Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/11/2024, 21:47

General

  • Target

    10e272dbcd0f6b89de581453fbb25904f791e055d8324151ad018d5be5a73892.exe

  • Size

    1.1MB

  • MD5

    dff100dc698cb15b266deb10ee665b92

  • SHA1

    1271a01ef5563dfbe6590b2c9ddfcf484e720292

  • SHA256

    10e272dbcd0f6b89de581453fbb25904f791e055d8324151ad018d5be5a73892

  • SHA512

    e31d78b3c7224845f82e852df0c4a56e40980a419a7d01a20e7f489fa6ad04e44a3593d7ee5c83b97bf782983468af715ed9da26a32b1c5569617d6e7cabe1a8

  • SSDEEP

    24576:uyCSYoUTnNrSO1xaARM7PK62Dc+5kdW9Ny5zbkKkpa:9C5BTnZSOmARM7PLfmNcbzkp

Malware Config

Extracted

Family

amadey

Version

3.80

Botnet

9c0adb

C2

http://193.3.19.154

Attributes
  • install_dir

    cb7ae701b3

  • install_file

    oneetx.exe

  • strings_key

    23b27c80db2465a8e1dc15491b69b82f

  • url_paths

    /store/games/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 6 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10e272dbcd0f6b89de581453fbb25904f791e055d8324151ad018d5be5a73892.exe
    "C:\Users\Admin\AppData\Local\Temp\10e272dbcd0f6b89de581453fbb25904f791e055d8324151ad018d5be5a73892.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4436
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yG173110.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yG173110.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4768
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oi789888.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oi789888.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4428
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ZP080786.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ZP080786.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1180
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\180239742.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\180239742.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4560
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\277453554.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\277453554.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1796
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1796 -s 1084
              6⤵
              • Program crash
              PID:4476
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\350215682.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\350215682.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2248
          • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4320
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F
              6⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:1968
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2776
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4452
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:N"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:2276
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                7⤵
                • System Location Discovery: System Language Discovery
                PID:2296
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:1528
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "..\cb7ae701b3" /P "Admin:N"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:2100
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "..\cb7ae701b3" /P "Admin:R" /E
                7⤵
                • System Location Discovery: System Language Discovery
                PID:2268
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\416743591.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\416743591.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4424
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1796 -ip 1796
    1⤵
      PID:3468
    • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
      C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
      1⤵
      • Executes dropped EXE
      PID:1852
    • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
      C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
      1⤵
      • Executes dropped EXE
      PID:5664

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yG173110.exe

      Filesize

      930KB

      MD5

      e8b6de3b9cf0c28a91c17349f9c48e70

      SHA1

      4cf1e3ed17f80722e1e2885be875f1518b8f61b9

      SHA256

      64f20078490cdca1c73c54fd48ba276b9b16fe330a6cc4d6e3d66e7a6154cf72

      SHA512

      4e238fa51a883f510c602c87a1f4d45fccf82b3e6f1bfaffddd7e917c5ba4c27442535e00900aa02a62a4e80304e8cd3accbe0cd30798cc58d36529fa6865f67

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\416743591.exe

      Filesize

      340KB

      MD5

      739ba832e497b28dd730924a35342c03

      SHA1

      3aa2e61636542a3a9cdfa9ae78eb784f19f8b060

      SHA256

      807fb676091772b646ff560815ad7803cb4ee0272d25cd2e30bf099108901e30

      SHA512

      44ec034957aec91da197096e469c9ff15033f5c24cefdc8eb6d7887745e552d06a6485370eec26913617e8b7649af6332e7d3da87864bc305c4023f018d69eb4

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oi789888.exe

      Filesize

      578KB

      MD5

      43e812362fa413bea1127ceec7e49e0b

      SHA1

      e4ea7b524c9a946e9efe4b808cb1e1ff2642e040

      SHA256

      099a12e20586d3c5f688caf603f89d04c237e2d12f597dc2a8fe47e0dde0b0d8

      SHA512

      cdcfe5aaad63cb831a7e87b381c66453641add96b075c207d592c6aa99609802652b1fac0aea12b5e7cfa9217051720b8581de4d4aa8aa75aa0c9b61a89c006b

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\350215682.exe

      Filesize

      204KB

      MD5

      1304f384653e08ae497008ff13498608

      SHA1

      d9a76ed63d74d4217c5027757cb9a7a0d0093080

      SHA256

      2a9dabab35fb09085750e1cc762e32b0fe4cbd7ed4276ef7e68ba159ae330eaa

      SHA512

      4138217fd538e827c89db5c0cd4ea21bd8c8d3a7196d2eabf10412caf7b929479e768747df5fd92fc022d758f1840474530ba82dcb7e8672cc6eb88caeaf38c1

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ZP080786.exe

      Filesize

      406KB

      MD5

      7f3b87cf63ac18030ae717ad16534952

      SHA1

      2520bb8123cb3347296f522589fe61723f35ed68

      SHA256

      30e4fa666ead10c0b32eb26260b521243f530e246dd09468af364f5344734cbe

      SHA512

      ded8c4d4c4eeea6e231443f35ef3ba07bab72bfac7b97c18a116498f5fe7eec26fd85ea24519dbc6cdc0b77c883d493119ec373f913a0148d0186d0d4db07d65

