Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 01:54

General

  • Target

    cc9ce0620a01f900adb7c631c0605407776bafacc8ec18b0f6e30c6d32ccc225.exe

  • Size

    1.7MB

  • MD5

    c4e47f85f87cebe469573ace030b55ef

  • SHA1

    ca789f86056d9a7deb024da3236c69c47aec297c

  • SHA256

    cc9ce0620a01f900adb7c631c0605407776bafacc8ec18b0f6e30c6d32ccc225

  • SHA512

    28402454f7bfb4fb0092b1f481e542ac2e4c96c9103fe7963409978e8aad4d876339ac583571526325f585465636ce8bdbbc9c516991765db70477613ebbee18

  • SSDEEP

    49152:HafGKcZC4XtFPfdeD2kHs/BfE2jrjGxf:6frx+tFMaiSf7jrCxf

Malware Config

Extracted

Family

amadey

Version

3.80

Botnet

9c0adb

C2

http://193.3.19.154

Attributes
  • install_dir

    cb7ae701b3

  • install_file

    oneetx.exe

  • strings_key

    23b27c80db2465a8e1dc15491b69b82f

  • url_paths

    /store/games/index.php

rc4.plain

Extracted

Family

redline

Botnet

most

C2

185.161.248.73:4164

Attributes
  • auth_value

    7da4dfa153f2919e617aa016f7c36008

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc9ce0620a01f900adb7c631c0605407776bafacc8ec18b0f6e30c6d32ccc225.exe
    "C:\Users\Admin\AppData\Local\Temp\cc9ce0620a01f900adb7c631c0605407776bafacc8ec18b0f6e30c6d32ccc225.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1472
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tq814701.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tq814701.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5052
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gt917405.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gt917405.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1152
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cC233417.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cC233417.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:5008
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Fj825576.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Fj825576.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1536
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a34429761.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a34429761.exe
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2648
              • C:\Windows\Temp\1.exe
                "C:\Windows\Temp\1.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Executes dropped EXE
                • Windows security modification
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1420
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b00428784.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b00428784.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:5164
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 5164 -s 1264
                7⤵
                • Program crash
                PID:5596
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c04664910.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c04664910.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1968
            • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
              "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:5560
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F
                7⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:6192
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:6328
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:6524
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "oneetx.exe" /P "Admin:N"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:6548
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "oneetx.exe" /P "Admin:R" /E
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:6628
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:6728
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\cb7ae701b3" /P "Admin:N"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2860
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\cb7ae701b3" /P "Admin:R" /E
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:5196
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d02754609.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d02754609.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:5924
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 5924 -s 1268
            5⤵
            • Program crash
            PID:2692
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f47203914.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f47203914.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3132
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 5164 -ip 5164
    1⤵
      PID:3212
    • C:\Windows\servicing\TrustedInstaller.exe
      C:\Windows\servicing\TrustedInstaller.exe
      1⤵
        PID:6628
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 5924 -ip 5924
        1⤵
          PID:5776
        • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
          C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
          1⤵
          • Executes dropped EXE
          PID:4416
        • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
          C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
          1⤵
          • Executes dropped EXE
          PID:1172

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tq814701.exe

          Filesize

          1.4MB

          MD5

          4c2d267c2014623a8a3c3e76b3c058d2

          SHA1

          59aa38c3f22e5bf099171c77bee519a8962ba634

          SHA256

          faeb6500c3f521bccde622d2d52049b5b7bb63ffa51229d4809e828ce40791a5

          SHA512

          4a4cee636c2b6626533463f9bba0b65bcfe2ec07f106b161b564cc12ea50c77c659497362f06fa702d7e5e07ab347902c0804269c5ad08aeada37a7a7d64ceb3

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f47203914.exe

          Filesize

          168KB

          MD5

          15ac81646616e2c50a57ba42aea7e1f8

          SHA1

          83e5abd57b4a61d7832bc37c7a652a9c63e5c835

          SHA256

          6f4f1118e7887b5d652dabcd4bff7d8104682b2efc80c46850b4459426b63b8d

          SHA512

          65e91aefb4f428d3a9855c88a3cc045c3f05b00f5e7636bc312c8418ab76029b144c5062e47098312b1f030286b33996cf0f97948f190e9c069c30e4ec307dd2

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gt917405.exe

          Filesize

          1.3MB

          MD5

          d6a8ab9f409ab8ca1c5e59320f0881ca

          SHA1

          ced7841dd95e9ae088b5f515978bf8397275a3d1

          SHA256

          275eab199520a4e8bf2e1deb9970c1803dd2740a827cba09d56df0db72d6bf01

          SHA512

          a9bb518883919954e29b37dba665363988a6bdc6492ad6a1409205958b6edc157166f03a56bfd0aeec995943a7e5bc5a4ca8a3fa11d26cdcdf1408b8ad99eac5

