Analysis

  • max time kernel
    144s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:42

General

  • Target

    f545f2999f4de710e84e4ef5c90b414cbe76350cfd720cce41a59d18381d9364.exe

  • Size

    1.7MB

  • MD5

    f9d26b12e8aa39f528e15104905df865

  • SHA1

    c66360a935cb771fe389df83b55728efc8ad204d

  • SHA256

    f545f2999f4de710e84e4ef5c90b414cbe76350cfd720cce41a59d18381d9364

  • SHA512

    5f8ba1a0b80757a8b517113d5b10304117bfef1074538f81d2c93af58137c8733c8744f4455e41bd5486de5721b8281974aab01bd93b2fade8b883aaf15ba873

  • SSDEEP

    24576:cyvyEk3IhKfk5GJe7K/MANG94tlHJeThq0yV0vIESSnIgc3SnF1P6RGNLUQ6sqwu:LvyEIpk1+NGGttJ70viSVPFp68NXl

Malware Config

Extracted

Family

amadey

Version

3.80

Botnet

9c0adb

C2

http://193.3.19.154

Attributes
  • install_dir

    cb7ae701b3

  • install_file

    oneetx.exe

  • strings_key

    23b27c80db2465a8e1dc15491b69b82f

  • url_paths

    /store/games/index.php

rc4.plain

Extracted

Family

redline

Botnet

most

C2

185.161.248.73:4164

Attributes
  • auth_value

    7da4dfa153f2919e617aa016f7c36008

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f545f2999f4de710e84e4ef5c90b414cbe76350cfd720cce41a59d18381d9364.exe
    "C:\Users\Admin\AppData\Local\Temp\f545f2999f4de710e84e4ef5c90b414cbe76350cfd720cce41a59d18381d9364.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uF226109.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uF226109.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4044
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Gj439156.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Gj439156.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1152
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ge832656.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ge832656.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4016
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mf643064.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mf643064.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3116
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a11852203.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a11852203.exe
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2808
              • C:\Windows\Temp\1.exe
                "C:\Windows\Temp\1.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Executes dropped EXE
                • Windows security modification
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2324
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b54037461.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b54037461.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:2020
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 1236
                7⤵
                • Program crash
                PID:1744
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c49359781.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c49359781.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4528
            • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
              "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:5144
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F
                7⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:6072
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4072
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3400
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "oneetx.exe" /P "Admin:N"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1772
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "oneetx.exe" /P "Admin:R" /E
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3732
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:5652
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\cb7ae701b3" /P "Admin:N"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:744
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\cb7ae701b3" /P "Admin:R" /E
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:5808
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d95864393.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d95864393.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:5484
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 5484 -s 1256
            5⤵
            • Program crash
            PID:4400
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f04750457.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f04750457.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3100
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2020 -ip 2020
    1⤵
      PID:1740
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 5484 -ip 5484
      1⤵
        PID:5108
      • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        1⤵
        • Executes dropped EXE
        PID:5596
      • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        1⤵
        • Executes dropped EXE
        PID:5680

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uF226109.exe

        Filesize

        1.4MB

        MD5

        c6a076c35ec0e70fcbadf2d976d5e8be

        SHA1

        a962a112038043a3248d913b431edbff5551ede9

        SHA256

        8c450fb97d1e0e3002da44f554b948416b6e1c960741f8b3f76adaeba9d986e8

        SHA512

        168a74cd3269320f4faf97d47235efcc6325c910787adb113ab12ca45e26b66a87c5ac3cdd145d6186c66ae5a5a72db02127586921eb8adf1fce1fd6c155ceb2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Gj439156.exe

        Filesize

        1.3MB

        MD5

        e96726aabed64df791a0df557f80c691

        SHA1

        bb2c65ef5a8b7f52dfdf93c0eb8598dce3c423ed

        SHA256

        5080a479edbae0122829de647ff6fb52d66803269a1b4d294ad8b45bab765879

        SHA512

        3b44db52c13573880bf801352561dcc8097ebd4bfa8e58ccb0513a753ed1e5349fb958e3b07514d212889e1e9f9ad317d5b1ba7326decb560950beb49d077454

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f04750457.exe

        Filesize

        169KB

        MD5

        087a5a1d2ed3affc7431ff1c12346ae3

        SHA1

        0c9bddf26577a99225c0aaf240418a2cebc11e38

        SHA256

        eeb794b65e671bfd5aabdf484dd31930a75cee5a49088a3832aa91eae019993b

        SHA512

        bd445e46a0b6da87a6ad28ee1f4cacb0776d3cdfb9c4a6299d2f564f0da1cf0cd725bfe7db0b10d9007443060e8c78b44e73a7f01b8aa58e979243e28f9cbf04

