Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/11/2024, 00:12

General

  • Target

    b28751d101b544140a82b9014fc541d04f8c0114094984a2cb215b0b5b41ae24.exe

  • Size

    1.7MB

  • MD5

    ff5db38b1fce8092876bba8faf0b6bda

  • SHA1

    89a438bb1e17c5c3ebd42ab63a8961e2b5feba41

  • SHA256

    b28751d101b544140a82b9014fc541d04f8c0114094984a2cb215b0b5b41ae24

  • SHA512

    fe7e697cb0a4aaa026851182abb99c7109ac014799451020d3402459506e6fca6137bf23dc0107ea0b8baa4120cb76d392a57499cb82eb123e94c9a56c297e5f

  • SSDEEP

    49152:cZX3PYsnMOB2eeLdVfLbRK1BZJxYGXeEh:2X3PjMOB/eLvP01BZUGuEh

Malware Config

Extracted

Family

amadey

Version

3.80

Botnet

9c0adb

C2

http://193.3.19.154

Attributes
  • install_dir

    cb7ae701b3

  • install_file

    oneetx.exe

  • strings_key

    23b27c80db2465a8e1dc15491b69b82f

  • url_paths

    /store/games/index.php

rc4.plain

Extracted

Family

redline

Botnet

most

C2

185.161.248.73:4164

Attributes
  • auth_value

    7da4dfa153f2919e617aa016f7c36008

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b28751d101b544140a82b9014fc541d04f8c0114094984a2cb215b0b5b41ae24.exe
    "C:\Users\Admin\AppData\Local\Temp\b28751d101b544140a82b9014fc541d04f8c0114094984a2cb215b0b5b41ae24.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1856
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HW771906.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HW771906.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5016
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\lC823208.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\lC823208.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:656
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\tg872358.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\tg872358.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3044
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\wK064464.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\wK064464.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:5008
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a31335936.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a31335936.exe
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1172
              • C:\Windows\Temp\1.exe
                "C:\Windows\Temp\1.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Executes dropped EXE
                • Windows security modification
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:5936
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b69739594.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b69739594.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:2096
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2096 -s 1260
                7⤵
                • Program crash
                PID:2000
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c36806580.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c36806580.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:5816
            • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
              "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1664
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F
                7⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:3788
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3060
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:5172
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "oneetx.exe" /P "Admin:N"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:6108
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "oneetx.exe" /P "Admin:R" /E
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2836
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4740
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\cb7ae701b3" /P "Admin:N"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1888
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\cb7ae701b3" /P "Admin:R" /E
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:5344
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d87112398.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d87112398.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2728
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 1252
            5⤵
            • Program crash
            PID:2164
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f61394772.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f61394772.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2688
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2096 -ip 2096
    1⤵
      PID:2380
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2728 -ip 2728
      1⤵
        PID:5528
      • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        1⤵
        • Executes dropped EXE
        PID:3288
      • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        1⤵
        • Executes dropped EXE
        PID:5552

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HW771906.exe

        Filesize

        1.4MB

        MD5

        1c3a7205ec5112392bbd6e8e284e7540

        SHA1

        1c2e0d07790868b5b01f34ad3a6e020a0db10662

        SHA256

        a2de19f6c1e6ec6a5477287129ae3c98d0b68af3e9403260c05103e9f42af3b8

        SHA512

        24c6743a0ac3910f1bbc50b6556ea3b8824099c34904735f6da2374c71e6654d7978250f853fe99d6309875d89d2d874c1d63c0a33326be02af41b4bc8e6e79a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f61394772.exe

        Filesize

        169KB

        MD5

        5307d30294936c64f164830f3709ab53

        SHA1

        da103424866649c0df12818b26f903e575525cd6

        SHA256

        e3259f824e602d11d7fbe16c9a951f211e1b1e1cfe6e1d698f1db2dabe1e9d9b

        SHA512

        c6303abb7c4d7efe9b72381cf4ad72dced5f4f8e0783b9cf9660cf6fd88f5131fa89b515daa46147c40f488bca9f44a3609f950be09bcb7c53e3491168821c47

