Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/11/2024, 23:33

General

  • Target

    6c02a205efc9eaafa411ae96a2e44b04ec3752f8b976e6dfad48b06193106992.exe

  • Size

    1.4MB

  • MD5

    2b393e5518c1428ca6c96a2e4976bc22

  • SHA1

    8eecc12b52477f4705e484527f845c5fad7470a5

  • SHA256

    6c02a205efc9eaafa411ae96a2e44b04ec3752f8b976e6dfad48b06193106992

  • SHA512

    b021c23d44f3ae9ca1621cb44c5d54521788da9761675d07ac0b632d3a8660884c57b31f080a1f4d652d9ec625ab5632c67968804f8ebb4455dbcdf59b18913a

  • SSDEEP

    24576:4yOIus+IlqAHHI0L5WdQuptMlPI5bPNMP/RfXL7KaowlqF7XN6N:/FJ5HoWCQct0ajNGpbuaopXN6

Malware Config

Extracted

Family

amadey

Version

3.80

Botnet

9c0adb

C2

http://193.3.19.154

Attributes
  • install_dir

    cb7ae701b3

  • install_file

    oneetx.exe

  • strings_key

    23b27c80db2465a8e1dc15491b69b82f

  • url_paths

    /store/games/index.php

rc4.plain

Extracted

Family

redline

Botnet

most

C2

185.161.248.73:4164

Attributes
  • auth_value

    7da4dfa153f2919e617aa016f7c36008

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c02a205efc9eaafa411ae96a2e44b04ec3752f8b976e6dfad48b06193106992.exe
    "C:\Users\Admin\AppData\Local\Temp\6c02a205efc9eaafa411ae96a2e44b04ec3752f8b976e6dfad48b06193106992.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4880
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vJ632133.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vJ632133.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4000
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Yb421872.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Yb421872.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3596
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\XS804546.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\XS804546.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4044
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a20699933.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a20699933.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2792
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:5424
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b65788966.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b65788966.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:5356
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 5356 -s 1256
              6⤵
              • Program crash
              PID:5488
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c80057987.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c80057987.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3948
          • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:6116
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F
              6⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:5792
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:5732
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:6228
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:N"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:6236
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                7⤵
                • System Location Discovery: System Language Discovery
                PID:6276
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:6324
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "..\cb7ae701b3" /P "Admin:N"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:6332
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "..\cb7ae701b3" /P "Admin:R" /E
                7⤵
                • System Location Discovery: System Language Discovery
                PID:6364
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d26390424.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d26390424.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2272
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 1252
          4⤵
          • Program crash
          PID:4220
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f26960612.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f26960612.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:6556
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5356 -ip 5356
    1⤵
      PID:2976
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2272 -ip 2272
      1⤵
        PID:7156
      • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        1⤵
        • Executes dropped EXE
        PID:6980
      • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        1⤵
        • Executes dropped EXE
        PID:5520

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f26960612.exe

        Filesize

        168KB

        MD5

        5789b09b352a27b69903443ae7944b57

        SHA1

        1962c46c9e80dd486dca2af69d4757b519057a2f

        SHA256

        e43e5fa3cc6605176476fd6bd2c39d61c62ce35a3b522b3b9c6e59e858747ef2

        SHA512

        f82ea39d40d7076dabbb35d2bdc7bb289e69de9556e113185dbdffea9dfba39e53688b06b66cd3a18af5e7571f3a088eab71108e1f673dc635d058b71e705451

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vJ632133.exe

        Filesize

        1.3MB

        MD5

        f17aada161586db195cdd9d676b9555c

        SHA1

        322880dd7b0112891314244e80b289f5f9199e80

        SHA256

        84fd1be4ccc14cb51fe5b3a9c6128f73a5c7b29284d03781d6a0c8a51ee69dc3

        SHA512

        ea27c2f9369b62032fa079fcd8dd46c498e74aa7a541478e966545cee96298fa5cc9615d375542431077692e381ee859a41fb910a746185b0adfab99f3642460

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Yb421872.exe

        Filesize

        851KB

        MD5

        6ea1191f35e49a6ec13956a2d41642fc

        SHA1

        5180140f3a293d6a66f4025eef7f8a610e2b6a78

        SHA256

        55d3b1308bb4d23ccfbd6102daffb44e21692d74795e320b836115e1be694b12

        SHA512

        462f9ebab7c739970a411927fe90c803c2541df9f3a7b51fcdf1918640a2510d9bec0ccfa7c86d5f5291caf5168182867ee780d38cb9d3623a434ac891b28efb

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d26390424.exe

        Filesize

        581KB

        MD5

        d916487e0714a9a52083d3d01a3af58e

        SHA1

        b6141e2efda8c3d6b9ee2db2e8eff784dbe68cb3

        SHA256

        b214c88d61db75f4df48c52641bb1ea3fdd13a024c6ca0b613d7cc1bcd7d59b0

        SHA512

        e4429164fd2f4db3b814bf651478c37c74cdf266154831184b15d901c1ec9840d493ae43c271e4078ce4a452cdeb85df605f679e5300cf237ce6cae908e3c5cd

