Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 19:12

General

  • Target

    1b7cbee30e4459916b5b164befe5e20b7a876df411fdb5d2d2cd7c073a28b18d.exe

  • Size

    812KB

  • MD5

    732e8b08f55b84327bc9756784510ce7

  • SHA1

    3f8319e7098f2d99025c21c4cf7faa3e67b31957

  • SHA256

    1b7cbee30e4459916b5b164befe5e20b7a876df411fdb5d2d2cd7c073a28b18d

  • SHA512

    afe862b4f008d5b18d0aeca1a3e6ecac28c8724f301df381e591cc170dcc39dfc0bb6aa96814c668c5f424e03736f9b448acc8c104e6107d3d66afe28da11ab5

  • SSDEEP

    24576:1y07ft7pdSgS37uybqnoffSrKMf48ABP:QAfTdS8ybqIEAB

Malware Config

Extracted

Family

amadey

Version

3.87

Botnet

59b440

C2

http://77.91.68.18

Attributes
  • install_dir

    b40d11255d

  • install_file

    saves.exe

  • strings_key

    fa622dfc42544927a6471829ee1fa9fe

  • url_paths

    /nice/index.php

rc4.plain

Extracted

Family

redline

Botnet

mrak

C2

77.91.124.82:19071

Attributes
  • auth_value

    7d9a335ab5dfd42d374867c96fe25302

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b7cbee30e4459916b5b164befe5e20b7a876df411fdb5d2d2cd7c073a28b18d.exe
    "C:\Users\Admin\AppData\Local\Temp\1b7cbee30e4459916b5b164befe5e20b7a876df411fdb5d2d2cd7c073a28b18d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7902882.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7902882.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2216
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7653899.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7653899.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2912
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9569919.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9569919.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1056
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4522034.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4522034.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4652
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h4431890.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h4431890.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2736
            • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
              "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:4916
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:4880
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:4104
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:3656
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "saves.exe" /P "Admin:N"
                    8⤵
                      PID:1420
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "saves.exe" /P "Admin:R" /E
                      8⤵
                        PID:3528
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:4500
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\b40d11255d" /P "Admin:N"
                          8⤵
                            PID:3748
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\b40d11255d" /P "Admin:R" /E
                            8⤵
                              PID:4084
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i4218739.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i4218739.exe
                      4⤵
                      • Executes dropped EXE
                      PID:2300
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:3164
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:2636

              Network

              MITRE ATT&CK Matrix ATT&CK v13

              Execution

              Scheduled Task/Job

              1
              T1053

              Persistence

              Create or Modify System Process

              1
              T1543

              Windows Service

              1
              T1543.003

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Scheduled Task/Job

              1
              T1053

              Privilege Escalation

              Create or Modify System Process

              1
              T1543

              Windows Service

              1
              T1543.003

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Scheduled Task/Job

              1
              T1053

              Defense Evasion

              Modify Registry

              3
              T1112

              Impair Defenses

              2
              T1562

              Disable or Modify Tools

              2
              T1562.001

              Discovery

              Query Registry

              1
              T1012

              System Information Discovery

              2
              T1082

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7902882.exe
                Filesize

                706KB

                MD5

                2c65beaa0034e1c9faf92b7551d8b022

                SHA1

                b824e888f2cdde0446053a471b8ad5a038c5d84d

                SHA256

                c66fa1c34c80724cbb32dc5d57c0c64ffb037110fefe5daa8d6ac85eb4501066

                SHA512

                1425ad56986c2a879731862f1f46b2e57fe01a5536ba7ca6f52d7c7e65b2f5b4a35889ae563faed7f0dd402237d8dd3ab8ccbc2006d63637be241ca47f176b1d

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7653899.exe
                Filesize

                540KB

                MD5

                1b99a47366f793314f8fbabc61f22c20

                SHA1

                a902fe5e971f8cb37b83f8ead93e76c28376b99a

                SHA256

                3ceceab1b967b8aa759dad3089cdb09aaeba2578e8bc70576c2680df19c892b7

                SHA512

                79760a43ea3b28cea15f53f9d9b8be971f8fce59fabc5e2943ece7a34bd477241bd6d934f8436c373e00304fb11ad16a49870ecfcfc4eddd839e82ad4c94baab

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i4218739.exe
                Filesize

                173KB

                MD5

                2790d4897a207f1f0c91996f5ea026cb

                SHA1

                e65df1f385c36226405cfc74b51a858a642244fb

                SHA256

                c7d9f00471b0b735502684437e1596d7177a026726bbace4f800c05db65b1e43

                SHA512

                ee92e7a6981ee393343b29080b9258ce9b5199270043e111bfbbaee12d0ee0f4421def026849f08d6e87821e480d79bc53ac7ad51dfb444a6e37f892b2266a8b

