Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:15

General

  • Target

    1dc114f8fb4b3b8f1213b68cf9e7bc6722fc41b0b2afed346b84ee6152fa927a.exe

  • Size

    1.7MB

  • MD5

    184f742f384bbbe88aa4b7f4895a4be7

  • SHA1

    c04f48346f58192c4b1abf6d0f8e07c1f23457ed

  • SHA256

    1dc114f8fb4b3b8f1213b68cf9e7bc6722fc41b0b2afed346b84ee6152fa927a

  • SHA512

    ccc6207807fca4e862057a076579f29ebf304941733ca07784efa242607b8f6abb86870c55f3e3cc2829d9e7d5c51f4a8e8011fa9c33854e2ea43b50dd2cae20

  • SSDEEP

    24576:cypzpKpYhwz7+aoqijlcPttFgN5gnqMylJIxgOGw4DCcVU9zoDg67lNmewWTLw9:Lpz8qkiaXiZcVt+N5/JDD+6rYcX

Malware Config

Extracted

Family

amadey

Version

3.80

Botnet

9c0adb

C2

http://193.3.19.154

Attributes
  • install_dir

    cb7ae701b3

  • install_file

    oneetx.exe

  • strings_key

    23b27c80db2465a8e1dc15491b69b82f

  • url_paths

    /store/games/index.php

rc4.plain

Extracted

Family

redline

Botnet

most

C2

185.161.248.73:4164

Attributes
  • auth_value

    7da4dfa153f2919e617aa016f7c36008

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1dc114f8fb4b3b8f1213b68cf9e7bc6722fc41b0b2afed346b84ee6152fa927a.exe
    "C:\Users\Admin\AppData\Local\Temp\1dc114f8fb4b3b8f1213b68cf9e7bc6722fc41b0b2afed346b84ee6152fa927a.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ub875668.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ub875668.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1020
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\lr949961.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\lr949961.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4708
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Kz682549.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Kz682549.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:5116
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\UT939503.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\UT939503.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3636
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a32693987.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a32693987.exe
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3348
              • C:\Windows\Temp\1.exe
                "C:\Windows\Temp\1.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Executes dropped EXE
                • Windows security modification
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:5520
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b24348903.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b24348903.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:5452
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 5452 -s 1256
                7⤵
                • Program crash
                PID:5868
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c31550500.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c31550500.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2168
            • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
              "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:6304
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F
                7⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:7076
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:5320
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:5276
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "oneetx.exe" /P "Admin:N"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1668
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "oneetx.exe" /P "Admin:R" /E
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:5112
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4032
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\cb7ae701b3" /P "Admin:N"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:6744
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\cb7ae701b3" /P "Admin:R" /E
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:6656
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d44038372.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d44038372.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:6620
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 6620 -s 1268
            5⤵
            • Program crash
            PID:5848
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f51437432.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f51437432.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:6072
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 5452 -ip 5452
    1⤵
      PID:6216
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 6620 -ip 6620
      1⤵
        PID:5268
      • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        1⤵
        • Executes dropped EXE
        PID:6628
      • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        1⤵
        • Executes dropped EXE
        PID:1788

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ub875668.exe

        Filesize

        1.4MB

        MD5

        b9d5c16a07a222de7feba9eedfc6ee70

        SHA1

        fafbd2cda43953267b2cbdaa1d6f4351c33413d0

        SHA256

        81626092fc2e50200765187b86f58352ac0d498a700415a881c3baad883ea641

        SHA512

        692d785a9bd8dde2ad825b2fefd6de2c976f1a79783ad366aeb9b8da091b3db3d364d7d3324f62f63b625b89ce6970e0a0f3debca9f03c9cd9b67b574f3f6b17

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f51437432.exe

        Filesize

        169KB

        MD5

        a655eea2df6a0d30e09afbb28d500806

        SHA1

        5e5f50d67f6d7f8ef45ce0af23e801095f9ca507

        SHA256

        281c801cfa0e2d40558f4b643a453dc67c3c1b06f280fa412b30e8b22a9ed4e4

        SHA512

        1fc06280200a6e3d860b99784ecc70d133cb8b15a85e451d2241c71e9c38428580748fc64b648ac34741aa6a10ce686f2474d0d267adcc2d314c013b331974df

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\lr949961.exe

        Filesize

        1.3MB

        MD5

        bf063eee49f78473c014d6c422f95eb9

        SHA1

        09ac78f89561dcc531b49e5e13b24f00a93bf329

        SHA256

        e5e1a305d74c1f5e2aefa8e004896f0b1c005788e83740137de74f4b54bba059

        SHA512

        dc7c9978b5663383abeebd280068c3d01f1dbef61d736204ef61a8397fe07e69f09926998757b244e29bb5258923803aef268c8a922a297a730689c2d28be7f2

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Kz682549.exe

        Filesize

        851KB

        MD5

        c34dd40b782ad4e89866e3df17d4b8df

        SHA1

        c92f19774de5ad3dd40ef1ba5f4aa385e186c0e9

        SHA256

        c93f3e5021f502d398d5d1bff0fc4de87d65561cd3e3a83ab4277f2cd6df832f

        SHA512

        217054ccf99560bcd747f03f82404b4adad3faf56076f0e8998dedc18053b899143e2b422c88a38a43872c63255dc463753f0c6de3f12c903520a1a4af030277