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\XS804546.exe

        Filesize

        680KB

        MD5

        80712312f9bbee14aac75a02d552ab5a

        SHA1

        6282b838957360f58debd1aa27d9a84e726d582c

        SHA256

        06c5c55ed0b54574ca377453424eb6c438bc38d703598fbef85c57774b8d020f

        SHA512

        b22bd9487ae0b24455b8f3e3a0cad06f5f83313b70fbc79f4b97c902db6b850598ea920abdb1a4902b6a1d578ead1ea6be4560fcaf8b8635634c5a3e50b9d8ee

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c80057987.exe

        Filesize

        205KB

        MD5

        6f0828f5214cef73bb1a20e744d3002c

        SHA1

        214f695a4d9b6788b9e05b606e138c850adf0994

        SHA256

        79b3f07a56782542602e4c30a68e97b34e7b509175bf4766007c707f2321417f

        SHA512

        f780e611aa93f886b9656c9c5327df3742e0be7ead23445de9bf630f1b7ab417787470986340a176653654d85a6de4ab870b3eebcb41ec6d928669e8d09fc34e

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a20699933.exe

        Filesize

        301KB

        MD5

        2b26f951cd68936be1b6cc9982443ab5

        SHA1

        8ccb96a160b229cee2b402ede68aaaa010373f9e

        SHA256

        f9cbb9fc0d462a4f54dde0ddd3ccab79cae67a1a6c0d787f4f6f7e4428fe3e4d

        SHA512

        beeebcf33f3c1860f0a56cade462ffbd032d02fef107196b1a0f18ab9448d08450404d0b285fcf83bedfe5e6f48d11bd62cdbef1bd2df1bb5374f91102186507

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b65788966.exe

        Filesize

        522KB

        MD5

        fde734ee2f0462ebafcaafae3149fbd9

        SHA1

        ee90e50180014e963c38366fb576c7a4dc5a4cc8

        SHA256

        944d01ab42059b0c12615b9cbcbc7b07c1667b0f08b40bb525efa0ba03184b62

        SHA512

        554794f70df11e8660ca2eb97c99925da0496ce791de009a5dbf4a828e677c3af6d1015c4e2723b70a48b39f5c65be6fd1dacdc0b5ecb1c61d709fba22940ff9

      • C:\Windows\Temp\1.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • memory/2272-6473-0x0000000005760000-0x0000000005792000-memory.dmp

        Filesize

        200KB

      • memory/2272-4326-0x0000000005550000-0x00000000055B6000-memory.dmp

        Filesize

        408KB

      • memory/2272-4325-0x00000000026A0000-0x0000000002708000-memory.dmp

        Filesize

        416KB

      • memory/2792-86-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/2792-38-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/2792-92-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/2792-82-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/2792-80-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/2792-78-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/2792-76-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/2792-72-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/2792-70-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/2792-68-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/2792-66-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/2792-64-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/2792-60-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/2792-58-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/2792-56-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/2792-54-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/2792-52-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/2792-50-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/2792-48-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/2792-46-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/2792-44-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/2792-42-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/2792-40-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/2792-88-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/2792-36-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/2792-34-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/2792-32-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/2792-31-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/2792-2159-0x0000000005430000-0x000000000543A000-memory.dmp

        Filesize

        40KB

      • memory/2792-94-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/2792-28-0x00000000025C0000-0x0000000002618000-memory.dmp

        Filesize

        352KB

      • memory/2792-62-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/2792-29-0x0000000004C60000-0x0000000005204000-memory.dmp

        Filesize

        5.6MB

      • memory/2792-74-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/2792-84-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/2792-90-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/2792-30-0x0000000004B20000-0x0000000004B76000-memory.dmp

        Filesize

        344KB

      • memory/5356-4305-0x0000000005820000-0x00000000058B2000-memory.dmp

        Filesize

        584KB

      • memory/5424-2174-0x0000000000390000-0x000000000039A000-memory.dmp

        Filesize

        40KB

      • memory/6556-6479-0x00000000001D0000-0x0000000000200000-memory.dmp

        Filesize

        192KB

      • memory/6556-6480-0x00000000049F0000-0x00000000049F6000-memory.dmp

        Filesize

        24KB

      • memory/6556-6481-0x000000000A590000-0x000000000ABA8000-memory.dmp

        Filesize

        6.1MB

      • memory/6556-6482-0x000000000A080000-0x000000000A18A000-memory.dmp

        Filesize

        1.0MB

      • memory/6556-6483-0x0000000009F70000-0x0000000009F82000-memory.dmp

        Filesize

        72KB

      • memory/6556-6484-0x0000000009FD0000-0x000000000A00C000-memory.dmp

        Filesize

        240KB

      • memory/6556-6485-0x00000000044F0000-0x000000000453C000-memory.dmp

        Filesize

        304KB