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\lC823208.exe

        Filesize

        1.3MB

        MD5

        561b59fac511fdae6b93c6889447d963

        SHA1

        3487ed6a0fbd0c18f1a4139be6aedd905ec61da9

        SHA256

        41d2eb1645e2208c7092e86f45e1ef252ce51065a2ea9bb9bc523fb00b0bcef5

        SHA512

        d8c2d035513b72d4192452560fca2e187271367ef8d29714f6fceda0886f1fdf6dd30f7d63b350c15420f0a7d2260e9b23630af0a35fdf424a534d6a85a2da0a

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d87112398.exe

        Filesize

        582KB

        MD5

        bacc32331052c03247e35064929c9a50

        SHA1

        e0a3b3703b90aff7d402a810f81cfcdb093d0e65

        SHA256

        e0afdba72f98dcbf2bf0845478b3c3696eb973c2bca5e3dd1375d2e063a76de8

        SHA512

        308832a1895a12a3b445840bbf73ec6fa851da191d41dc86e1e08a6d51c61ff4a12c2ea8584e4b67370ca3c1f94b40f8714f0a7feac16e1e1a50cf41637b12b7

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\tg872358.exe

        Filesize

        851KB

        MD5

        1616d9acdaa1e7bf5fc5438627ed2541

        SHA1

        fcee09a6892d23199d8d97c96a2299ac4df65a81

        SHA256

        73d5c8ba7fd65a50a2e12d59d2c748ac327ecfe7fd84a335e5687dcd7ab5b6e5

        SHA512

        47675667254da5307ba67c48883b479ff19c8c00cfd6902cb0cac73afbab2acfc5e6a517da017a57a1c51c1eca596cc7559e85b88cbaf5a91584ca1506feee00

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c36806580.exe

        Filesize

        205KB

        MD5

        f41f8a903732a02896031d5f7fbaebef

        SHA1

        5e7d3696c8816f2e17957bcecc18fa8d4bc8c7a5

        SHA256

        9cdb66fce95d7f985539a8650bdb9538a1f860e0ad2ace23615f3562cea1ad27

        SHA512

        61dce3d4d63cc546d95a6b74d21e08f89e9baabcc3a17bf28de4baf16ba9b5b3eab38a634f2c8557e3fa2961ee339419189b1f752c92537e328bed895578acae

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\wK064464.exe

        Filesize

        680KB

        MD5

        04ba3b49700176698c831d25681dfa5e

        SHA1

        0953fcf74b62d7a4f1f045d0d67016fe46294bad

        SHA256

        ea4563f08c883b8d644c17fe7749ace378ec216c935f58509e2eb2f5fe034a15

        SHA512

        ae77bb1471b1b5a60b23cc34fcd4b9f25b753fc7788d3831ba33e90cdb5c2e76f5c5ed96555185b2423db0c4a399afe4248fc7a4b3c5db34384d8cb24792eae7

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a31335936.exe

        Filesize

        302KB

        MD5

        8c3770cff3d317efb07b33c44547351f

        SHA1

        b828690afb8aa453e23014f7fc8a8f66e5ae3c70

        SHA256

        08fd27c248010f29c5c5fe7aaa1d3c984b7d76e8afacc7aa65eff5d3f733b24b

        SHA512

        8580540c0e32613493a087d088b5beb608490b9ef3072fceb0b37f0cd98d2917d896a7ce06ae08bfc3dcfce7cfb9c22201c24f59d7c608b2990bb924a4a32bce

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b69739594.exe

        Filesize

        522KB

        MD5

        b579550125fd16fe8c7a43e34ce3b6bf

        SHA1

        15e0bd0aaaaec76d5020a718dbe6b2a3fc024c85

        SHA256

        e3a00efb2b9c80bc8983e0e25a2c49406c4a72b3ecca7490f9d660a906c5ae19

        SHA512

        82549da5855146e2556b8caa140b47e6daf2f5241f63f00ad3ec05fa4722d1ac217a88589e0172aa648d32e3472d2a47ae26e64761fdc41673e088599859dfea

