Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 01:26

General

  • Target

    08c9a5fe2b7d3025ea74327eff0c94597d3ddbeef5a4de2137ee704fd39c1447.exe

  • Size

    1.5MB

  • MD5

    e80f0ee6540834baa616f6c8045514bf

  • SHA1

    d60e3918f8f35f28d4a47f1c0309ca6aab718bae

  • SHA256

    08c9a5fe2b7d3025ea74327eff0c94597d3ddbeef5a4de2137ee704fd39c1447

  • SHA512

    044b8897975738cce2d88f621276362a30ef9b00559850bb6499c80b4d387511857447454bfab04942a8ed722fc9975563dfcb1e5bb4b7c25ff918ba297460fd

  • SSDEEP

    24576:tySV/SIcaQf6NgXpt+OCt9okogOFOFwj5RGr3EtupQ117bQX2IgP:IOSIcDkg5tFCboko1OFwj5RwUIQ1tmrg

Malware Config

Extracted

Family

amadey

Version

3.80

Botnet

9c0adb

C2

http://193.3.19.154

Attributes
  • install_dir

    cb7ae701b3

  • install_file

    oneetx.exe

  • strings_key

    23b27c80db2465a8e1dc15491b69b82f

  • url_paths

    /store/games/index.php

rc4.plain

Extracted

Family

redline

Botnet

most

C2

185.161.248.73:4164

Attributes
  • auth_value

    7da4dfa153f2919e617aa016f7c36008

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\08c9a5fe2b7d3025ea74327eff0c94597d3ddbeef5a4de2137ee704fd39c1447.exe
    "C:\Users\Admin\AppData\Local\Temp\08c9a5fe2b7d3025ea74327eff0c94597d3ddbeef5a4de2137ee704fd39c1447.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3224
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xw539482.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xw539482.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2392
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qA701015.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qA701015.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3676
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dh290758.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dh290758.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2316
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\142276686.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\142276686.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1128
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2360
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\294167439.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\294167439.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:3176
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 1196
              6⤵
              • Program crash
              PID:2444
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\307076930.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\307076930.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:5892
          • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3036
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F
              6⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:4396
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:5252
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:212
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:N"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:5984
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                7⤵
                • System Location Discovery: System Language Discovery
                PID:3916
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4716
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "..\cb7ae701b3" /P "Admin:N"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4168
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "..\cb7ae701b3" /P "Admin:R" /E
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4588
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\484117765.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\484117765.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:5748
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5748 -s 1252
          4⤵
          • Program crash
          PID:5744
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\592295201.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\592295201.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:6156
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3176 -ip 3176
    1⤵
      PID:3760
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 5748 -ip 5748
      1⤵
        PID:5668
      • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        1⤵
        • Executes dropped EXE
        PID:5848
      • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        1⤵
        • Executes dropped EXE
        PID:5556

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\592295201.exe

        Filesize

        168KB

        MD5

        23bf8277fe81d432902a96d16906735b

        SHA1

        998bd641c8084bf425b2185419f3d91f4cf0dec4

        SHA256

        743b918aa649e9dfb54739b2ac00523fa048d1495dcf1ed3baf6afe5b10b106b

        SHA512

        cd0db15dd275d05d7156842ee3033fdd834c623a321ee476e53dfc400f6bf9f1a3df06e4e815071da554ba2e2b075bfc16ba2087ff92e84a29b55f501e3aadf2

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xw539482.exe

        Filesize

        1.3MB

        MD5

        c83fec3b94a7588f9c3f50733518d541

        SHA1

        fcc1d6386276d5953ebedf70363179296889722c

        SHA256

        4b531e421b59a17aef1d96976932ba545aeb3803e2842c0b81e48d83753a768b

        SHA512

        89e163a17c2a49e2d9a92cdeda8100c5c5b114353678a90e99f00184a288845b3aed27254ada1547777719b53468ef5de708c4ef3fe79d52f25fef6a2f279529

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\484117765.exe

        Filesize

        538KB

        MD5

        dd144e66b77e6dcb8068831d60a0586c

        SHA1

        0428614a710d8ba84d9bc2b69cb0f86e9b48b08b

        SHA256

        8d74c6fb7f196f79940e0785521ee3559e1e760562b53524067fd2f05a116141

        SHA512

        491ca8a830280604378968fca2d5a7b27672e2068576d788f43c5e997f0b514b50fd0e47094fee342d9655284ad5aba263e60a88201b4c9d2bc68e1fb35841f5

