Analysis

  • max time kernel
    148s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 14:14

General

  • Target

    2c667e1ebd284d1817e76aa64b56214dc2be2fd70e2d1fb5526e226bfbb19ba4.exe

  • Size

    1.1MB

  • MD5

    d92192da82c976775129d9c57f5f838f

  • SHA1

    2a05fb4fd9271b6147b4608951bb700cc0f425e2

  • SHA256

    2c667e1ebd284d1817e76aa64b56214dc2be2fd70e2d1fb5526e226bfbb19ba4

  • SHA512

    fe94368bd6889682a9c3ac6f8474ea3487e48b749d3ddbedf1a42b38b3fa2a3e233ddc6cb385677200000829fa7386ea5769a4a3a3caec8353a7a2f04e97d481

  • SSDEEP

    24576:ly7UwmTxKMiWPN11k/W+f9M2xl011OHjgFfLmUVWK3QLY:AQwmFKMimNMWuW2xG1+EFfLmUB3

Malware Config

Extracted

Family

amadey

Version

3.80

Botnet

9c0adb

C2

http://193.3.19.154

Attributes
  • install_dir

    cb7ae701b3

  • install_file

    oneetx.exe

  • strings_key

    23b27c80db2465a8e1dc15491b69b82f

  • url_paths

    /store/games/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 6 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c667e1ebd284d1817e76aa64b56214dc2be2fd70e2d1fb5526e226bfbb19ba4.exe
    "C:\Users\Admin\AppData\Local\Temp\2c667e1ebd284d1817e76aa64b56214dc2be2fd70e2d1fb5526e226bfbb19ba4.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MM418562.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MM418562.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3532
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iG137153.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iG137153.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4436
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\yh601653.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\yh601653.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3460
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\178887872.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\178887872.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1704
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\206435081.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\206435081.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:624
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 624 -s 1080
              6⤵
              • Program crash
              PID:832
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\335922226.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\335922226.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1596
          • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3692
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F
              6⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:1544
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:996
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4492
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:N"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4568
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                7⤵
                • System Location Discovery: System Language Discovery
                PID:1700
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4416
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "..\cb7ae701b3" /P "Admin:N"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4240
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "..\cb7ae701b3" /P "Admin:R" /E
                7⤵
                • System Location Discovery: System Language Discovery
                PID:3176
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\422939709.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\422939709.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4644
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 624 -ip 624
    1⤵
      PID:4136
    • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
      C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
      1⤵
      • Executes dropped EXE
      PID:1476
    • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
      C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
      1⤵
      • Executes dropped EXE
      PID:1600

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MM418562.exe

      Filesize

      929KB

      MD5

      c06120fe3a8d9c5a218da9de3836660b

      SHA1

      972e1fc064f609bbf7fa9b25f1ead2985251c693

      SHA256

      ab3ff8202cb7501ad1b2afe6b41e79604eb490d8631d4a848d1d2b6745d2b4ef

      SHA512

      907b7bfae9ae6ef6b44df49efeb4813ffab93153ff8213a2d2c5302b8a9abf1b62073febba251333462c31be43695652cd72ba98ca8f6838633893a41084d7d2

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\422939709.exe

      Filesize

      340KB

      MD5

      2808890a35d901d80639aff42967b40b

      SHA1

      c836cb663d701b7a45ec8886e7bcdc588ea173f4

      SHA256

      7533de01bac7302c2589ef886a1b1cd386e0c992cdad4c8b9b5ebf093168dd3b

      SHA512

      665265ab7549bf798e2761c9fa58121a8194419e3b185c4a246ad25b3e25f86a1ec9a32f4abe6291550e7952c228f44b59500965350307e3fe41f2759ac6337e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iG137153.exe

      Filesize

      577KB

      MD5

      ead56bace46500dba786b6d1d159a929

      SHA1

      fbcc26c9bc1ee05465fc93659ee102c4c9a9ae74

      SHA256

      bbcfcdcfb0f504acf54612ca9a3f069602bae0af58496213c7d9606b6e9a42ee

      SHA512

      0c59a69047956ffb28766277fff235c5c3b6929965f79b56500735748eadc9c611d8e7a600f92db2ea4b4a19742e5241a3350a532c278e4ff9494a8284b433a7

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\335922226.exe

      Filesize

      204KB

      MD5

      1304f384653e08ae497008ff13498608

      SHA1

      d9a76ed63d74d4217c5027757cb9a7a0d0093080

      SHA256

      2a9dabab35fb09085750e1cc762e32b0fe4cbd7ed4276ef7e68ba159ae330eaa

      SHA512

      4138217fd538e827c89db5c0cd4ea21bd8c8d3a7196d2eabf10412caf7b929479e768747df5fd92fc022d758f1840474530ba82dcb7e8672cc6eb88caeaf38c1

