Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/11/2024, 21:44

General

  • Target

    4f8b57f9e7841de8dd60110035444ea131781798798e753f753344b92adac3b5.exe

  • Size

    1.0MB

  • MD5

    74b52136ae5fa5c32a62510f2f4357ea

  • SHA1

    7b01fe88e5b4508c57c2f9734922f8026922af67

  • SHA256

    4f8b57f9e7841de8dd60110035444ea131781798798e753f753344b92adac3b5

  • SHA512

    2935df72088b51a5e0d2d3a7a90300c476bb034c92363a83e7ef8ff5f4cd4a193f5ccabc80dcf26c3fd40e43d0206cc18b738c13209b18184bc36a599cecde61

  • SSDEEP

    24576:oySmvvG8955ceK7Adq5baS7ZPbj+3gm5+yXLSTFnI5cdjb:v7nGkJK7AdUbaSlf+3yMwFI5oP

Malware Config

Extracted

Family

amadey

Version

3.80

Botnet

9c0adb

C2

http://193.3.19.154

Attributes
  • install_dir

    cb7ae701b3

  • install_file

    oneetx.exe

  • strings_key

    23b27c80db2465a8e1dc15491b69b82f

  • url_paths

    /store/games/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 34 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 6 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f8b57f9e7841de8dd60110035444ea131781798798e753f753344b92adac3b5.exe
    "C:\Users\Admin\AppData\Local\Temp\4f8b57f9e7841de8dd60110035444ea131781798798e753f753344b92adac3b5.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4988
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FC729343.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FC729343.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3876
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fg290873.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fg290873.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1388
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\118642686.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\118642686.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4036
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\217625857.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\217625857.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1016
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 1084
            5⤵
            • Program crash
            PID:3940
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\356353018.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\356353018.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3784
        • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
          "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3996
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:1568
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1140
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:3692
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:4776
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:R" /E
              6⤵
              • System Location Discovery: System Language Discovery
              PID:460
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2296
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "..\cb7ae701b3" /P "Admin:N"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:4084
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "..\cb7ae701b3" /P "Admin:R" /E
              6⤵
              • System Location Discovery: System Language Discovery
              PID:3024
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\400845446.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\400845446.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:4312
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1016 -ip 1016
    1⤵
      PID:1164
    • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
      C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
      1⤵
      • Executes dropped EXE
      PID:5776
    • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
      C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
      1⤵
      • Executes dropped EXE
      PID:4240

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\400845446.exe

      Filesize

      461KB

      MD5

      5e00cdf07d070ece3471b89313b8c958

      SHA1

      b16022292c212065ec880b5b6157ded575f01d61

      SHA256

      6c0c1087310e9114416d5e7f2db87928e4a58098d586b371f5f56fa1f78dd804

      SHA512

      96f73d146bb0a5adb752e459f256786b791c9c0973cfd481c673c8d8ddbf2d0f8ad5f20548c7297732ae85fc178deea857954308ebb66ffe295e428f9ae94d8b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FC729343.exe

      Filesize

      637KB

      MD5

      adebcbaf11b1e344e031d890c8a1d8a7

      SHA1

      9f4ed7702fcb901fbabbce7c046bfc690f9d7e92

      SHA256

      ffe06dcc5fab5bb5e30f40c843ace9dd31d64e8e6379beb5c8aea76a469341ba

      SHA512

      766a36e51447c1740177e5e87b4b11c2f764bf896ee3c3dfd41a38262aa450082be307d5a3487e914a27f8012d59694a96c7c5d9fe36dbffd81c182983e374f9

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\356353018.exe

      Filesize

      205KB

      MD5

      fedffcb03dd240a6092a84e43a3b330b

      SHA1

      7ff95dae42be69beb98271966c6c2c47d3c313a4

      SHA256

      ad79e9c65c92fcc99713869a81fe123817de0a6af9379a7d760b919d90a0fcc2

      SHA512

      ab9222f21b59b23d7148fe64b3d2bc9ad48d4e956e6db2357351fb0a6b89ecedfc2fe4576dc416771d05a091ff000af3f24a93ae9918ef49a40c814f50fb4d22

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fg290873.exe

      Filesize

      466KB

      MD5

      af7bbd8b08912452a0845fea52461ce4

      SHA1

      096ff3daf840355fbda3ad6188cf991cce43f246

      SHA256

      1378fa92e3d707ef438f446b3d8ed8aa71118861be51887437d6fcd4f871296c

      SHA512

      44acb3d12bfe46232462367a479035418f5669dd6abd3ce2e2aa09d8bbbd91fd1c6315265b32b34d9a375b8f310cf25b0423747d4946b9b216abda317956b06c

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\118642686.exe

      Filesize

      177KB

      MD5

      b8a49ed3323cf20ca8109b5716a1540f

      SHA1

      2cd7955cf284c54a872a983b4766dda5037222cd

      SHA256

      f660872437bdf8714153b35642381c95f548ad122470019caa50eeef0b956193

      SHA512

      0cd11c7f1f3cb96607d682c60639bdf6cdc88cff3b2b64bd46efae120923adcdaf8aca42dee176b5beb6840edad0b1206657d483dabbae582688bdd54a9523d0

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\217625857.exe

      Filesize

      377KB

      MD5

      71dc636ccaad12c0e0d7fa593722d1df

      SHA1

      cd5a86988616ff0406d6c61d1ca01b783358f3b6

      SHA256

      8c8a62953db33199021ea2465688a583b18a85a0fe7a80c4b556c3efc8f3d5d1

      SHA512

      158cf5da8eae2a06e433b0ea28913f2d5a99e8da6639e74636e3435a1df0662b045976e62f8650ba41294026b55be303ec15efd6dbc8e1574efe99a6eb20970d