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qA701015.exe

        Filesize

        871KB

        MD5

        79b059e5cb5c2f3d5225ef712e7aa217

        SHA1

        0bb6fb8f68b7edd430cb58a5cab3fc77a169212b

        SHA256

        105c64e6b57dccf191e5ac183612eb87d15ce6fe9e99ed820a151b0cd5f43b65

        SHA512

        98896e778d2fa68d64052b0ae6a55e26290f7853836d3a08b3a92d13d72cba092b3e5272d0d3c008b04da9c1180915b93958728edf6142e6d3d004f76dae01ee

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\307076930.exe

        Filesize

        204KB

        MD5

        ee76e9ff9ca4abca60ca99c12e9204a6

        SHA1

        b9b8bb5214346e794a83a41febd9ed045b5ff3a9

        SHA256

        c30821d5d795bfd61000cbcd1cb06befc6e878bbb871a83c1770dd8dc1b57923

        SHA512

        c66779245da3352211ebebc3d8a0a28cb7226930e17e0d85cd5e6abee520f06ebc68d910dadf8f0017800aead9b49759bc6e1d5f5b1d2d9193fdad3ed5fe651f

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dh290758.exe

        Filesize

        699KB

        MD5

        d1cdb4dd9f7a84f04dd05a98cbb7d976

        SHA1

        fad64ccbefdc266c24049acf74e90c155e799141

        SHA256

        a8a0875aa349b258a25765488242eaefa3606b21b5f2ee105f1882445fe6bdf4

        SHA512

        1cdbaf4e6306081a9b3c1ba0c0c6df58477ca69353b3844cd6c2bf8c6fd0976bbcd682603bff0f46415db22a9270c5bbeebd773a85e4b5572e2d1ed23417ad14

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\142276686.exe

        Filesize

        300KB

        MD5

        095466b4dae4ff453770c4b83c9fd43b

        SHA1

        83a51dea4967b92acf54a40a0699fc4232f94344

        SHA256

        d5b4aa3362bbf76d750c41f39ee6018796de6d08f5f94533270c2a0f83ced565

        SHA512

        837d6a7146cc9d91864971959d023facdf7290cc30efd8c0f8559a689665dc55c4d9add05c98cc9e769343f7280cb86ffe23a1925348b736f0ad79bdfe64d130

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\294167439.exe

        Filesize

        478KB

        MD5

        773d65a3c81b54221fe4ea62a370cdc0

        SHA1

        234017c2582d0df0e1f2f36f17c016fa17934f51

        SHA256

        d312e0e56a123e4f74b6c06612102f23856c4485fb32596639404d561c72e31c

        SHA512

        992357e84534a490f5704b5deb0180604af91dbf90473d0125deb1f85c58c71ecb9c3679ec76c50859768ffe01faa14dd8a24713f8f337530d772e084bdbf01c

      • C:\Windows\Temp\1.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • memory/1128-80-0x00000000049E0000-0x0000000004A31000-memory.dmp