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\180239742.exe

      Filesize

      176KB

      MD5

      2b71f4b18ac8214a2bff547b6ce2f64f

      SHA1

      b8f2f25139a7b2e8d5e8fbc024eb5cac518bc6a5

      SHA256

      f7eedf3aec775a62c265d1652686b30a8a45a953523e2fb3cfc1fac3c6a66fbc

      SHA512

      33518eff768610bf54f9888d9d0d746b0c3500dc5f2b8fd5f1641d5a264f657a8311b40364f70932512581183b244fec3feb535e21c13e0ec8adec9994175177

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\277453554.exe

      Filesize

      258KB

      MD5

      f6fb0af2af5ad2cc4ec8b637654fd71a

      SHA1

      7320a01407a9e6b3a94e82987afc72e7434c3875

      SHA256

      ae5852f4afae3054c56caa0e0fa213746b3e38b7540d949533952c2e6b114347

      SHA512

      00e683b368b2d01099d72df62c345848633d0871291ca6b7880a381533ca3496b66c565676e3f65d4f39fb8412ae9ac173d35d06d16a9db9237eff83ffc4253b

    • memory/1796-92-0x0000000000400000-0x0000000002B9B000-memory.dmp

      Filesize

      39.6MB

    • memory/1796-94-0x0000000000400000-0x0000000002B9B000-memory.dmp

      Filesize

      39.6MB

    • memory/4424-114-0x0000000007180000-0x00000000071B5000-memory.dmp

      Filesize

      212KB

    • memory/4424-907-0x0000000009D10000-0x0000000009D22000-memory.dmp

      Filesize

      72KB

    • memory/4424-115-0x0000000007180000-0x00000000071B5000-memory.dmp

      Filesize

      212KB

    • memory/4424-117-0x0000000007180000-0x00000000071B5000-memory.dmp

      Filesize

      212KB

    • memory/4424-119-0x0000000007180000-0x00000000071B5000-memory.dmp

      Filesize

      212KB

    • memory/4424-113-0x0000000007180000-0x00000000071BA000-memory.dmp

      Filesize

      232KB

    • memory/4424-112-0x00000000070D0000-0x000000000710C000-memory.dmp

      Filesize

      240KB

    • memory/4424-906-0x000000000A290000-0x000000000A8A8000-memory.dmp

      Filesize

      6.1MB

    • memory/4424-908-0x0000000009D30000-0x0000000009E3A000-memory.dmp

      Filesize

      1.0MB

    • memory/4424-909-0x0000000009E50000-0x0000000009E8C000-memory.dmp

      Filesize

      240KB

    • memory/4424-910-0x0000000006BC0000-0x0000000006C0C000-memory.dmp

      Filesize

      304KB

    • memory/4560-56-0x00000000024C0000-0x00000000024D3000-memory.dmp

      Filesize

      76KB

    • memory/4560-31-0x00000000024C0000-0x00000000024D3000-memory.dmp

      Filesize

      76KB

    • memory/4560-34-0x00000000024C0000-0x00000000024D3000-memory.dmp

      Filesize

      76KB

    • memory/4560-36-0x00000000024C0000-0x00000000024D3000-memory.dmp

      Filesize

      76KB

    • memory/4560-38-0x00000000024C0000-0x00000000024D3000-memory.dmp

      Filesize

      76KB

    • memory/4560-40-0x00000000024C0000-0x00000000024D3000-memory.dmp

      Filesize

      76KB

    • memory/4560-42-0x00000000024C0000-0x00000000024D3000-memory.dmp

      Filesize

      76KB

    • memory/4560-44-0x00000000024C0000-0x00000000024D3000-memory.dmp

      Filesize

      76KB

    • memory/4560-46-0x00000000024C0000-0x00000000024D3000-memory.dmp

      Filesize

      76KB

    • memory/4560-48-0x00000000024C0000-0x00000000024D3000-memory.dmp

      Filesize

      76KB

    • memory/4560-50-0x00000000024C0000-0x00000000024D3000-memory.dmp

      Filesize

      76KB

    • memory/4560-52-0x00000000024C0000-0x00000000024D3000-memory.dmp

      Filesize

      76KB

    • memory/4560-54-0x00000000024C0000-0x00000000024D3000-memory.dmp

      Filesize

      76KB

    • memory/4560-58-0x00000000024C0000-0x00000000024D3000-memory.dmp

      Filesize

      76KB

    • memory/4560-32-0x00000000024C0000-0x00000000024D3000-memory.dmp

      Filesize

      76KB

    • memory/4560-30-0x00000000024C0000-0x00000000024D8000-memory.dmp

      Filesize

      96KB

    • memory/4560-29-0x0000000004A30000-0x0000000004FD4000-memory.dmp

      Filesize

      5.6MB

    • memory/4560-28-0x0000000002350000-0x000000000236A000-memory.dmp

      Filesize

      104KB