed1

                SHA1

                7576dd0ecd843e446cf8e7bba75fbdc9182a9d75

                SHA256

                51ba385595a1b4f87bf5c37f18e3a25bd4d27af71a48c60e13d8862f470c7f80

                SHA512

                3a3f3f49160136bd3f12796ccd7657a31facf2ef7c433bab33d015e65284dc77c13e6b5594216b377d8fef074bfa8276a8ca998e7f51baefde35c6af4f806cab

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6904757.exe

                Filesize

                382KB

                MD5

                36fa8bc6881cee303abbcff92a0bf14d

                SHA1

                8e997700876c0503f6eec15145a396eb636bdf27

                SHA256

                c1a046bc951a8086d5ba9059da1d753d2b917d6e8e38df2f8952a4d6519c3cb3

                SHA512

                125cf4a4ad5cb49e34cbae17383e8d9cc2c1d92e36645ab1806819f5f671a431d5bc05c6f551c08c61c44d711ca6434b25c35d08baecfd7e45e787ec827dcdcc

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1358817.exe

                Filesize

                337KB

                MD5

                97dd170743df5042fe5ef5e3e06bc476

                SHA1

                03da863b57c6b77a3184ff9b37f28c30fa2aab4c

                SHA256

                fd411d052ba95ff51eb2248927e97722e02e61fe268752fa697f533a98262fc1

                SHA512

                606363aacaa45aad3d0984c831f8fd459fedb4858f95a1c9ac8249eda46209c8ac6f7c96d7defbbf056547be0317339c2a76ab94b30265e91d21bf55c925a5aa

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5959911.exe

                Filesize

                157KB

                MD5

                91bb0d9bacc5d7ff01a023f7c22dbab2

                SHA1

                18f95e2fa890a79ed2e68165d38d28e877e33643

                SHA256

                87f286aab15cc7ba9ff90a58e9684d712f3be81166a8553995537a6420c6a0af

                SHA512

                e3423a28e1e8178cb12ef053817aab627f97ec9ac2e5525c6df2d0b8460d11456c3857c560cb1260711adf15cf82835a7e725378b256f9f08bf7c96e8dbebc89

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1942204.exe

                Filesize

                11KB

                MD5

                6636ec7aa9b2d3187ccfd61add9d8215

                SHA1

                1bdb29ac65279fb8f91ad3533452ddc4abf0b3c8

                SHA256

                09453b3ce01f930d0f2e73564c1c269b2995a5a8322f1a846013a97d4f90be8b

                SHA512

                826a0b8fa185aac5231d2156170f2a5e1e4f496f11e2d3d88c717d34d5fbad2fa423bbf51bc32340de8e914b9a9662ecdd6512d592821f64f8c8ee584bb49cb5

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5272880.exe

                Filesize

                35KB

                MD5

                5dc7502c78bf66e6b8da1de2761ccbe8

                SHA1

                150b93273aa99f55bbd80ed87a07e02a98e6f52d

                SHA256

                c697f552e2324ce902dd47ac0fa4a73b1c5f05af9061d6ee3117fc846ce1f54d

                SHA512

                0b7173cde7a04d06cb832c17f589042a294d9f431cbd972bb4162ac518858f7742e4bdb6f7bf1364bd7ea58edf67705993833848cf37833634455277e0b294cd

              • memory/932-28-0x0000000000FE0000-0x0000000000FEA000-memory.dmp

                Filesize

                40KB

              • memory/2944-48-0x0000000000960000-0x0000000000990000-memory.dmp

                Filesize

                192KB

              • memory/2944-49-0x00000000053C0000-0x00000000053C6000-memory.dmp

                Filesize

                24KB

              • memory/2944-50-0x0000000005A10000-0x0000000006028000-memory.dmp

                Filesize

                6.1MB

              • memory/2944-51-0x0000000005500000-0x000000000560A000-memory.dmp

                Filesize

                1.0MB

              • memory/2944-52-0x0000000005420000-0x0000000005432000-memory.dmp

                Filesize

                72KB

              • memory/2944-53-0x0000000005480000-0x00000000054BC000-memory.dmp

                Filesize

                240KB

              • memory/2944-54-0x0000000005610000-0x000000000565C000-memory.dmp

                Filesize

                304KB