Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:20

General

  • Target

    0cf961b9617341016d65da859a7a8c0a597204a60e758a7e97c14667de458f38N.exe

  • Size

    1.4MB

  • MD5

    4b18181cae358667b8cba7abfa669ec3

  • SHA1

    ec5c370cb3642f2a49766a99d5e6ebb6468a94e1

  • SHA256

    cca56fb1a48923e8dc08be2463ee24eff87d78b43670cb053c1e0a8441a84760

  • SHA512

    2769c05229b4d8ba2d200722fe22b15dd81fff0ae8b8cd962715a57a7c8852d5869880ba56b220eb7fc3b82be3daa488dc92121cf3c7126ed3289b087ee3ae39

  • SSDEEP

    24576:myovTHxrUOeAgtt1NkTWQ4I+Arw1wrGIa5tSYZRdABB+1M/6Y2DTSVhihAVST0pT:1ovDoAit7kTRYv5tjZQBA1MiY2nS/ihi

Malware Config

Extracted

Family

amadey

Version

3.80

Botnet

9c0adb

C2

http://193.3.19.154

Attributes
  • install_dir

    cb7ae701b3

  • install_file

    oneetx.exe

  • strings_key

    23b27c80db2465a8e1dc15491b69b82f

  • url_paths

    /store/games/index.php

rc4.plain

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

most

C2

185.161.248.73:4164

Attributes
  • auth_value

    7da4dfa153f2919e617aa016f7c36008

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0cf961b9617341016d65da859a7a8c0a597204a60e758a7e97c14667de458f38N.exe
    "C:\Users\Admin\AppData\Local\Temp\0cf961b9617341016d65da859a7a8c0a597204a60e758a7e97c14667de458f38N.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Vw710488.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Vw710488.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:648
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sy610142.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sy610142.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1384
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\xE852476.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\xE852476.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:640
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a32748623.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a32748623.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1048
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2392
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b88156331.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b88156331.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:4352
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4352 -s 1256
              6⤵
              • Program crash
              PID:4048
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c11145226.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c11145226.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:5416
          • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1516
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F
              6⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:4508
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4412
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:2116
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:N"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:1460
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                7⤵
                • System Location Discovery: System Language Discovery
                PID:5088
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:3992
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "..\cb7ae701b3" /P "Admin:N"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:1056
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "..\cb7ae701b3" /P "Admin:R" /E
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4452
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d95803403.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d95803403.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1400
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2096
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1400 -s 1516
          4⤵
          • Program crash
          PID:6076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f23364938.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f23364938.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5844
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4352 -ip 4352
    1⤵
      PID:5448
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1400 -ip 1400
      1⤵
        PID:4728
      • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        1⤵
        • Executes dropped EXE
        PID:2904

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Vw710488.exe

        Filesize

        1.3MB

        MD5

        1309d47d7a5a87ecea5d23bca664f968

        SHA1

        c68aca3c762c76ade08529da00f880997b4c9a69

        SHA256

        ce229a07df51a211ff86ed6529ed4a76b8bb94e3fc34cf2040634aa40f0d73c8

        SHA512

        b2b5db781347bc8b7ed243f635aa1589e5521f35821dec0251dc00c288881d933878609ee8c5f302b886086996b23c6f9f76fbf38771ebfd01affab52a03b88c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f23364938.exe

        Filesize

        168KB

        MD5

        502743db712b81c2cfbde0127c4b2d02

        SHA1

        a3c69b4b9a57b8ee2ecf12de13279e6dfff29187

        SHA256

        f8c89e3541950ff011476fe22e70f2a3d1e7d8e5886d5ebcb9a611f42418104b

        SHA512

        4604f9709ed81eb529820bb488b04ec296947f0e41eaaa38058d764ed6a832e6398083d82b02325a41a9a77e441cb579fbcd1de09918c8fa5dbd35826fe48301