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9569919.exe
                Filesize

                384KB

                MD5

                88fd436a63bb8b305a69ae43171d6cd0

                SHA1

                23fa361d0b196800ce188ef1e0a07cc5c42e7ba9

                SHA256

                5be107116f8d98ca0470e6e7fa77323817137c0370cd0fc0a37120ff6c9acd02

                SHA512

                fa26a6dcebfc0d96c8aa116992b1ad017f62045a052850edfff3c194e997f94884f95238d08cc7af2f7349f4c9de4202598ae10dd3bc6559b9ffc0a6bca8461d

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4522034.exe
                Filesize

                185KB

                MD5

                37ef078be2b7ad25c82c683344481421

                SHA1

                8e5646630f573185d019cf017d9204a5dbd57728

                SHA256

                7bbfe441a3a34d88fb5f0dc4a6e9d27b300bf945b8e64f91d25704b5cb320fe7

                SHA512

                456928068ebf2f9420fa33d69854a7a5117207e2fcda15b251725266581ec1d931ff989d68a2bb28f802f4b7808029a14effe8d0e68653634680dd66366ea5c7

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h4431890.exe
                Filesize

                336KB

                MD5

                3fa5620646ab64a5b929893be1fc5215

                SHA1

                ffc6db6d0096101c65e3d0f575d05daa4ae63cbf

                SHA256

                a1e0512f57b2dc3c51e6b6d98549ef99ae5d6d9417487062e5a7672610d8ccff

                SHA512

                7473e4635b2a2a823d6ef0ff1df2f3492b8755c5a7cc4025252d50faa36872b65f4a117221ec55c0228d96f01c5433ac10cd849ab92fc5ef7215f4fce3d23335

              • memory/2300-79-0x0000000005210000-0x0000000005222000-memory.dmp
                Filesize

                72KB

              • memory/2300-78-0x0000000005410000-0x000000000551A000-memory.dmp
                Filesize

                1.0MB

              • memory/2300-77-0x0000000005920000-0x0000000005F38000-memory.dmp
                Filesize

                6.1MB

              • memory/2300-76-0x0000000001150000-0x0000000001156000-memory.dmp
                Filesize

                24KB

              • memory/2300-75-0x00000000008A0000-0x00000000008D0000-memory.dmp
                Filesize

                192KB

              • memory/2300-80-0x0000000005270000-0x00000000052AC000-memory.dmp
                Filesize

                240KB

              • memory/2300-81-0x0000000005300000-0x000000000534C000-memory.dmp
                Filesize

                304KB

              • memory/4652-46-0x0000000004F60000-0x0000000004F76000-memory.dmp
                Filesize

                88KB

              • memory/4652-50-0x0000000004F60000-0x0000000004F76000-memory.dmp
                Filesize

                88KB

              • memory/4652-44-0x0000000004F60000-0x0000000004F76000-memory.dmp
                Filesize

                88KB

              • memory/4652-39-0x0000000004F60000-0x0000000004F76000-memory.dmp
                Filesize

                88KB

              • memory/4652-36-0x0000000004F60000-0x0000000004F76000-memory.dmp
                Filesize

                88KB

              • memory/4652-34-0x0000000004F60000-0x0000000004F76000-memory.dmp
                Filesize

                88KB

              • memory/4652-32-0x0000000004F60000-0x0000000004F76000-memory.dmp
                Filesize

                88KB

              • memory/4652-42-0x0000000004F60000-0x0000000004F76000-memory.dmp
                Filesize

                88KB

              • memory/4652-31-0x0000000004F60000-0x0000000004F76000-memory.dmp
                Filesize

                88KB

              • memory/4652-48-0x0000000004F60000-0x0000000004F76000-memory.dmp
                Filesize

                88KB

              • memory/4652-52-0x0000000004F60000-0x0000000004F76000-memory.dmp
                Filesize

                88KB

              • memory/4652-58-0x0000000004F60000-0x0000000004F76000-memory.dmp
                Filesize

                88KB

              • memory/4652-54-0x0000000004F60000-0x0000000004F76000-memory.dmp
                Filesize

                88KB

              • memory/4652-56-0x0000000004F60000-0x0000000004F76000-memory.dmp
                Filesize

                88KB

              • memory/4652-40-0x0000000004F60000-0x0000000004F76000-memory.dmp
                Filesize

                88KB

              • memory/4652-30-0x0000000004F60000-0x0000000004F7C000-memory.dmp
                Filesize

                112KB

              • memory/4652-29-0x00000000049B0000-0x0000000004F54000-memory.dmp
                Filesize

                5.6MB

              • memory/4652-28-0x00000000023C0000-0x00000000023DE000-memory.dmp
                Filesize

                120KB