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d44038372.exe

        Filesize

        582KB

        MD5

        426f2ce0098852c14d46e1f0f5c40f49

        SHA1

        1d12025f279298fbefdd5b1439d4d3e9d058a926

        SHA256

        9325c39d0821eed358c65ad781958e395cad20fa0147ca6438690f833992c865

        SHA512

        18e376e69543801296b847fd378933f6039127b4b2fa5b3d0f5e79d2d64d4bd2b0865c07009cfb1f79fb7e8b982e5369aa770c3812120ccad9e33e00aa596329

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\UT939503.exe

        Filesize

        680KB

        MD5

        3b9c55a1326e3be1c7f965080ee6dbd5

        SHA1

        898165528f66917b93045efcbb0eeca8af40a7d5

        SHA256

        9ac3dca4f331f9c3d83603635d2e4c0f138d0801518ca2aef774d709d39dd028

        SHA512

        784eaa0a252b886165e55e9c626a444f0e3219ef78b02001a58e1abb6bd8b5a293f6db3c0ad80b0f5d8fd3c2665d2c905fcde983c806b92258714a2a61d9f6c4

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c31550500.exe

        Filesize

        205KB

        MD5

        7c19b3c9350c9ebe9f4c37dd70b7fc91

        SHA1

        7774385ad10797cfd87098e50c025e4b4b2ff86a

        SHA256

        d96cad84bda1f57bd99d07d5035997d0f242c36b251f545ff7f87c2f708313e7

        SHA512

        65e476863f0b0b48475b208bfd9c8b7432b89b3c86456e63e50fb1b4e7ae801de0d783107584944e5b2fb9eb733a50f1b96c606666a1224b9cbebda0fca4c618

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a32693987.exe

        Filesize

        302KB

        MD5

        2116e372867b77d16abfc61727419969

        SHA1

        58365085ca2660baa86d6f2496cfa970dd8c838b

        SHA256

        bf70ba76ac699f39afe4365f45997bb40a908ecf634d8b5289f2e16d7de394ff

        SHA512

        7e5886e554f149dc08ab0357b527c5661594facc703e70f677827a5f6d369c71f503b4d9a905d0bb469142495041edc69ebfe14c0d81ab3d32b4dd7086b73833

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b24348903.exe

        Filesize

        522KB

        MD5

        b9a212cbf6c09a46369737a378e7fb94

        SHA1

        f34538723d574eeec0d682ece17cf4578f9ba697

        SHA256

        ce7d5b51c4809f0371e71ef38e81ce6bea19e4284bc125f4ddde48a91f5a4e48

        SHA512

        fbb53fa571e61ea80cb5f2f97953e33ad81a0dcff3d06c7968a89010789adc947d12ca49377e82a90d3c3a084b30a4a3a877abeb0dbf48e0851b31c0f3fbaccf

      • C:\Windows\Temp\1.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • memory/3348-59-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/3348-43-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/3348-95-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/3348-93-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/3348-89-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/3348-87-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/3348-85-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/3348-83-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/3348-81-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/3348-79-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/3348-77-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/3348-75-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/3348-73-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/3348-71-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/3348-69-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/3348-65-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/3348-63-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/3348-61-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/3348-99-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/3348-57-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/3348-55-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/3348-53-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/3348-51-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/3348-49-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/3348-45-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/3348-97-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/3348-41-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/3348-39-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/3348-38-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/3348-67-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/3348-47-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/3348-2166-0x0000000005430000-0x000000000543A000-memory.dmp

        Filesize

        40KB

      • memory/3348-101-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/3348-35-0x0000000004A40000-0x0000000004A98000-memory.dmp

        Filesize

        352KB

      • memory/3348-91-0x0000000004B20000-0x0000000004B71000-memory.dmp

        Filesize

        324KB

      • memory/3348-36-0x0000000004BC0000-0x0000000005164000-memory.dmp

        Filesize

        5.6MB

      • memory/3348-37-0x0000000004B20000-0x0000000004B76000-memory.dmp

        Filesize

        344KB

      • memory/5452-4312-0x0000000005760000-0x00000000057F2000-memory.dmp

        Filesize

        584KB

      • memory/5520-2181-0x00000000000D0000-0x00000000000DA000-memory.dmp

        Filesize

        40KB

      • memory/6072-6486-0x00000000007C0000-0x00000000007F0000-memory.dmp

        Filesize

        192KB

      • memory/6072-6487-0x0000000002970000-0x0000000002976000-memory.dmp

        Filesize

        24KB

      • memory/6072-6488-0x0000000005800000-0x0000000005E18000-memory.dmp

        Filesize

        6.1MB

      • memory/6072-6489-0x00000000052F0000-0x00000000053FA000-memory.dmp

        Filesize

        1.0MB

      • memory/6072-6490-0x0000000005030000-0x0000000005042000-memory.dmp

        Filesize

        72KB

      • memory/6072-6492-0x0000000005090000-0x00000000050CC000-memory.dmp

        Filesize

        240KB

      • memory/6072-6493-0x00000000051F0000-0x000000000523C000-memory.dmp

        Filesize

        304KB

      • memory/6620-4332-0x0000000002520000-0x0000000002588000-memory.dmp

        Filesize

        416KB

      • memory/6620-4333-0x0000000004E80000-0x0000000004EE6000-memory.dmp

        Filesize

        408KB

      • memory/6620-6480-0x0000000005760000-0x0000000005792000-memory.dmp

        Filesize

        200KB