Analysis

  • max time kernel
    147s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:43

General

  • Target

    d084cb77412687c2928b5e238d349f1fc4823cabe769c5fbbac7fb44c7780e53.exe

  • Size

    1.1MB

  • MD5

    20adca7b56f8c64bce0c5fd2129b094b

  • SHA1

    2b49318734d332741844b574bf9874c698a5e434

  • SHA256

    d084cb77412687c2928b5e238d349f1fc4823cabe769c5fbbac7fb44c7780e53

  • SHA512

    ea4a123e1c0f5d58d5c75eb6bbe9c183f7b25f6bc817202b07982051afcca66738d9e1c2260eb47542b1f174a768140093680c4a4872e311af3bdf8aedbc5018

  • SSDEEP

    24576:YyEhegQc/YdfIK9kPRnDUuo9KSSJSSnu2+NNDe4gy:fcegQc/YOK9kPB+SJSpRTi4

Malware Config

Extracted

Family

amadey

Version

3.80

Botnet

9c0adb

C2

http://193.3.19.154

Attributes
  • install_dir

    cb7ae701b3

  • install_file

    oneetx.exe

  • strings_key

    23b27c80db2465a8e1dc15491b69b82f

  • url_paths

    /store/games/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 6 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d084cb77412687c2928b5e238d349f1fc4823cabe769c5fbbac7fb44c7780e53.exe
    "C:\Users\Admin\AppData\Local\Temp\d084cb77412687c2928b5e238d349f1fc4823cabe769c5fbbac7fb44c7780e53.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4168
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\GN857650.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\GN857650.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pw359453.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pw359453.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2504
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hk703046.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hk703046.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:5016
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\179773419.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\179773419.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3912
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\214665566.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\214665566.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3372
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3372 -s 1084
              6⤵
              • Program crash
              PID:4816
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\355748146.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\355748146.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2360
          • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4876
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F
              6⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:3432
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:952
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4412
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:N"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:1028
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                7⤵
                • System Location Discovery: System Language Discovery
                PID:2608
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:736
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "..\cb7ae701b3" /P "Admin:N"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:2968
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "..\cb7ae701b3" /P "Admin:R" /E
                7⤵
                • System Location Discovery: System Language Discovery
                PID:3404
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\484283488.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\484283488.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2756
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\484283488.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\484283488.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:4352
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\592152992.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\592152992.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4864
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3372 -ip 3372
    1⤵
      PID:4912
    • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
      C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
      1⤵
      • Executes dropped EXE
      PID:1760
    • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
      C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
      1⤵
      • Executes dropped EXE
      PID:2212
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe start wuauserv
      1⤵
      • Launches sc.exe
      PID:2928

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\592152992.exe

      Filesize

      136KB

      MD5

      100a9d616da8dbb82fd696af48f1891e

      SHA1

      ca5011879625e02ef42b732232885c736d30fbd0

      SHA256

      307c15e07a61de6f9d9c4cbf949504460d8f1725e812c97ca2aa8656180bd18e

      SHA512

      0f8f3271c8a466502da57f6f2e126f96e3cca594334242f700d900dafad856120206353e77896e49b3f12a50193e4e4b78c6a8ba7529cb4dfea18e97909a70c5

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\GN857650.exe

      Filesize

      940KB

      MD5

      81871e9a2d33cc6431e45b7119d34814

      SHA1

      6e754a027f199f6779af743633194731cd3d1dea

      SHA256

      0bffa29b0724975889b54adc774b5f1b38e366cf9ac9c425bc2e8b9a04d9a3c2

      SHA512

      0d3ebf7fde700fe3f7d8295da81fe17ac1ba004b3ad06b1f74a3edf363bdc4a88b9257515fa12c5f8c940071d99c929b4589908986114c5b2918a6f4efb532e7

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\484283488.exe

      Filesize

      342KB

      MD5

      1051d4c804878c7a64088e8e41a69bac

      SHA1

      3cd5b353046b1580a608209aacd0b08107f3bb7d

      SHA256

      c4d641f66fbabbb5facd863a7832170ee7f49025be6b8a34f04e6368907e0fd5

      SHA512

      9d069fe8348db7298d8d6742bc22c25514b2a6e40d7e4b742c686cb671e11ca6e69d80afc664d9ff337499b7a287a4c6481f502867ecc37f22eb213cb0957190

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pw359453.exe

      Filesize

      585KB

      MD5

      71f38abfad3d7f0d7b34078031cd2adc

      SHA1

      013de74965bf1e7320b1cf62a7595b1c25fda5e0

      SHA256

      2f40e6de630e11f1dd296de90904cdbd561fc6c9eb576967d6697f095fd3d39c

      SHA512

      df32b65383e13a34377cefbc2db33424409c4729d214ccc854b16a243682860c8eb296426912c940380555b52dd90f8e323fab20da36a0f9ab5a157674f00b02

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\355748146.exe

      Filesize

      204KB

      MD5

      1304f384653e08ae497008ff13498608

      SHA1

      d9a76ed63d74d4217c5027757cb9a7a0d0093080

      SHA256

      2a9dabab35fb09085750e1cc762e32b0fe4cbd7ed4276ef7e68ba159ae330eaa

      SHA512

      4138217fd538e827c89db5c0cd4ea21bd8c8d3a7196d2eabf10412caf7b929479e768747df5fd92fc022d758f1840474530ba82dcb7e8672cc6eb88caeaf38c1