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ge832656.exe

        Filesize

        851KB

        MD5

        e637dcab132b1cdccd3cb5f3e3812b5e

        SHA1

        a13ba249ed0b32b6247ba76476ced01dc544302b

        SHA256

        d8376ad1f6da73dcce7a0e3b723da32f1d1faec020b78d606929a3204cd34799

        SHA512

        f8c801300ef137ba78e32902b7c03f50b9d4cc189d1fb27937a7ddc81b6b3f6b912eb615bc8e224becd10298806cc121eee51f02cf110ca2ab894289f92f7ba8

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d95864393.exe

        Filesize

        581KB

        MD5

        fdac6dfb819f92d19ecac80c3f518c22

        SHA1

        123d56972e946b4e18cf84c4198d7f56bc27a375

        SHA256

        21102b3fb0cee6dd7bb96510b7b71a1bea853bd35f63d235fe5ed068ef852dd2

        SHA512

        95eb4bde4d8ee484366e08b438dcc29ceca5b262eab7a4129721db7dc7e3e2f86b77136e3fc051cf9272fd55199a1b9d118db2659701f460f31c72a7385a3039

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c49359781.exe

        Filesize

        205KB

        MD5

        3fe8140a83bcf737290a7981606aca25

        SHA1

        f59fab550a88728919df51f380841f2dfa485005

        SHA256

        486dac1fe6e4586edd27190cb10cbff8618a2fad6e69bd4ef95c07ca709af47f

        SHA512

        28b9aa80a2f7d71adeb11d79e017a520ba46d380cd910436796bca08c61586286078201587bcd08eaf80bde0895e61f8a9736998e60747fdbcbee60ba094d2f5

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mf643064.exe

        Filesize

        680KB

        MD5

        3947fde34eacbd6201fdcf2afa9e4784

        SHA1

        ae6660320014edd69731fbd5316d1053ef401a95

        SHA256

        65734a6a16788c5a7d0065ab9b5c13200579ae3515afd9bee3d8a8d2a74aae95

        SHA512

        f28f376d9440d317c36fad302dcba81677c546326b54f255410382223000a1a2a8839770a6349c9291e75ac28b5f7b91f0a54be1b9f92a98b8b931f1426e9805

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a11852203.exe

        Filesize

        302KB

        MD5

        b52fb72197e164c17d02ed69dc3f38be

        SHA1

        1b1f8f3a2ad62b64bf92c4cbaa3075607b905fb5

        SHA256

        76bca177ce53e33fc02d4611d745b2d8f328fb43460877ef7107fbd3fb2ecbde

        SHA512

        33dcb12202dcf1912128afa4e8558ccddc854c04ce3cbee46414004feb666fee869eee4d0fe0c89e68c4fbc9cf560f92e000fe3a0a3219a3b9a3524bcc8b8e9e

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b54037461.exe

        Filesize

        522KB

        MD5

        8babbd8b07ac3df946255c29aa11927c

        SHA1

        4dbfc9a1a675be933e9e9d1e881e88e386737d4f

        SHA256

        668f7815f8ab032cba83b8332e1981602895381880f081beb314e7391d2944d2

        SHA512

        f682af4c6b22f48c7ef837e287e3604aef4729d242aaa60d1a5660e9f86d722d9dbcc1011b45b51d720e21b7cfbddfcbe073869cece8d89d9de2cc8f62a143a9

      • C:\Windows\Temp\1.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • memory/2020-4312-0x0000000005820000-0x00000000058B2000-memory.dmp

