Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 18:47

General

  • Target

    346c46bc8283ae44fe76d91bebdf5c933515cb6b55b0e4f1dd25ca7a64a0a726.exe

  • Size

    812KB

  • MD5

    79983cb4cd4ed44124acf90324aab153

  • SHA1

    95cbc2ecd9756f962ec62f265dd70b37efc50fe0

  • SHA256

    346c46bc8283ae44fe76d91bebdf5c933515cb6b55b0e4f1dd25ca7a64a0a726

  • SHA512

    a2d737b6436c7550ed5d3f2c8d3cd06f21b019613ea71791f9b9f519eeb54e9c2ac0a0290577c86f2afe56f81161dfb981dc00a8e2483ad152b4e3784fc9ba63

  • SSDEEP

    12288:0MrEy90SXhiDq45nmnagUKW2WjcYOTDXKznBc6RZkReqPNgUnnTwR:QyNq3ma+sLAuBc6RkeqPNgJR

Malware Config

Extracted

Family

amadey

Version

3.87

Botnet

59b440

C2

http://77.91.68.18

Attributes
  • install_dir

    b40d11255d

  • install_file

    saves.exe

  • strings_key

    fa622dfc42544927a6471829ee1fa9fe

  • url_paths

    /nice/index.php

rc4.plain

Extracted

Family

redline

Botnet

mrak

C2

77.91.124.82:19071

Attributes
  • auth_value

    7d9a335ab5dfd42d374867c96fe25302

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\346c46bc8283ae44fe76d91bebdf5c933515cb6b55b0e4f1dd25ca7a64a0a726.exe
    "C:\Users\Admin\AppData\Local\Temp\346c46bc8283ae44fe76d91bebdf5c933515cb6b55b0e4f1dd25ca7a64a0a726.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3492
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8557537.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8557537.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1180
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6246659.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6246659.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4648
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6145980.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6145980.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3112
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7530371.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7530371.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4788
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7155042.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7155042.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4560
            • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
              "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1356
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:4296
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:3620
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:4288
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "saves.exe" /P "Admin:N"
                    8⤵
                      PID:2244
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "saves.exe" /P "Admin:R" /E
                      8⤵
                        PID:3528
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:3472
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\b40d11255d" /P "Admin:N"
                          8⤵
                            PID:4924
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\b40d11255d" /P "Admin:R" /E
                            8⤵
                              PID:2012
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i7725090.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i7725090.exe
                      4⤵
                      • Executes dropped EXE
                      PID:2572
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:4440
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:3772
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:2480

              Network

              MITRE ATT&CK Matrix ATT&CK v13

              Execution

              Scheduled Task/Job

              1
              T1053

              Persistence

              Create or Modify System Process

              1
              T1543

              Windows Service

              1
              T1543.003

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Scheduled Task/Job

              1
              T1053

              Privilege Escalation

              Create or Modify System Process

              1
              T1543

              Windows Service

              1
              T1543.003

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Scheduled Task/Job

              1
              T1053

              Defense Evasion

              Modify Registry

              3
              T1112

              Impair Defenses

              2
              T1562

              Disable or Modify Tools

              2
              T1562.001

              Discovery

              Query Registry

              1
              T1012

              System Information Discovery

              2
              T1082

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8557537.exe
                Filesize

                706KB

                MD5

                0549740dd9ed1b5169b354947a444ee1

                SHA1

                f688a9cd705ee364fb99c1d72ff67b7810c3fa24

                SHA256

                e417d86797b78db09243dedd0d51894bbfa916b94220c6b01b19eca7b4e51702

                SHA512

                216d9be54aac7ef8d97a393e9f76556e03d14ea9896293b5991e518bdee73332fbe4a3a6c9bb7aa874a782382686592def26a816351da1b749999da9716884b5

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6246659.exe
                Filesize

                540KB

                MD5

                54d1b908865065910d815a37fe12f9d3

                SHA1

                f6d9fedc238fb4a66eb4ceb33a265d4a5e18e46d

                SHA256

                8132da80609e96c10b9620e3fabdb77f405e2b22157bdd7107fbdcc082d07f7a

                SHA512

                37cc75321d556942ca19f5f4f2552286a3b3cbb7d0d3b5659a5f322f4b2e228fc5cebe5ca7ddd84b7d47f932cb910531a9e123fc40ea2f658cc2074d76536aad

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i7725090.exe
                Filesize

                174KB

                MD5

                bfea8f5e4c85a611bfb5cedba8bf941c

                SHA1

                495d19da1a6615a5655c830d3d7806adf7c105e7

                SHA256

                159d49f08bd4f7497c089318fe7794450a6c891b840fc517ada2a0e5df8b9270

                SHA512

                0571557080360d47047a0f355ed4ba2a64b71221f73f3036b8ac9b06e6901dc6f8df34561c36d3b5e1fe7859a9dbcb3d5b6344dfab58170b5bc13a55a36b0bf5