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d95803403.exe

        Filesize

        581KB

        MD5

        3e0a0d927e190b0e8433377c74b26d1f

        SHA1

        01e82e92844b746a60eb3cc2c7e8ed1c4a9e181a

        SHA256

        79bb0bd21b8722443e07d48a25830d410971b07e0249b70af0c528c6d34fe77a

        SHA512

        a560ae956aded811320b149b8850f5d4d5bbb03ca5131dedabc423fafefab4a6e07b59fb1718c3185f8e16e103acb18aab47e540f43b93dd7303a24ccf797a7b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sy610142.exe

        Filesize

        851KB

        MD5

        3dbcf38e8d9cba91796910061e66f119

        SHA1

        ef6895e9e955dc89642672c978dc27a6aea32c37

        SHA256

        4994668c38a363b6d6714aa95ff6abf66a4c73752d8cc0e865b318389435c51e

        SHA512

        fb1b40a52c81d21992260b5075605d9980996083166a2ea8b046afe565c667561d93ab74cb1857874962abf41c89a8cd6fbe9dcc58716770c4adba0d74097b9b

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c11145226.exe

        Filesize

        205KB

        MD5

        89c97187edf8bcbe495c18e2767a1f0c

        SHA1

        eb114e3fdd1d39c99a22f19fd7afc6818f7ed3f7

        SHA256

        6952328081aa0ec650ea51013ee043829b7239ee579f74880fe14871a7845393

        SHA512

        92a5c0e29f38606d37e7a78f3a2e8e3ff1ced41bbfdcba040285539363be1eaf309c3806da536d3314d3029cf48245dbebafd85bac840b2ef5367976c9d4debe

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\xE852476.exe

        Filesize

        679KB

        MD5

        f814f9d9c7bde39fab3ce6d3a54ae704

        SHA1

        f281cf05fa137b90538b346feacf785cbe799252

        SHA256

        fdc0e781807eb96ac78c314e70cf515261dc908784951f3bb1a469327153d56f

        SHA512

        2822d01a577b138aaeb85d79228b7ddc2690abbab65fd682d19968f0f279b2f73d5532475bbefeff4c0364aad296efff90a6e5b3691db5647e9a31d52a550f01

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a32748623.exe

        Filesize

        301KB

        MD5

        8590ae76cadf9df51a865195d5687714

        SHA1

        875ddbeb418484077b3f889d21c594cb7c140829

        SHA256

        404f77fb976534e02b7721d8706905d3ac129d468af2f0e3186c2172644e7df7

        SHA512

        0cce6cb5cc22b2bde7c855b7f7006c590f388f4a35798f5defb1d925b82b4f5434f30f38c41880d78f8b025a74c14ed3149a82f62e573a9a1a7f0b3cf0b2395b

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b88156331.exe

        Filesize

        521KB

        MD5

        f08660b21f553076652d144ddb35cf6d

        SHA1

        e4976a4be420b15472ff8887a7617d908cae6ee7

        SHA256

        56c18155580e33c24f07d5d64b3d9e7d16f9f103be3ee157f52f49c7ebd4b3d7

        SHA512

        3766e58e408d1b78d3492b3e1f5256608a8d31a94fe742e2149ebbc17055ca28399c215e9e3ab2947ede75d7124e91ec98c417f42348d8f88a0bb574563930a8

      • C:\Windows\Temp\1.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        f16fb63d4e551d3808e8f01f2671b57e

