Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 13:42

General

  • Target

    4ad01d1b8447dec87df5bab9203c2e197c3ca2cc82fb498c24c04e92c008e930.exe

  • Size

    1.7MB

  • MD5

    40f6737b319dacb271101b21ca740f85

  • SHA1

    821f4078857ecd3551a4b89d4567e16db5efb3ea

  • SHA256

    4ad01d1b8447dec87df5bab9203c2e197c3ca2cc82fb498c24c04e92c008e930

  • SHA512

    f0ce1a820c17bf88247fcf676d9528eef09b4ab5625575482b1f369e6ef8ff922937025baf3d5b13effb7d8a3d6f39ca92dbf3f4ec4361d1c5ac09857a103e80

  • SSDEEP

    24576:ZyjkaV9wdu7KAYztfwhpEcm3Tt+RWYnJ+tOlwUhjNYYzV4Yt+fZbg70x4w2Jh:MvV9sAYGbfmDtGHnJpsVY8fY0

Malware Config

Extracted

Family

amadey

Version

3.80

Botnet

9c0adb

C2

http://193.3.19.154

Attributes
  • install_dir

    cb7ae701b3

  • install_file

    oneetx.exe

  • strings_key

    23b27c80db2465a8e1dc15491b69b82f

  • url_paths

    /store/games/index.php

rc4.plain

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

most

C2

185.161.248.73:4164

Attributes
  • auth_value

    7da4dfa153f2919e617aa016f7c36008

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 14 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 20 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ad01d1b8447dec87df5bab9203c2e197c3ca2cc82fb498c24c04e92c008e930.exe
    "C:\Users\Admin\AppData\Local\Temp\4ad01d1b8447dec87df5bab9203c2e197c3ca2cc82fb498c24c04e92c008e930.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\or443631.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\or443631.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3608
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gS335612.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gS335612.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2068
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\IX200098.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\IX200098.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1440
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ET641867.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ET641867.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1824
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a95463765.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a95463765.exe
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4712
              • C:\Windows\Temp\1.exe
                "C:\Windows\Temp\1.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Executes dropped EXE
                • Windows security modification
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1240
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b21973476.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b21973476.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:548
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 548 -s 1256
                7⤵
                • Program crash
                PID:1192
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c90894954.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c90894954.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:5332
            • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
              "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1676
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F
                7⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:1460
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4804
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4696
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "oneetx.exe" /P "Admin:N"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4464
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "oneetx.exe" /P "Admin:R" /E
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1816
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:5316
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\cb7ae701b3" /P "Admin:N"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1952
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\cb7ae701b3" /P "Admin:R" /E
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:5392
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d74329606.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d74329606.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:6020
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2480
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 6020 -s 1380
            5⤵
            • Program crash
            PID:5336
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f28113770.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f28113770.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3692
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 548 -ip 548
    1⤵
      PID:5148
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 6020 -ip 6020
      1⤵
        PID:2336
      • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        1⤵
        • Executes dropped EXE
        PID:1240
      • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        1⤵
        • Executes dropped EXE
        PID:4860

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\or443631.exe

        Filesize

        1.4MB

        MD5

        2210af4c35405d1c0947d531bcc301c7

        SHA1

        ac46442defe44fca1de69a25b43178c072be0f29

        SHA256

        8dcea865b9e0ad22f941d9c864f843f3759e85aee48284043f127980e5f8f2d1

        SHA512

        8d79d7b8b7bc2dea8db57b5d465886fb434d942344d34784b886d1a5c94fcf3a163e2556ecb82b4d6975ba0813f23737e06096bd9a9335771a8711eb177038f5

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f28113770.exe

        Filesize

        168KB

        MD5

        56e32806c2dcb4c1411987172642dc3c

        SHA1

        3c7632399057e463dd8cd12180d3f9c17bf22410

        SHA256

        75e2842fb2d7bd9fd4fb8e6a5023f63d17143ec0d96bfc3e5d68a82ec19a52c1

        SHA512

        80371e014ac505dd6a8be2cd14ba4d9a0bffa6f46dd4da18dc8ab1624fcd64b09233499189d38bfb43fd0026c127f546bb9d8c4a3e1cb7592e833602619a4873

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gS335612.exe

        Filesize

        1.3MB

        MD5

        51447f0889f00fb6d4fa46762669cb1e

        SHA1

        c0902665497931a110f3bebeb4429d6324b1a9e0

        SHA256

        d329aadd7ea10b689a488f66e3fbb74c0305c2083f8708fb610945f39ac8ff8e

        SHA512

        a99da1f2432a2a2ae2e7edaaf3773f327f16ccc3a2d0bab358be897399fd191562bd6ac39c98e69bbf822fef01b28cb28b510ab118b66c7029bca08eaadac6ac

