Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-09-2024 01:15

General

  • Target

    eb730db12e7fde778270c7c828ca0cc2d152306dc2dd8051a4f67f05293f01c9.exe

  • Size

    1.8MB

  • MD5

    e4206a8ebbe7944ff69a29f1f64973bd

  • SHA1

    1ace9b781576c20624f2afbfd40eab0756e34c4f

  • SHA256

    eb730db12e7fde778270c7c828ca0cc2d152306dc2dd8051a4f67f05293f01c9

  • SHA512

    87dbfc6beeb7b26b389398748ef74e5667b2c0a2b1bbac2ff41c23220bdf29417d2019ec823721e084b5935ded283d88ec584bc4dfc91799b70df495df13b9ba

  • SSDEEP

    49152:cEkXsfHWvvKxauoCCsT2heDFV5gde7DaT2k+z3uCz5G9BiEUv:5PoYS0DFDpOS3Xzqg

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

redline

C2

38.180.109.140:20007

Extracted

Family

redline

Botnet

TG CLOUD @RLREBORN Admin @FATHEROFCARDERS

C2

91.194.55.146:29862

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Identifies Wine through registry keys 2 TTPs 4 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb730db12e7fde778270c7c828ca0cc2d152306dc2dd8051a4f67f05293f01c9.exe
    "C:\Users\Admin\AppData\Local\Temp\eb730db12e7fde778270c7c828ca0cc2d152306dc2dd8051a4f67f05293f01c9.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4660
    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
      "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Users\Admin\AppData\Local\Temp\1000289001\kiyan.exe
        "C:\Users\Admin\AppData\Local\Temp\1000289001\kiyan.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1548
      • C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe
        "C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
            PID:1564
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3432
    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
      C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:4624
    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
      C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:3064

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\1000289001\kiyan.exe

      Filesize

      304KB

      MD5

      44e17821665477b21d6c50cee97c84ef

      SHA1

      4fc146790747758f49f1fd4375144f000099a6cb

      SHA256

      5adac427a6eff8b0c1674c6095e2719d5ee46945fd4e397384af02b8ec691045

      SHA512

      ab98a8151b41b56d7e59c375541c366df2f83c01ee26a5d1f079f74fb69eac4d229df62d3900eb8db6fd8cae1e420c21b7b9b2b3a44a8b135cb6659b6b70b6dc

    • C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe

      Filesize

      313KB

      MD5

      d66daa20d13a4471446dfef15efa6b64

      SHA1

      21a38e7bd543dec86d52db66913353b01c1d6466

      SHA256

      2e91e53e039b8cead9d25b9218fbdc9d7132785cd516d8e642dc331bdce93c27

      SHA512

      c584348d8db6705172b179d0c4fcddd8e036fb2e7968319215547dd8ff8af13a5f84b3464e58d22e4d3a7c32ad7af83c22453dab12a6a90572ae70e63164987e

    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe

      Filesize

      1.8MB

      MD5

      e4206a8ebbe7944ff69a29f1f64973bd

      SHA1

      1ace9b781576c20624f2afbfd40eab0756e34c4f

      SHA256

      eb730db12e7fde778270c7c828ca0cc2d152306dc2dd8051a4f67f05293f01c9

      SHA512

      87dbfc6beeb7b26b389398748ef74e5667b2c0a2b1bbac2ff41c23220bdf29417d2019ec823721e084b5935ded283d88ec584bc4dfc91799b70df495df13b9ba

    • C:\Users\Admin\AppData\Local\Temp\TmpC1BA.tmp

      Filesize

      2KB

      MD5

      1420d30f964eac2c85b2ccfe968eebce

      SHA1

      bdf9a6876578a3e38079c4f8cf5d6c79687ad750

      SHA256

      f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

      SHA512

      6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

    • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-786284298-625481688-3210388970-1000\76b53b3ec448f7ccdda2063b15d2bfc3_1b74ca46-c49b-4c52-a57d-8cd1ff70c625