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cC233417.exe

          Filesize

          850KB

          MD5

          a4182290f114f146f1f90d8c3c1808ad

          SHA1

          70f3f2071d6898944aa079cbd36383450d2b1a1d

          SHA256

          8e56c5da0b1c952f83199cb384b9d0ffa8788f58f00c26c6504402f877a81d25

          SHA512

          4e7bc209a6667a619d6ff14cf4cbe86cbff54f5d8857c96105ad1d73330a63357b16c8e905a214a609f070d4b55b37bd5a653dc3e6a7bf55e7c1a1039af39924

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d02754609.exe

          Filesize

          582KB

          MD5

          816f355bfbe2ce7e60571ddce5c7dd13

          SHA1

          6136b0a10cbfa976008e95f8233df50c5118d996

          SHA256

          5ea56ae283e10ff7e3ac348627f52c57924ed63c42c61a3a0c8eb33b3a86b69d

          SHA512

          6cced5b99ce29b16e91aa0f5f72e0a887b1d43be788beac6b76f8acf0fbdffe71cab27c9bb074588cc69397f0d06b4785b9145f423568f583cee6d4d49250280

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Fj825576.exe

          Filesize

          679KB

          MD5

          91b1415eb2a3e08fec9258d396ed24ab

          SHA1

          a601525b92e1360af578993d0f542d19f98862f3

          SHA256

          331d480931360d9cc5f14e12e878b7b460cfe773c83ba24fb99456ed2d2bb560

          SHA512

          ed2f955a3645ff642b0de6391e723b9890e205a7c1ae8f0b75e192351118642c112667f9d64ccfd414cf0388d16c10ca7bdac01415ac66fb105a2ae7eacfd394

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c04664910.exe

          Filesize

          204KB

          MD5

          bc614e3d7e595946089b01b8bcfeea6d

          SHA1

          cdefffa5da986c4bb83e1ce6411c817d427cb5af

          SHA256

          6c71a945049ac8baa6f9cf92f465b3072a143841e93f77f362aa6f869344cb12

          SHA512

          1ac16a5288855353a9ec21a018a06a1dd44e96223f55b4f7a73c6eb8dc96d8e414691c9a1443ab23c9ac3feb7cd414d8279cb731b45f5569efc334e4f1f6ec78

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a34429761.exe

          Filesize

          300KB

          MD5

          e55aa4ba35e24ab1ac1eaac49b51eec3

          SHA1

          60dc47a8a4d4e86529a4c301480986bd55dfeef0

          SHA256

          a676905fdbeb82331c3d0268c8188530bc7f23d091c00de9ca9e2d48fb755f78

          SHA512

          0d47d62fb10a71e195c620c6facb47e6a5ab2012f7a5e29753cc770f1a23bfc1a93ce9eeca2b2e5365ab244a7d3948a66d16b82a8aef15c9916d8e6f290b34f9

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b00428784.exe

          Filesize

          521KB

          MD5

          b4a5edf13f9e65e9a37456407f26d85e

          SHA1

          a4ae10ecd1d078265cfe6cc4404f442d6bd079f4

          SHA256

          9a46cc71c79ea5a9443fd97c8c8a6168aa5ba82d4980f820fbf701f44b568cfe

          SHA512

          02353d5425e8b26e12fbc4f86829519931d57f01ee6282f170a40c596ef084105419af20bcefe90a9916d28b9e72797fb5ccf9ddcfdb0e242db3febfa9d34cb3

        • C:\Windows\Temp\1.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • memory/1420-2182-0x0000000000A00000-0x0000000000A0A000-memory.dmp