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hk703046.exe

      Filesize

      414KB

      MD5

      cb97828135b7d9bd7c0d4fe15da4d776

      SHA1

      837d40e8d281312968708bdd07fd960c9c24856b

      SHA256

      1d089167eca5114808880180d43084c0cd7cf3000e6b57a027a5aebc72b0f269

      SHA512

      99fe738be737515d2afc6182ab3fcad1ebed55211576be49d1b8e72abb9b7b909a4f324d73d9ac0646efd561e58616168a2ea3a31b489335423723f789f7a7b5

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\179773419.exe

      Filesize

      175KB

      MD5

      3d10b67208452d7a91d7bd7066067676

      SHA1

      e6c3ab7b6da65c8cc7dd95351f118caf3a50248d

      SHA256

      5c8ae96739bd9454a59e92b5eb6965647030e87453f7c417dbd7d53ebd837302

      SHA512

      b86d5ff4f55c90922a890401ae4301da7e71eb5e546a82536073cc58780ce55585214cff39ec9b52f70704580ad36c1fa95ebee1515dd2e7ea313cb670f2b4df

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\214665566.exe

      Filesize

      259KB

      MD5

      bd7ea62f3ae49bc90d7df013e415fe69

      SHA1

      4b15f8369a4b08727109288a3ffe0c6a7d81c7fd

      SHA256

      f6fbb776dbc3b88170edc9ba8aeb6ca9f43dabc0f78d5a7ee895c813a5c5afd6

      SHA512

      ef1f6f708a17fa4bebadfb3adad858302bf90999a85f7172ce475f3185c7e57a3d71f25ac218c38ec004ab7f6c00a617b837d27de81dfc7d667a20e9df216767

    • memory/3372-93-0x0000000000400000-0x0000000000455000-memory.dmp

      Filesize

      340KB

    • memory/3912-34-0x0000000004990000-0x00000000049A3000-memory.dmp

      Filesize

      76KB

    • memory/3912-30-0x0000000004990000-0x00000000049A8000-memory.dmp

      Filesize

      96KB

    • memory/3912-52-0x0000000004990000-0x00000000049A3000-memory.dmp

      Filesize

      76KB

    • memory/3912-50-0x0000000004990000-0x00000000049A3000-memory.dmp

      Filesize

      76KB

    • memory/3912-48-0x0000000004990000-0x00000000049A3000-memory.dmp

      Filesize

      76KB

    • memory/3912-46-0x0000000004990000-0x00000000049A3000-memory.dmp

      Filesize

      76KB

    • memory/3912-44-0x0000000004990000-0x00000000049A3000-memory.dmp

      Filesize

      76KB

    • memory/3912-42-0x0000000004990000-0x00000000049A3000-memory.dmp

      Filesize

      76KB

    • memory/3912-40-0x0000000004990000-0x00000000049A3000-memory.dmp

      Filesize

      76KB

    • memory/3912-38-0x0000000004990000-0x00000000049A3000-memory.dmp

      Filesize

      76KB

    • memory/3912-36-0x0000000004990000-0x00000000049A3000-memory.dmp

      Filesize

      76KB

    • memory/3912-58-0x0000000004990000-0x00000000049A3000-memory.dmp

      Filesize

      76KB

    • memory/3912-32-0x0000000004990000-0x00000000049A3000-memory.dmp

      Filesize

      76KB

    • memory/3912-56-0x0000000004990000-0x00000000049A3000-memory.dmp

      Filesize

      76KB

    • memory/3912-31-0x0000000004990000-0x00000000049A3000-memory.dmp

      Filesize

      76KB

    • memory/3912-54-0x0000000004990000-0x00000000049A3000-memory.dmp

      Filesize

      76KB

    • memory/3912-29-0x00000000049F0000-0x0000000004F94000-memory.dmp

      Filesize

      5.6MB

    • memory/3912-28-0x00000000008C0000-0x00000000008DA000-memory.dmp

      Filesize

      104KB

    • memory/4352-919-0x0000000002400000-0x000000000244C000-memory.dmp

      Filesize

      304KB

    • memory/4352-114-0x0000000000400000-0x0000000000449000-memory.dmp

      Filesize

      292KB

    • memory/4352-117-0x00000000024D0000-0x000000000250C000-memory.dmp

      Filesize

      240KB

    • memory/4352-118-0x00000000049F0000-0x0000000004A2A000-memory.dmp

      Filesize

      232KB

    • memory/4352-124-0x00000000049F0000-0x0000000004A25000-memory.dmp

      Filesize

      212KB

    • memory/4352-123-0x00000000049F0000-0x0000000004A25000-memory.dmp

      Filesize

      212KB

    • memory/4352-116-0x0000000000400000-0x0000000000449000-memory.dmp

      Filesize

      292KB

    • memory/4352-112-0x0000000000400000-0x0000000000449000-memory.dmp

      Filesize

      292KB

    • memory/4864-122-0x0000000000F40000-0x0000000000F68000-memory.dmp

      Filesize

      160KB

    • memory/4864-916-0x0000000007C60000-0x0000000007C72000-memory.dmp

      Filesize

      72KB

    • memory/4864-915-0x00000000081E0000-0x00000000087F8000-memory.dmp

      Filesize

      6.1MB

    • memory/4864-918-0x0000000007D00000-0x0000000007D3C000-memory.dmp

      Filesize

      240KB

    • memory/4864-917-0x0000000007DD0000-0x0000000007EDA000-memory.dmp

      Filesize

      1.0MB