      Filesize

      2KB

      MD5

      41faf865479ddf5c423010483fce3e78

      SHA1

      ac0d2546fafa2c69df4393f49c19c7674c36863c

      SHA256

      39b88381e629fe2b71a58c25b0c154a133162ca054fae833fa8c5b111ddbfac9

      SHA512

      845d851554642440add9011de2debb745d47dfd689a0a70142e773aaed7d7c0d50d77ec076e9f65de78b5ce530b1ecd2372161ee9da3e61d016ec15f166b3758

    • C:\Users\Admin\Desktop\Microsoft Edge.lnk

      Filesize

      2KB

      MD5

      aa60d7755d5a23aaba15d7e1555aa410

      SHA1

      86161ac3fc74599ef77c21e6d4525d4d2407a330

      SHA256

      a9d7cb990c537410262c28d8017bd8c2ffbdcc9850133a81bf3cc5100f090e4e

      SHA512

      2e51315c3704d082686ee84b93ea15e623e785280051e6482e172ddd9fa76c0234303132dbdff4174972877c00b004c43289782e1b27417ab863d852c8ae35e2

    • C:\Users\Public\Desktop\Google Chrome.lnk

      Filesize

      2KB

      MD5

      fba612eeb015040e2746998f014d48bb

      SHA1

      6a0b6255fd631eeb7a3e5c8378e71410464608a6

      SHA256

      efed14402dbda73ef60c40cde4d6095269dd87531980a735f3bb35ad4b598a89

      SHA512

      3370be0f65c58366664475d361be58253ad5eb8e8924f820c36b7f5a6980f420548152e2962efd4e2f20435b7e1003c896cc00f2df2185947edcb4ca6d34d1db

