Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-10-2024 20:33

General

  • Target

    df4acfa89b719e83a2194283fe33b71bddd0cb3c0b558f63414090761ac275a6.exe

  • Size

    731KB

  • MD5

    e24d16b2f5e855dcc343dd9bc37afa19

  • SHA1

    b48444d3cdb5c1cd55d10437161540ae07f8b959

  • SHA256

    df4acfa89b719e83a2194283fe33b71bddd0cb3c0b558f63414090761ac275a6

  • SHA512

    057e62dc8db85104fb91da547912558e6cfbf4a563eea43c0261585583a12dd4b7267625362ba207f52b1720582f0bae1b2a5d6ee10b125efeb882e5c58569d6

  • SSDEEP

    12288:XMrLy90QrVw3d5UlaLMO91pitliC3ZKp2izh+ZV5a62gmebO10BaLrO:sy7riHmaIupi9pKp2izI/7NbK0BaLa

Malware Config

Extracted

Family

amadey

Version

3.87

Botnet

59b440

C2

http://77.91.68.18

Attributes
  • install_dir

    b40d11255d

  • install_file

    saves.exe

  • strings_key

    fa622dfc42544927a6471829ee1fa9fe

  • url_paths

    /nice/index.php

rc4.plain

Extracted

Family

redline

Botnet

regta

C2

77.91.124.54:19071

Attributes
  • auth_value

    c6f537c6f0415ea7760a9bc81f48c756

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df4acfa89b719e83a2194283fe33b71bddd0cb3c0b558f63414090761ac275a6.exe
    "C:\Users\Admin\AppData\Local\Temp\df4acfa89b719e83a2194283fe33b71bddd0cb3c0b558f63414090761ac275a6.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2496
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3111452.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3111452.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1520
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4302957.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4302957.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2876
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y8947556.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y8947556.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2360
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3476887.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3476887.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1468
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m2077504.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m2077504.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1852
            • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
              "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3864
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                7⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:1016
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3396
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4404
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "saves.exe" /P "Admin:N"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1028
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "saves.exe" /P "Admin:R" /E
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:5000
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3116
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\b40d11255d" /P "Admin:N"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3080
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\b40d11255d" /P "Admin:R" /E
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3688
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n2710805.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n2710805.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2872
  • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
    C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
    1⤵
    • Executes dropped EXE
    PID:2060
  • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
    C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
    1⤵
    • Executes dropped EXE
    PID:3524
  • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
    C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
    1⤵
    • Executes dropped EXE
    PID:5088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3111452.exe

    Filesize

    599KB

    MD5

    7048b5ae1c97f69432d7c8ffcdbecf83

    SHA1

    5542a97724baefc254b26c4aa9353dfe379052ff

    SHA256

    5714810d8705338a5cce97f283a944bdee31c6c663231b0cfa4510ceb50f720b

    SHA512

    b42296058bc6b2694ede9eb09f3a469089e7330ea8d9b3bdbc1e4e317473944c5d6f7969e0ab8b874ac3be286824aa0243a821632539bb7007beb6c7fca36a61

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4302957.exe

    Filesize

    433KB

    MD5

    5e49f4c54a4e399ab6299958a19c89b4

    SHA1

    ae77f0a004624c57940a96e490ab3f69b7f8179a

    SHA256

    7640aa64e08a45db8004f247586aff4358638100ecbda7efcf21848fa465aedd

    SHA512

    8167a422464b7f840011a28253473c490f45bc007e27a6db098ae33edd063626a16e09ff120ccf16cd1b78bde4177993328a8e60464fbc65541901ba93c2ff17

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n2710805.exe

    Filesize

    174KB

    MD5

    5c81abf239684130b5e6f44bd12424df

    SHA1

    b2e4fb57f3206fd5ad2d9f1dc8f07a28f64c5305

    SHA256

    1580bac097fd02440aa872cf37446463dc440d6742ec467abcde2f69f21bad98

    SHA512

    4f562e8db5f625cbb448a3a60e6e5926ea749194da6c56786e948fd137612f6b31145a3f0771111c4e2f1d7a9c5abe7e1c68a00491abe0cf28e42097446d54d5

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y8947556.exe

    Filesize

    277KB

    MD5

    4f04c49917fbf519e41bc9fd37106f89

    SHA1

    dad7031e2dd873d7653f63d6286255ab9f4a0c80

    SHA256

    e630bd8f9d362cc690657a7431172e0958935ba1f3dece59e0a0f5e0848a367d

    SHA512

    7a446351c42f28dc1e8097529427dcc015e5ed1b8b780e0d876ebd1f2eb49ade175388fc63ac802a3ac548028dcd1886746bb170f76bb505119b6027420ec020

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3476887.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m2077504.exe

    Filesize

    313KB

    MD5

    69b27fe3308bebb904ae9c80c0745ae3

    SHA1

    53ab89c8f91f8ece4916747db74b4d22ef6cef95

    SHA256

    1993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b

    SHA512

    e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70

  • memory/1468-28-0x0000000000BD0000-0x0000000000BDA000-memory.dmp

    Filesize

    40KB

  • memory/2872-45-0x0000000000B20000-0x0000000000B50000-memory.dmp

    Filesize

    192KB

  • memory/2872-46-0x0000000002E00000-0x0000000002E06000-memory.dmp

    Filesize

    24KB

  • memory/2872-47-0x0000000005AF0000-0x0000000006108000-memory.dmp

    Filesize

    6.1MB

  • memory/2872-48-0x00000000055E0000-0x00000000056EA000-memory.dmp

    Filesize

    1.0MB

  • memory/2872-49-0x0000000005390000-0x00000000053A2000-memory.dmp

    Filesize

    72KB

  • memory/2872-50-0x0000000005510000-0x000000000554C000-memory.dmp

    Filesize

    240KB

  • memory/2872-51-0x0000000005550000-0x000000000559C000-memory.dmp

    Filesize

    304KB