      • C:\Windows\Temp\1.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • memory/1172-59-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

        Filesize

        324KB

      • memory/1172-43-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

        Filesize

        324KB

      • memory/1172-95-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

        Filesize

        324KB

      • memory/1172-93-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

        Filesize

        324KB

      • memory/1172-91-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

        Filesize

        324KB

      • memory/1172-89-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

        Filesize

        324KB

      • memory/1172-85-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

        Filesize

        324KB

      • memory/1172-83-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

        Filesize

        324KB

      • memory/1172-81-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

        Filesize

        324KB

      • memory/1172-77-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

        Filesize

        324KB

      • memory/1172-75-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

        Filesize

        324KB

      • memory/1172-73-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

        Filesize

        324KB

      • memory/1172-71-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

        Filesize

        324KB

      • memory/1172-69-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

        Filesize

        324KB

      • memory/1172-67-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

        Filesize

        324KB

      • memory/1172-65-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

        Filesize

        324KB

      • memory/1172-63-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

        Filesize

        324KB

      • memory/1172-61-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

        Filesize

        324KB

      • memory/1172-99-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

        Filesize

        324KB

      • memory/1172-57-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

        Filesize

        324KB

      • memory/1172-55-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

        Filesize

        324KB

      • memory/1172-53-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

        Filesize

        324KB

      • memory/1172-51-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

        Filesize

        324KB

      • memory/1172-49-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

        Filesize

        324KB

      • memory/1172-47-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

        Filesize

        324KB

      • memory/1172-97-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

        Filesize

        324KB

      • memory/1172-41-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

        Filesize

        324KB

      • memory/1172-39-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

        Filesize

        324KB

      • memory/1172-80-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

        Filesize

        324KB

      • memory/1172-45-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

        Filesize

        324KB

      • memory/1172-38-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

        Filesize

        324KB

      • memory/1172-2166-0x00000000052F0000-0x00000000052FA000-memory.dmp

        Filesize

        40KB

      • memory/1172-101-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

        Filesize

        324KB

      • memory/1172-35-0x0000000002490000-0x00000000024E8000-memory.dmp

        Filesize

        352KB

      • memory/1172-87-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

        Filesize

        324KB

      • memory/1172-36-0x0000000004990000-0x0000000004F34000-memory.dmp

        Filesize

        5.6MB

      • memory/1172-37-0x0000000004FA0000-0x0000000004FF6000-memory.dmp

        Filesize

        344KB

      • memory/2096-4312-0x0000000005750000-0x00000000057E2000-memory.dmp

        Filesize

        584KB

      • memory/2688-6486-0x0000000000E30000-0x0000000000E60000-memory.dmp

        Filesize

        192KB

      • memory/2688-6487-0x0000000002FE0000-0x0000000002FE6000-memory.dmp

        Filesize

        24KB

      • memory/2688-6489-0x000000000B120000-0x000000000B738000-memory.dmp

        Filesize

        6.1MB

      • memory/2688-6490-0x000000000ACA0000-0x000000000ADAA000-memory.dmp

        Filesize

        1.0MB

      • memory/2688-6491-0x000000000ABD0000-0x000000000ABE2000-memory.dmp

        Filesize

        72KB

      • memory/2688-6492-0x000000000AC30000-0x000000000AC6C000-memory.dmp

        Filesize

        240KB

      • memory/2688-6493-0x0000000005120000-0x000000000516C000-memory.dmp

        Filesize

        304KB

      • memory/2728-4332-0x0000000002940000-0x00000000029A8000-memory.dmp

        Filesize

        416KB

      • memory/2728-4333-0x0000000005640000-0x00000000056A6000-memory.dmp

        Filesize

        408KB

      • memory/2728-6480-0x0000000005860000-0x0000000005892000-memory.dmp

        Filesize

        200KB

      • memory/5936-2179-0x0000000000140000-0x000000000014A000-memory.dmp

        Filesize

        40KB