    • memory/1548-71-0x0000000006390000-0x00000000063DC000-memory.dmp

      Filesize

      304KB

    • memory/1548-124-0x00000000738AE000-0x00000000738AF000-memory.dmp

      Filesize

      4KB

    • memory/1548-41-0x00000000738AE000-0x00000000738AF000-memory.dmp

      Filesize

      4KB

    • memory/1548-42-0x0000000000010000-0x0000000000062000-memory.dmp

      Filesize

      328KB

    • memory/1548-43-0x0000000005160000-0x0000000005704000-memory.dmp

      Filesize

      5.6MB

    • memory/1548-44-0x0000000004A50000-0x0000000004AE2000-memory.dmp

      Filesize

      584KB

    • memory/1548-45-0x0000000004B10000-0x0000000004B1A000-memory.dmp

      Filesize

      40KB

    • memory/1548-120-0x00000000064D0000-0x0000000006536000-memory.dmp

      Filesize

      408KB

    • memory/1548-62-0x0000000005710000-0x0000000005786000-memory.dmp

      Filesize

      472KB

    • memory/1548-63-0x0000000005FF0000-0x000000000600E000-memory.dmp

      Filesize

      120KB

    • memory/1548-66-0x0000000006730000-0x0000000006D48000-memory.dmp

      Filesize

      6.1MB

    • memory/1548-67-0x0000000006280000-0x000000000638A000-memory.dmp

      Filesize

      1.0MB

    • memory/1548-123-0x0000000006F50000-0x0000000006FA0000-memory.dmp

      Filesize

      320KB

    • memory/1548-68-0x00000000061C0000-0x00000000061D2000-memory.dmp

      Filesize

      72KB

    • memory/1548-70-0x0000000006220000-0x000000000625C000-memory.dmp

      Filesize

      240KB

    • memory/2656-93-0x0000000000A60000-0x0000000000AB4000-memory.dmp

      Filesize

      336KB

    • memory/2824-149-0x0000000000610000-0x0000000000ABF000-memory.dmp

      Filesize

      4.7MB

    • memory/2824-148-0x0000000000610000-0x0000000000ABF000-memory.dmp

      Filesize

      4.7MB

    • memory/2824-74-0x0000000000610000-0x0000000000ABF000-memory.dmp

      Filesize

      4.7MB

    • memory/2824-40-0x0000000000610000-0x0000000000ABF000-memory.dmp

      Filesize

      4.7MB

    • memory/2824-72-0x0000000000610000-0x0000000000ABF000-memory.dmp

      Filesize

      4.7MB

    • memory/2824-21-0x0000000000610000-0x0000000000ABF000-memory.dmp

      Filesize

      4.7MB

    • memory/2824-20-0x0000000000610000-0x0000000000ABF000-memory.dmp

      Filesize

      4.7MB

    • memory/2824-19-0x0000000000611000-0x000000000063F000-memory.dmp

      Filesize

      184KB

    • memory/2824-18-0x0000000000610000-0x0000000000ABF000-memory.dmp

      Filesize

      4.7MB

    • memory/2824-142-0x0000000000610000-0x0000000000ABF000-memory.dmp

      Filesize

      4.7MB

    • memory/2824-69-0x0000000000610000-0x0000000000ABF000-memory.dmp

      Filesize

      4.7MB

    • memory/2824-73-0x0000000000610000-0x0000000000ABF000-memory.dmp

      Filesize

      4.7MB

    • memory/2824-125-0x0000000000610000-0x0000000000ABF000-memory.dmp

      Filesize

      4.7MB

    • memory/2824-128-0x0000000000610000-0x0000000000ABF000-memory.dmp

      Filesize

      4.7MB

    • memory/2824-129-0x0000000000610000-0x0000000000ABF000-memory.dmp

      Filesize

      4.7MB

    • memory/2824-130-0x0000000000610000-0x0000000000ABF000-memory.dmp

      Filesize

      4.7MB

    • memory/2824-147-0x0000000000610000-0x0000000000ABF000-memory.dmp

      Filesize

      4.7MB

    • memory/2824-141-0x0000000000610000-0x0000000000ABF000-memory.dmp

      Filesize

      4.7MB

    • memory/2824-134-0x0000000000610000-0x0000000000ABF000-memory.dmp

      Filesize

      4.7MB

    • memory/2824-140-0x0000000000610000-0x0000000000ABF000-memory.dmp

      Filesize

      4.7MB

    • memory/2824-143-0x0000000000610000-0x0000000000ABF000-memory.dmp

      Filesize

      4.7MB

    • memory/2824-138-0x0000000000610000-0x0000000000ABF000-memory.dmp

      Filesize

      4.7MB

    • memory/3064-145-0x0000000000610000-0x0000000000ABF000-memory.dmp

      Filesize

      4.7MB

    • memory/3064-146-0x0000000000610000-0x0000000000ABF000-memory.dmp

      Filesize

      4.7MB

    • memory/3432-96-0x0000000000400000-0x0000000000452000-memory.dmp

      Filesize

      328KB

    • memory/3432-136-0x000000000A4A0000-0x000000000A9CC000-memory.dmp

      Filesize

      5.2MB

    • memory/3432-135-0x0000000009490000-0x0000000009652000-memory.dmp

      Filesize

      1.8MB

    • memory/4624-133-0x0000000000610000-0x0000000000ABF000-memory.dmp

      Filesize

      4.7MB

    • memory/4624-132-0x0000000000610000-0x0000000000ABF000-memory.dmp

      Filesize

      4.7MB

    • memory/4660-1-0x0000000077C94000-0x0000000077C96000-memory.dmp

      Filesize

      8KB

    • memory/4660-0-0x0000000000D90000-0x000000000123F000-memory.dmp

      Filesize

      4.7MB

    • memory/4660-2-0x0000000000D91000-0x0000000000DBF000-memory.dmp

      Filesize

      184KB

    • memory/4660-3-0x0000000000D90000-0x000000000123F000-memory.dmp

      Filesize

      4.7MB

    • memory/4660-4-0x0000000000D90000-0x000000000123F000-memory.dmp

      Filesize

      4.7MB

    • memory/4660-17-0x0000000000D90000-0x000000000123F000-memory.dmp

      Filesize

      4.7MB