        Filesize

        584KB

      • memory/2324-2182-0x00000000006B0000-0x00000000006BA000-memory.dmp

        Filesize

        40KB

      • memory/2808-93-0x00000000049F0000-0x0000000004A41000-memory.dmp

        Filesize

        324KB

      • memory/2808-49-0x00000000049F0000-0x0000000004A41000-memory.dmp

        Filesize

        324KB

      • memory/2808-97-0x00000000049F0000-0x0000000004A41000-memory.dmp

        Filesize

        324KB

      • memory/2808-91-0x00000000049F0000-0x0000000004A41000-memory.dmp

        Filesize

        324KB

      • memory/2808-87-0x00000000049F0000-0x0000000004A41000-memory.dmp

        Filesize

        324KB

      • memory/2808-85-0x00000000049F0000-0x0000000004A41000-memory.dmp

        Filesize

        324KB

      • memory/2808-83-0x00000000049F0000-0x0000000004A41000-memory.dmp

        Filesize

        324KB

      • memory/2808-81-0x00000000049F0000-0x0000000004A41000-memory.dmp

        Filesize

        324KB

      • memory/2808-79-0x00000000049F0000-0x0000000004A41000-memory.dmp

        Filesize

        324KB

      • memory/2808-77-0x00000000049F0000-0x0000000004A41000-memory.dmp

        Filesize

        324KB

      • memory/2808-75-0x00000000049F0000-0x0000000004A41000-memory.dmp

        Filesize

        324KB

      • memory/2808-73-0x00000000049F0000-0x0000000004A41000-memory.dmp

        Filesize

        324KB

      • memory/2808-69-0x00000000049F0000-0x0000000004A41000-memory.dmp

        Filesize

        324KB

      • memory/2808-67-0x00000000049F0000-0x0000000004A41000-memory.dmp

        Filesize

        324KB

      • memory/2808-65-0x00000000049F0000-0x0000000004A41000-memory.dmp

        Filesize

        324KB

      • memory/2808-63-0x00000000049F0000-0x0000000004A41000-memory.dmp

        Filesize

        324KB

      • memory/2808-61-0x00000000049F0000-0x0000000004A41000-memory.dmp

        Filesize

        324KB

      • memory/2808-59-0x00000000049F0000-0x0000000004A41000-memory.dmp

        Filesize

        324KB

      • memory/2808-57-0x00000000049F0000-0x0000000004A41000-memory.dmp

        Filesize

        324KB

      • memory/2808-89-0x00000000049F0000-0x0000000004A41000-memory.dmp

        Filesize

        324KB

      • memory/2808-55-0x00000000049F0000-0x0000000004A41000-memory.dmp

        Filesize

        324KB

      • memory/2808-53-0x00000000049F0000-0x0000000004A41000-memory.dmp

        Filesize

        324KB

      • memory/2808-51-0x00000000049F0000-0x0000000004A41000-memory.dmp

        Filesize

        324KB

      • memory/2808-95-0x00000000049F0000-0x0000000004A41000-memory.dmp

        Filesize

        324KB

      • memory/2808-45-0x00000000049F0000-0x0000000004A41000-memory.dmp

        Filesize

        324KB

      • memory/2808-43-0x00000000049F0000-0x0000000004A41000-memory.dmp

        Filesize

        324KB

      • memory/2808-41-0x00000000049F0000-0x0000000004A41000-memory.dmp

        Filesize

        324KB

      • memory/2808-39-0x00000000049F0000-0x0000000004A41000-memory.dmp

        Filesize

        324KB

      • memory/2808-38-0x00000000049F0000-0x0000000004A41000-memory.dmp

        Filesize

        324KB

      • memory/2808-2166-0x0000000004AC0000-0x0000000004ACA000-memory.dmp

        Filesize

        40KB

      • memory/2808-99-0x00000000049F0000-0x0000000004A41000-memory.dmp

        Filesize

        324KB

      • memory/2808-101-0x00000000049F0000-0x0000000004A41000-memory.dmp

        Filesize

        324KB

      • memory/2808-71-0x00000000049F0000-0x0000000004A41000-memory.dmp

        Filesize

        324KB

      • memory/2808-47-0x00000000049F0000-0x0000000004A41000-memory.dmp

        Filesize

        324KB

      • memory/2808-37-0x00000000049F0000-0x0000000004A46000-memory.dmp

        Filesize

        344KB

      • memory/2808-36-0x0000000004B00000-0x00000000050A4000-memory.dmp

        Filesize

        5.6MB

      • memory/2808-35-0x0000000004950000-0x00000000049A8000-memory.dmp

        Filesize

        352KB

      • memory/3100-6486-0x0000000000AD0000-0x0000000000B00000-memory.dmp

        Filesize

        192KB

      • memory/3100-6487-0x0000000002AF0000-0x0000000002AF6000-memory.dmp

        Filesize

        24KB

      • memory/3100-6488-0x0000000005BA0000-0x00000000061B8000-memory.dmp

        Filesize

        6.1MB

      • memory/3100-6489-0x0000000005690000-0x000000000579A000-memory.dmp

        Filesize

        1.0MB

      • memory/3100-6490-0x00000000055A0000-0x00000000055B2000-memory.dmp

        Filesize

        72KB

      • memory/3100-6491-0x0000000005600000-0x000000000563C000-memory.dmp

        Filesize

        240KB

      • memory/3100-6492-0x0000000005640000-0x000000000568C000-memory.dmp

        Filesize

        304KB

      • memory/5484-4333-0x0000000005570000-0x00000000055D6000-memory.dmp

        Filesize

        408KB

      • memory/5484-6480-0x0000000005760000-0x0000000005792000-memory.dmp

        Filesize

        200KB

      • memory/5484-4332-0x00000000027E0000-0x0000000002848000-memory.dmp

        Filesize

        416KB