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\IX200098.exe

        Filesize

        850KB

        MD5

        153b79b5ed28963ae750cfd4d2bde89c

        SHA1

        a586fa4105d5ee9622733b50f2393182f37a90f4

        SHA256

        90d81eaf514200497dd30fc67405824bf5162ff8264e618eaf09f36865eba050

        SHA512

        68ad5488123b9171715bb45ce57f92e8a48a3c27b06e4d55f618014a2cb255450b6f54608aef32b6af0c46c84dcd01ac2c3c74899dceba2ba50f518fb859fa07

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d74329606.exe

        Filesize

        582KB

        MD5

        881af5425bdf4e6d0127c298909bc037

        SHA1

        af005f6bd873cdf0823c012093c95a8bfc791a66

        SHA256

        180ab694d0bdc9df746b5cb21066983674e621eecd92fd0fc42f49125c79672a

        SHA512

        058693d0f6918d6f2a7e3943eab8b02d3d8260a46062733a238eb31412694a1614d2ac29cd4b0d2a8c58757beeebdc864f579e7def232bd06a0d26c190adbfc6

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ET641867.exe

        Filesize

        679KB

        MD5

        0f2edb82f92437f5616ee209d83f69db

        SHA1

        3f06b9d3dd9aa7412e5691ba52c1ab965bd8e9d3

        SHA256

        62b8e0d8ae6467a28c0346ac75d74cbff22c6fd423cd1d06141580094ce15edc

        SHA512

        d3c496bd17d7d8c79574d4c72970e4a578ab8033aef527d0daff11345c1733a7de578c156c0b73a0c6b04a888c52846727fa5de6c7789ee622af75cca3f45d8d

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c90894954.exe

        Filesize

        204KB

        MD5

        e7415b358c0f5404b3606874ceed6130

        SHA1

        fb042cab302340677108bcc12eeedc496081b0a2

        SHA256

        a1bdecfb6bd2dee1943ae311521a7502364ae064c06d2a1ae3b88c13b60c818b

        SHA512

        10d6f3251f8fcf528fe007bb0a78e56f4d8bbd99773bd9c106947c065dcdaf49b8e7f897fe19498f92db6288f63797628dd106b6fff6ef8279fbb9f241741c39

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a95463765.exe

        Filesize

        300KB

        MD5

        df49b6f494ad5f1809b67d82b81d593f

        SHA1

        f914d2c16e810da81feccfb6d484b0ad4145e64f

        SHA256

        a34cafadd6697a0c33509d0a26e92588b4f463bf752afc88cc30d3684d6f9fc8

        SHA512

        d635cd5ab718251900fb5a04d19b0205c4397915667154ac3db6e15cb42b6e8b6701b4c5a3e0d725e039fc50f58bd1fdb2d482e9bdc293df7ab62a81ac4d6de8

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b21973476.exe

        Filesize

        521KB

        MD5

        c1cd8dcfa64386fd150db02b128cb06d

        SHA1

        f4280cd222f8531f4699f5dd5957463c10d13fbe

        SHA256

        87933f1cd6a7b9408d533cd4505e96238f4851b1de4a27a3f9b3143e85774dfc

        SHA512

        b354732f6148fa82697578825992635550a14ba61b93cbd3c24e2adcb7ad9d0e704688e78ceb3fcf197dafe4b7ac755186560338f911eed28cca6653b304ecf1

      • C:\Windows\Temp\1.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        f16fb63d4e551d3808e8f01f2671b57e