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\yh601653.exe

      Filesize

      405KB

      MD5

      0d7da5d85bab0763b7d163f9d8f02a8d

      SHA1

      efd65adec7df71aa7c46c99a6730c03add26afb0

      SHA256

      26c8374555b4bf8df680f02850a526bd904e46e099ba00c1c640d72be21cd095

      SHA512

      ce74fd6d308e3a9babfccf91898a13874b103da9683c8e32d2fb8902e9e31c2ae3b5c9521ade320c26fcbfe390231a97c41b86207a6f3a3edf78b9671fec200a

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\178887872.exe

      Filesize

      176KB

      MD5

      2b71f4b18ac8214a2bff547b6ce2f64f

      SHA1

      b8f2f25139a7b2e8d5e8fbc024eb5cac518bc6a5

      SHA256

      f7eedf3aec775a62c265d1652686b30a8a45a953523e2fb3cfc1fac3c6a66fbc

      SHA512

      33518eff768610bf54f9888d9d0d746b0c3500dc5f2b8fd5f1641d5a264f657a8311b40364f70932512581183b244fec3feb535e21c13e0ec8adec9994175177

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\206435081.exe

      Filesize

      257KB

      MD5

      7db77cadb2e05e7eb977b33f2239e4f2

      SHA1

      d26a2a56d858c150d8371f9bbf9901f71fb3b541

      SHA256

      692051afd3836ee6761034e020aec467f4a6aa692551b7a3f729d0b238df65d7

      SHA512

      beb6a2c776a1cd885db34ee70d9913e29d401581c85a04e529ad18a54788df32e97d2e88b132ab9888ecc359ce5930ad2226650907154a4188e2b3af8cefb2c7

    • memory/624-94-0x0000000000400000-0x0000000002B9B000-memory.dmp

      Filesize

      39.6MB

    • memory/624-92-0x0000000000400000-0x0000000002B9B000-memory.dmp

      Filesize

      39.6MB

    • memory/1704-38-0x0000000004980000-0x0000000004993000-memory.dmp

      Filesize

      76KB

    • memory/1704-29-0x0000000004B40000-0x00000000050E4000-memory.dmp

      Filesize

      5.6MB

    • memory/1704-52-0x0000000004980000-0x0000000004993000-memory.dmp

      Filesize

      76KB

    • memory/1704-50-0x0000000004980000-0x0000000004993000-memory.dmp

      Filesize

      76KB

    • memory/1704-48-0x0000000004980000-0x0000000004993000-memory.dmp

      Filesize

      76KB

    • memory/1704-46-0x0000000004980000-0x0000000004993000-memory.dmp

      Filesize

      76KB

    • memory/1704-44-0x0000000004980000-0x0000000004993000-memory.dmp

      Filesize

      76KB

    • memory/1704-42-0x0000000004980000-0x0000000004993000-memory.dmp

      Filesize

      76KB

    • memory/1704-40-0x0000000004980000-0x0000000004993000-memory.dmp

      Filesize

      76KB

    • memory/1704-56-0x0000000004980000-0x0000000004993000-memory.dmp

      Filesize

      76KB

    • memory/1704-36-0x0000000004980000-0x0000000004993000-memory.dmp

      Filesize

      76KB

    • memory/1704-34-0x0000000004980000-0x0000000004993000-memory.dmp

      Filesize

      76KB

    • memory/1704-31-0x0000000004980000-0x0000000004993000-memory.dmp

      Filesize

      76KB

    • memory/1704-58-0x0000000004980000-0x0000000004993000-memory.dmp

      Filesize

      76KB

    • memory/1704-32-0x0000000004980000-0x0000000004993000-memory.dmp

      Filesize

      76KB

    • memory/1704-54-0x0000000004980000-0x0000000004993000-memory.dmp

      Filesize

      76KB

    • memory/1704-30-0x0000000004980000-0x0000000004998000-memory.dmp

      Filesize

      96KB

    • memory/1704-28-0x0000000002340000-0x000000000235A000-memory.dmp

      Filesize

      104KB

    • memory/4644-112-0x0000000004BF0000-0x0000000004C2C000-memory.dmp

      Filesize

      240KB

    • memory/4644-113-0x0000000007180000-0x00000000071BA000-memory.dmp

      Filesize

      232KB

    • memory/4644-114-0x0000000007180000-0x00000000071B5000-memory.dmp

      Filesize

      212KB

    • memory/4644-119-0x0000000007180000-0x00000000071B5000-memory.dmp

      Filesize

      212KB

    • memory/4644-117-0x0000000007180000-0x00000000071B5000-memory.dmp

      Filesize

      212KB

    • memory/4644-115-0x0000000007180000-0x00000000071B5000-memory.dmp

      Filesize

      212KB

    • memory/4644-906-0x000000000A380000-0x000000000A998000-memory.dmp

      Filesize

      6.1MB

    • memory/4644-907-0x00000000072D0000-0x00000000072E2000-memory.dmp

      Filesize

      72KB

    • memory/4644-908-0x0000000009D60000-0x0000000009E6A000-memory.dmp

      Filesize

      1.0MB

    • memory/4644-909-0x0000000009E70000-0x0000000009EAC000-memory.dmp

      Filesize

      240KB

    • memory/4644-910-0x0000000006C90000-0x0000000006CDC000-memory.dmp

      Filesize

      304KB