    • memory/1016-84-0x0000000005370000-0x0000000005382000-memory.dmp

      Filesize

      72KB

    • memory/1016-60-0x0000000005370000-0x0000000005382000-memory.dmp

      Filesize

      72KB

    • memory/1016-88-0x0000000000400000-0x0000000000803000-memory.dmp

      Filesize

      4.0MB

    • memory/1016-63-0x0000000005370000-0x0000000005382000-memory.dmp

      Filesize

      72KB

    • memory/1016-64-0x0000000005370000-0x0000000005382000-memory.dmp

      Filesize

      72KB

    • memory/1016-67-0x0000000005370000-0x0000000005382000-memory.dmp

      Filesize

      72KB

    • memory/1016-68-0x0000000005370000-0x0000000005382000-memory.dmp

      Filesize

      72KB

    • memory/1016-70-0x0000000005370000-0x0000000005382000-memory.dmp

      Filesize

      72KB

    • memory/1016-72-0x0000000005370000-0x0000000005382000-memory.dmp

      Filesize

      72KB

    • memory/1016-74-0x0000000005370000-0x0000000005382000-memory.dmp

      Filesize

      72KB

    • memory/1016-76-0x0000000005370000-0x0000000005382000-memory.dmp

      Filesize

      72KB

    • memory/1016-78-0x0000000005370000-0x0000000005382000-memory.dmp

      Filesize

      72KB

    • memory/1016-80-0x0000000005370000-0x0000000005382000-memory.dmp

      Filesize

      72KB

    • memory/1016-86-0x0000000005370000-0x0000000005382000-memory.dmp

      Filesize

      72KB

    • memory/1016-82-0x0000000005370000-0x0000000005382000-memory.dmp

      Filesize

      72KB

    • memory/1016-59-0x0000000005370000-0x0000000005382000-memory.dmp

      Filesize

      72KB

    • memory/1016-57-0x0000000000B40000-0x0000000000B5A000-memory.dmp

      Filesize

      104KB

    • memory/1016-58-0x0000000005370000-0x0000000005388000-memory.dmp

      Filesize

      96KB

    • memory/4036-29-0x0000000004AC0000-0x0000000004AD3000-memory.dmp

      Filesize

      76KB

    • memory/4036-49-0x0000000004AC0000-0x0000000004AD3000-memory.dmp

      Filesize

      76KB

    • memory/4036-24-0x0000000004AC0000-0x0000000004AD3000-memory.dmp

      Filesize

      76KB

    • memory/4036-27-0x0000000004AC0000-0x0000000004AD3000-memory.dmp

      Filesize

      76KB

    • memory/4036-51-0x0000000004AC0000-0x0000000004AD3000-memory.dmp

      Filesize

      76KB

    • memory/4036-31-0x0000000004AC0000-0x0000000004AD3000-memory.dmp

      Filesize

      76KB

    • memory/4036-33-0x0000000004AC0000-0x0000000004AD3000-memory.dmp

      Filesize

      76KB

    • memory/4036-35-0x0000000004AC0000-0x0000000004AD3000-memory.dmp

      Filesize

      76KB

    • memory/4036-37-0x0000000004AC0000-0x0000000004AD3000-memory.dmp

      Filesize

      76KB

    • memory/4036-39-0x0000000004AC0000-0x0000000004AD3000-memory.dmp

      Filesize

      76KB

    • memory/4036-41-0x0000000004AC0000-0x0000000004AD3000-memory.dmp

      Filesize

      76KB

    • memory/4036-43-0x0000000004AC0000-0x0000000004AD3000-memory.dmp

      Filesize

      76KB

    • memory/4036-45-0x0000000004AC0000-0x0000000004AD3000-memory.dmp

      Filesize

      76KB

    • memory/4036-48-0x0000000004AC0000-0x0000000004AD3000-memory.dmp

      Filesize

      76KB

    • memory/4036-23-0x0000000004AC0000-0x0000000004AD8000-memory.dmp

      Filesize

      96KB

    • memory/4036-25-0x0000000004AC0000-0x0000000004AD3000-memory.dmp

      Filesize

      76KB

    • memory/4036-22-0x0000000004B80000-0x0000000005124000-memory.dmp

      Filesize

      5.6MB

    • memory/4036-21-0x00000000049F0000-0x0000000004A0A000-memory.dmp

      Filesize

      104KB

    • memory/4312-107-0x00000000026B0000-0x00000000026EC000-memory.dmp

      Filesize

      240KB

    • memory/4312-108-0x00000000053D0000-0x000000000540A000-memory.dmp

      Filesize

      232KB

    • memory/4312-114-0x00000000053D0000-0x0000000005405000-memory.dmp

      Filesize

      212KB

    • memory/4312-112-0x00000000053D0000-0x0000000005405000-memory.dmp

      Filesize

      212KB

    • memory/4312-110-0x00000000053D0000-0x0000000005405000-memory.dmp

      Filesize

      212KB

    • memory/4312-109-0x00000000053D0000-0x0000000005405000-memory.dmp

      Filesize

      212KB

    • memory/4312-901-0x0000000007F00000-0x0000000008518000-memory.dmp

      Filesize

      6.1MB

    • memory/4312-902-0x0000000007980000-0x0000000007992000-memory.dmp

      Filesize

      72KB

    • memory/4312-903-0x00000000079A0000-0x0000000007AAA000-memory.dmp

      Filesize

      1.0MB

    • memory/4312-904-0x0000000007AC0000-0x0000000007AFC000-memory.dmp

      Filesize

      240KB

    • memory/4312-905-0x0000000002620000-0x000000000266C000-memory.dmp

      Filesize

      304KB