        Filesize

        324KB

      • memory/1128-36-0x00000000049E0000-0x0000000004A31000-memory.dmp

        Filesize

        324KB

      • memory/1128-88-0x00000000049E0000-0x0000000004A31000-memory.dmp

        Filesize

        324KB

      • memory/1128-86-0x00000000049E0000-0x0000000004A31000-memory.dmp

        Filesize

        324KB

      • memory/1128-84-0x00000000049E0000-0x0000000004A31000-memory.dmp

        Filesize

        324KB

      • memory/1128-94-0x00000000049E0000-0x0000000004A31000-memory.dmp

        Filesize

        324KB

      • memory/1128-78-0x00000000049E0000-0x0000000004A31000-memory.dmp

        Filesize

        324KB

      • memory/1128-76-0x00000000049E0000-0x0000000004A31000-memory.dmp

        Filesize

        324KB

      • memory/1128-74-0x00000000049E0000-0x0000000004A31000-memory.dmp

        Filesize

        324KB

      • memory/1128-72-0x00000000049E0000-0x0000000004A31000-memory.dmp

        Filesize

        324KB

      • memory/1128-70-0x00000000049E0000-0x0000000004A31000-memory.dmp

        Filesize

        324KB

      • memory/1128-68-0x00000000049E0000-0x0000000004A31000-memory.dmp

        Filesize

        324KB

      • memory/1128-66-0x00000000049E0000-0x0000000004A31000-memory.dmp

        Filesize

        324KB

      • memory/1128-64-0x00000000049E0000-0x0000000004A31000-memory.dmp

        Filesize

        324KB

      • memory/1128-62-0x00000000049E0000-0x0000000004A31000-memory.dmp

        Filesize

        324KB

      • memory/1128-58-0x00000000049E0000-0x0000000004A31000-memory.dmp

        Filesize

        324KB

      • memory/1128-56-0x00000000049E0000-0x0000000004A31000-memory.dmp

        Filesize

        324KB

      • memory/1128-54-0x00000000049E0000-0x0000000004A31000-memory.dmp

        Filesize

        324KB

      • memory/1128-52-0x00000000049E0000-0x0000000004A31000-memory.dmp

        Filesize

        324KB

      • memory/1128-50-0x00000000049E0000-0x0000000004A31000-memory.dmp

        Filesize

        324KB

      • memory/1128-48-0x00000000049E0000-0x0000000004A31000-memory.dmp

        Filesize

        324KB

      • memory/1128-46-0x00000000049E0000-0x0000000004A31000-memory.dmp

        Filesize

        324KB

      • memory/1128-44-0x00000000049E0000-0x0000000004A31000-memory.dmp

        Filesize

        324KB

      • memory/1128-42-0x00000000049E0000-0x0000000004A31000-memory.dmp

        Filesize

        324KB

      • memory/1128-40-0x00000000049E0000-0x0000000004A31000-memory.dmp

        Filesize

        324KB

      • memory/1128-92-0x00000000049E0000-0x0000000004A31000-memory.dmp

        Filesize

        324KB

      • memory/1128-34-0x00000000049E0000-0x0000000004A31000-memory.dmp

        Filesize

        324KB

      • memory/1128-60-0x00000000049E0000-0x0000000004A31000-memory.dmp

        Filesize

        324KB

      • memory/1128-38-0x00000000049E0000-0x0000000004A31000-memory.dmp

        Filesize

        324KB

      • memory/1128-32-0x00000000049E0000-0x0000000004A31000-memory.dmp

        Filesize

        324KB

      • memory/1128-31-0x00000000049E0000-0x0000000004A31000-memory.dmp

        Filesize

        324KB

      • memory/1128-2159-0x00000000052F0000-0x00000000052FA000-memory.dmp

        Filesize

        40KB

      • memory/1128-90-0x00000000049E0000-0x0000000004A31000-memory.dmp

        Filesize

        324KB

      • memory/1128-82-0x00000000049E0000-0x0000000004A31000-memory.dmp

        Filesize

        324KB

      • memory/1128-28-0x00000000048E0000-0x0000000004938000-memory.dmp

        Filesize

        352KB

      • memory/1128-29-0x0000000004A60000-0x0000000005004000-memory.dmp

        Filesize

        5.6MB

      • memory/1128-30-0x00000000049E0000-0x0000000004A36000-memory.dmp

        Filesize

        344KB

      • memory/2360-2174-0x0000000000270000-0x000000000027A000-memory.dmp

        Filesize

        40KB

      • memory/3176-4305-0x0000000005890000-0x0000000005922000-memory.dmp

        Filesize

        584KB

      • memory/5748-4325-0x00000000028B0000-0x0000000002918000-memory.dmp

        Filesize

        416KB

      • memory/5748-4326-0x0000000005620000-0x0000000005686000-memory.dmp

        Filesize

        408KB

      • memory/5748-6473-0x0000000002990000-0x00000000029C2000-memory.dmp

        Filesize

        200KB

      • memory/6156-6479-0x0000000000C20000-0x0000000000C50000-memory.dmp

        Filesize

        192KB

      • memory/6156-6480-0x0000000002D10000-0x0000000002D16000-memory.dmp

        Filesize

        24KB

      • memory/6156-6481-0x0000000005B90000-0x00000000061A8000-memory.dmp

        Filesize

        6.1MB

      • memory/6156-6483-0x00000000055A0000-0x00000000055B2000-memory.dmp

        Filesize

        72KB

      • memory/6156-6482-0x0000000005680000-0x000000000578A000-memory.dmp

        Filesize

        1.0MB

      • memory/6156-6485-0x0000000005600000-0x000000000563C000-memory.dmp

        Filesize

        240KB

      • memory/6156-6486-0x0000000005790000-0x00000000057DC000-memory.dmp

        Filesize

        304KB