        SHA1

        781153ad6235a1152da112de1fb39a6f2d063575

        SHA256

        8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

        SHA512

        fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

      • memory/548-4312-0x0000000005750000-0x00000000057E2000-memory.dmp

        Filesize

        584KB

      • memory/1240-2182-0x0000000000810000-0x000000000081A000-memory.dmp

        Filesize

        40KB

      • memory/2480-6498-0x0000000005590000-0x00000000055A2000-memory.dmp

        Filesize

        72KB

      • memory/2480-6494-0x0000000000D20000-0x0000000000D4E000-memory.dmp

        Filesize

        184KB

      • memory/2480-6495-0x00000000015E0000-0x00000000015E6000-memory.dmp

        Filesize

        24KB

      • memory/2480-6496-0x0000000005D50000-0x0000000006368000-memory.dmp

        Filesize

        6.1MB

      • memory/2480-6497-0x0000000005840000-0x000000000594A000-memory.dmp

        Filesize

        1.0MB

      • memory/2480-6499-0x0000000005730000-0x000000000576C000-memory.dmp

        Filesize

        240KB

      • memory/2480-6501-0x0000000005770000-0x00000000057BC000-memory.dmp

        Filesize

        304KB

      • memory/3692-6505-0x0000000000520000-0x0000000000550000-memory.dmp

        Filesize

        192KB

      • memory/3692-6506-0x0000000002810000-0x0000000002816000-memory.dmp

        Filesize

        24KB

      • memory/4712-91-0x0000000004A50000-0x0000000004AA1000-memory.dmp

        Filesize

        324KB

      • memory/4712-2166-0x0000000002470000-0x000000000247A000-memory.dmp

        Filesize

        40KB

      • memory/4712-73-0x0000000004A50000-0x0000000004AA1000-memory.dmp

        Filesize

        324KB

      • memory/4712-69-0x0000000004A50000-0x0000000004AA1000-memory.dmp

        Filesize

        324KB

      • memory/4712-67-0x0000000004A50000-0x0000000004AA1000-memory.dmp

        Filesize

        324KB

      • memory/4712-65-0x0000000004A50000-0x0000000004AA1000-memory.dmp

        Filesize

        324KB

      • memory/4712-64-0x0000000004A50000-0x0000000004AA1000-memory.dmp

        Filesize

        324KB

      • memory/4712-61-0x0000000004A50000-0x0000000004AA1000-memory.dmp

        Filesize

        324KB

      • memory/4712-59-0x0000000004A50000-0x0000000004AA1000-memory.dmp

        Filesize

        324KB

      • memory/4712-58-0x0000000004A50000-0x0000000004AA1000-memory.dmp

        Filesize

        324KB

      • memory/4712-55-0x0000000004A50000-0x0000000004AA1000-memory.dmp

        Filesize

        324KB

      • memory/4712-53-0x0000000004A50000-0x0000000004AA1000-memory.dmp

        Filesize

        324KB

      • memory/4712-49-0x0000000004A50000-0x0000000004AA1000-memory.dmp

        Filesize

        324KB

      • memory/4712-47-0x0000000004A50000-0x0000000004AA1000-memory.dmp

        Filesize

        324KB

      • memory/4712-45-0x0000000004A50000-0x0000000004AA1000-memory.dmp

        Filesize

        324KB

      • memory/4712-43-0x0000000004A50000-0x0000000004AA1000-memory.dmp

        Filesize

        324KB

      • memory/4712-41-0x0000000004A50000-0x0000000004AA1000-memory.dmp

        Filesize

        324KB

      • memory/4712-39-0x0000000004A50000-0x0000000004AA1000-memory.dmp

        Filesize

        324KB

      • memory/4712-38-0x0000000004A50000-0x0000000004AA1000-memory.dmp

        Filesize

        324KB

      • memory/4712-75-0x0000000004A50000-0x0000000004AA1000-memory.dmp

        Filesize

        324KB

      • memory/4712-77-0x0000000004A50000-0x0000000004AA1000-memory.dmp

        Filesize

        324KB

      • memory/4712-79-0x0000000004A50000-0x0000000004AA1000-memory.dmp

        Filesize

        324KB

      • memory/4712-81-0x0000000004A50000-0x0000000004AA1000-memory.dmp

        Filesize

        324KB

      • memory/4712-83-0x0000000004A50000-0x0000000004AA1000-memory.dmp

        Filesize

        324KB

      • memory/4712-85-0x0000000004A50000-0x0000000004AA1000-memory.dmp

        Filesize

        324KB

      • memory/4712-87-0x0000000004A50000-0x0000000004AA1000-memory.dmp

        Filesize

        324KB

      • memory/4712-35-0x0000000004970000-0x00000000049C8000-memory.dmp

        Filesize

        352KB

      • memory/4712-36-0x0000000004B70000-0x0000000005114000-memory.dmp

        Filesize

        5.6MB

      • memory/4712-37-0x0000000004A50000-0x0000000004AA6000-memory.dmp

        Filesize

        344KB

      • memory/4712-89-0x0000000004A50000-0x0000000004AA1000-memory.dmp

        Filesize

        324KB

      • memory/4712-93-0x0000000004A50000-0x0000000004AA1000-memory.dmp

        Filesize

        324KB

      • memory/4712-95-0x0000000004A50000-0x0000000004AA1000-memory.dmp

        Filesize

        324KB

      • memory/4712-98-0x0000000004A50000-0x0000000004AA1000-memory.dmp

        Filesize

        324KB

      • memory/4712-99-0x0000000004A50000-0x0000000004AA1000-memory.dmp

        Filesize

        324KB

      • memory/4712-101-0x0000000004A50000-0x0000000004AA1000-memory.dmp

        Filesize

        324KB

      • memory/4712-51-0x0000000004A50000-0x0000000004AA1000-memory.dmp

        Filesize

        324KB

      • memory/4712-71-0x0000000004A50000-0x0000000004AA1000-memory.dmp

        Filesize

        324KB

      • memory/6020-6481-0x0000000005760000-0x0000000005792000-memory.dmp

        Filesize

        200KB

      • memory/6020-4333-0x0000000005540000-0x00000000055A6000-memory.dmp

        Filesize

        408KB

      • memory/6020-4332-0x0000000004EE0000-0x0000000004F48000-memory.dmp

        Filesize

        416KB