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6145980.exe
                Filesize

                384KB

                MD5

                c2a521cee3b4aac1f92a48fd3803c6a2

                SHA1

                635a5fb377d1a16efbe93efae96fe10bdf1638d1

                SHA256

                4f75dcc5952d4679c66124bbf9cf28759d6dd2714d395363a5ff1c3f0911c457

                SHA512

                a799dbc6fd26cd45d6105de41730c8a1ba31490311123d4ed1061a70f5e46e44b859374e327bf885d5cd22389447fb2387143c661f520749c97414009ea2a980

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7530371.exe
                Filesize

                202KB

                MD5

                695025a4ce6d5f8e7e80b12e273d0b47

                SHA1

                df47785e8e9a26bb823b730c0a973eca04ca141f

                SHA256

                2ef88475f02b5367cc950a1eecba258d38e4b13d92728b003a44b0a9da90ffdf

                SHA512

                6deae214bc91fcb617be8d895a2db4a3fce6dcb3f420a5c2a5a527ebd8c3b6dbbec972ba63f77383e07834048be511fe269776c7324719c7418fcfe39d31cbbe

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7155042.exe
                Filesize

                337KB

                MD5

                b48c7ccfd84728a8754ec473bdc21743

                SHA1

                3d9a5aa07379c7315a90f282e0c330cc2c152433

                SHA256

                3e589f14ff50842ccc151e5ab6672b1fae03b80beb9e7ff59514269d98b40c40

                SHA512

                d6984102701fd7be24f1ed47c21e4ccbfa1ff0f6c94ad0d7df746e3106d94033cbc41b62ed593bdf41b71bf20375a40916c6e6702657429c9c53344fa5602bec

              • memory/2572-79-0x0000000004C00000-0x0000000004C12000-memory.dmp
                Filesize

                72KB

              • memory/2572-78-0x0000000004CF0000-0x0000000004DFA000-memory.dmp
                Filesize

                1.0MB

              • memory/2572-77-0x0000000005200000-0x0000000005818000-memory.dmp
                Filesize

                6.1MB

              • memory/2572-76-0x00000000024D0000-0x00000000024D6000-memory.dmp
                Filesize

                24KB

              • memory/2572-75-0x0000000000280000-0x00000000002B0000-memory.dmp
                Filesize

                192KB

              • memory/2572-80-0x0000000004C60000-0x0000000004C9C000-memory.dmp
                Filesize

                240KB

              • memory/2572-81-0x0000000004E00000-0x0000000004E4C000-memory.dmp
                Filesize

                304KB

              • memory/4788-44-0x0000000004990000-0x00000000049A6000-memory.dmp
                Filesize

                88KB

              • memory/4788-50-0x0000000004990000-0x00000000049A6000-memory.dmp
                Filesize

                88KB

              • memory/4788-40-0x0000000004990000-0x00000000049A6000-memory.dmp
                Filesize

                88KB

              • memory/4788-36-0x0000000004990000-0x00000000049A6000-memory.dmp
                Filesize

                88KB

              • memory/4788-34-0x0000000004990000-0x00000000049A6000-memory.dmp
                Filesize

                88KB

              • memory/4788-31-0x0000000004990000-0x00000000049A6000-memory.dmp
                Filesize

                88KB

              • memory/4788-42-0x0000000004990000-0x00000000049A6000-memory.dmp
                Filesize

                88KB

              • memory/4788-38-0x0000000004990000-0x00000000049A6000-memory.dmp
                Filesize

                88KB

              • memory/4788-32-0x0000000004990000-0x00000000049A6000-memory.dmp
                Filesize

                88KB

              • memory/4788-46-0x0000000004990000-0x00000000049A6000-memory.dmp
                Filesize

                88KB

              • memory/4788-52-0x0000000004990000-0x00000000049A6000-memory.dmp
                Filesize

                88KB

              • memory/4788-54-0x0000000004990000-0x00000000049A6000-memory.dmp
                Filesize

                88KB

              • memory/4788-56-0x0000000004990000-0x00000000049A6000-memory.dmp
                Filesize

                88KB

              • memory/4788-58-0x0000000004990000-0x00000000049A6000-memory.dmp
                Filesize

                88KB

              • memory/4788-49-0x0000000004990000-0x00000000049A6000-memory.dmp
                Filesize

                88KB

              • memory/4788-30-0x0000000004990000-0x00000000049AC000-memory.dmp
                Filesize

                112KB

              • memory/4788-29-0x0000000004A90000-0x0000000005034000-memory.dmp
                Filesize

                5.6MB

              • memory/4788-28-0x00000000048C0000-0x00000000048DE000-memory.dmp
                Filesize

                120KB