          Filesize

          40KB

        • memory/2648-38-0x0000000005160000-0x00000000051B1000-memory.dmp

          Filesize

          324KB

        • memory/2648-57-0x0000000005160000-0x00000000051B1000-memory.dmp

          Filesize

          324KB

        • memory/2648-39-0x0000000005160000-0x00000000051B1000-memory.dmp

          Filesize

          324KB

        • memory/2648-51-0x0000000005160000-0x00000000051B1000-memory.dmp

          Filesize

          324KB

        • memory/2648-101-0x0000000005160000-0x00000000051B1000-memory.dmp

          Filesize

          324KB

        • memory/2648-97-0x0000000005160000-0x00000000051B1000-memory.dmp

          Filesize

          324KB

        • memory/2648-95-0x0000000005160000-0x00000000051B1000-memory.dmp

          Filesize

          324KB

        • memory/2648-93-0x0000000005160000-0x00000000051B1000-memory.dmp

          Filesize

          324KB

        • memory/2648-91-0x0000000005160000-0x00000000051B1000-memory.dmp

          Filesize

          324KB

        • memory/2648-89-0x0000000005160000-0x00000000051B1000-memory.dmp

          Filesize

          324KB

        • memory/2648-87-0x0000000005160000-0x00000000051B1000-memory.dmp

          Filesize

          324KB

        • memory/2648-85-0x0000000005160000-0x00000000051B1000-memory.dmp

          Filesize

          324KB

        • memory/2648-83-0x0000000005160000-0x00000000051B1000-memory.dmp

          Filesize

          324KB

        • memory/2648-81-0x0000000005160000-0x00000000051B1000-memory.dmp

          Filesize

          324KB

        • memory/2648-79-0x0000000005160000-0x00000000051B1000-memory.dmp

          Filesize

          324KB

        • memory/2648-75-0x0000000005160000-0x00000000051B1000-memory.dmp

          Filesize

          324KB

        • memory/2648-73-0x0000000005160000-0x00000000051B1000-memory.dmp

          Filesize

          324KB

        • memory/2648-71-0x0000000005160000-0x00000000051B1000-memory.dmp

          Filesize

          324KB

        • memory/2648-69-0x0000000005160000-0x00000000051B1000-memory.dmp

          Filesize

          324KB

        • memory/2648-67-0x0000000005160000-0x00000000051B1000-memory.dmp

          Filesize

          324KB

        • memory/2648-65-0x0000000005160000-0x00000000051B1000-memory.dmp

          Filesize

          324KB

        • memory/2648-61-0x0000000005160000-0x00000000051B1000-memory.dmp

          Filesize

          324KB

        • memory/2648-60-0x0000000005160000-0x00000000051B1000-memory.dmp

          Filesize

          324KB

        • memory/2648-41-0x0000000005160000-0x00000000051B1000-memory.dmp

          Filesize

          324KB

        • memory/2648-55-0x0000000005160000-0x00000000051B1000-memory.dmp

          Filesize

          324KB

        • memory/2648-53-0x0000000005160000-0x00000000051B1000-memory.dmp

          Filesize

          324KB

        • memory/2648-49-0x0000000005160000-0x00000000051B1000-memory.dmp

          Filesize

          324KB

        • memory/2648-47-0x0000000005160000-0x00000000051B1000-memory.dmp

          Filesize

          324KB

        • memory/2648-45-0x0000000005160000-0x00000000051B1000-memory.dmp

          Filesize

          324KB

        • memory/2648-44-0x0000000005160000-0x00000000051B1000-memory.dmp

          Filesize

          324KB

        • memory/2648-2166-0x0000000005430000-0x000000000543A000-memory.dmp

          Filesize

          40KB

        • memory/2648-63-0x0000000005160000-0x00000000051B1000-memory.dmp

          Filesize

          324KB

        • memory/2648-77-0x0000000005160000-0x00000000051B1000-memory.dmp

          Filesize

          324KB

        • memory/2648-99-0x0000000005160000-0x00000000051B1000-memory.dmp

          Filesize

          324KB

        • memory/2648-35-0x0000000002570000-0x00000000025C8000-memory.dmp

          Filesize

          352KB

        • memory/2648-37-0x0000000005160000-0x00000000051B6000-memory.dmp

          Filesize

          344KB

        • memory/2648-36-0x0000000004BB0000-0x0000000005154000-memory.dmp

          Filesize

          5.6MB

        • memory/3132-6486-0x0000000000F10000-0x0000000000F40000-memory.dmp

          Filesize

          192KB

        • memory/3132-6487-0x0000000005730000-0x0000000005736000-memory.dmp

          Filesize

          24KB

        • memory/3132-6488-0x0000000005F40000-0x0000000006558000-memory.dmp

          Filesize

          6.1MB

        • memory/3132-6489-0x0000000005A30000-0x0000000005B3A000-memory.dmp

          Filesize

          1.0MB

        • memory/3132-6490-0x0000000005780000-0x0000000005792000-memory.dmp

          Filesize

          72KB

        • memory/3132-6491-0x0000000005920000-0x000000000595C000-memory.dmp

          Filesize

          240KB

        • memory/3132-6492-0x0000000005960000-0x00000000059AC000-memory.dmp

          Filesize

          304KB

        • memory/5164-4312-0x0000000005850000-0x00000000058E2000-memory.dmp

          Filesize

          584KB

        • memory/5924-4333-0x0000000005570000-0x00000000055D6000-memory.dmp

          Filesize

          408KB

        • memory/5924-4332-0x0000000004E40000-0x0000000004EA8000-memory.dmp

          Filesize

          416KB

        • memory/5924-6480-0x0000000005760000-0x0000000005792000-memory.dmp

          Filesize

          200KB