        SHA1

        781153ad6235a1152da112de1fb39a6f2d063575

        SHA256

        8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

        SHA512

        fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

      • memory/1048-76-0x00000000050E0000-0x0000000005131000-memory.dmp

        Filesize

        324KB

      • memory/1048-32-0x00000000050E0000-0x0000000005131000-memory.dmp

        Filesize

        324KB

      • memory/1048-84-0x00000000050E0000-0x0000000005131000-memory.dmp

        Filesize

        324KB

      • memory/1048-82-0x00000000050E0000-0x0000000005131000-memory.dmp

        Filesize

        324KB

      • memory/1048-80-0x00000000050E0000-0x0000000005131000-memory.dmp

        Filesize

        324KB

      • memory/1048-88-0x00000000050E0000-0x0000000005131000-memory.dmp

        Filesize

        324KB

      • memory/1048-74-0x00000000050E0000-0x0000000005131000-memory.dmp

        Filesize

        324KB

      • memory/1048-72-0x00000000050E0000-0x0000000005131000-memory.dmp

        Filesize

        324KB

      • memory/1048-68-0x00000000050E0000-0x0000000005131000-memory.dmp

        Filesize

        324KB

      • memory/1048-66-0x00000000050E0000-0x0000000005131000-memory.dmp

        Filesize

        324KB

      • memory/1048-64-0x00000000050E0000-0x0000000005131000-memory.dmp

        Filesize

        324KB

      • memory/1048-62-0x00000000050E0000-0x0000000005131000-memory.dmp

        Filesize

        324KB

      • memory/1048-60-0x00000000050E0000-0x0000000005131000-memory.dmp

        Filesize

        324KB

      • memory/1048-58-0x00000000050E0000-0x0000000005131000-memory.dmp

        Filesize

        324KB

      • memory/1048-56-0x00000000050E0000-0x0000000005131000-memory.dmp

        Filesize

        324KB

      • memory/1048-54-0x00000000050E0000-0x0000000005131000-memory.dmp

        Filesize

        324KB

      • memory/1048-52-0x00000000050E0000-0x0000000005131000-memory.dmp

        Filesize

        324KB

      • memory/1048-50-0x00000000050E0000-0x0000000005131000-memory.dmp

        Filesize

        324KB

      • memory/1048-48-0x00000000050E0000-0x0000000005131000-memory.dmp

        Filesize

        324KB

      • memory/1048-46-0x00000000050E0000-0x0000000005131000-memory.dmp

        Filesize

        324KB

      • memory/1048-42-0x00000000050E0000-0x0000000005131000-memory.dmp

        Filesize

        324KB

      • memory/1048-40-0x00000000050E0000-0x0000000005131000-memory.dmp

        Filesize

        324KB

      • memory/1048-38-0x00000000050E0000-0x0000000005131000-memory.dmp

        Filesize

        324KB

      • memory/1048-36-0x00000000050E0000-0x0000000005131000-memory.dmp

        Filesize

        324KB

      • memory/1048-34-0x00000000050E0000-0x0000000005131000-memory.dmp

        Filesize

        324KB

      • memory/1048-86-0x00000000050E0000-0x0000000005131000-memory.dmp

        Filesize

        324KB

      • memory/1048-78-0x00000000050E0000-0x0000000005131000-memory.dmp

        Filesize

        324KB

      • memory/1048-70-0x00000000050E0000-0x0000000005131000-memory.dmp

        Filesize

        324KB

      • memory/1048-44-0x00000000050E0000-0x0000000005131000-memory.dmp

        Filesize

        324KB

      • memory/1048-31-0x00000000050E0000-0x0000000005131000-memory.dmp

        Filesize

        324KB

      • memory/1048-2159-0x0000000005430000-0x000000000543A000-memory.dmp

        Filesize

        40KB

      • memory/1048-92-0x00000000050E0000-0x0000000005131000-memory.dmp

        Filesize

        324KB

      • memory/1048-94-0x00000000050E0000-0x0000000005131000-memory.dmp

        Filesize

        324KB

      • memory/1048-28-0x0000000004A30000-0x0000000004A88000-memory.dmp

        Filesize

        352KB

      • memory/1048-29-0x0000000004AE0000-0x0000000005084000-memory.dmp

        Filesize

        5.6MB

      • memory/1048-90-0x00000000050E0000-0x0000000005131000-memory.dmp

        Filesize

        324KB

      • memory/1048-30-0x00000000050E0000-0x0000000005136000-memory.dmp

        Filesize

        344KB

      • memory/1400-4325-0x0000000002930000-0x0000000002998000-memory.dmp

        Filesize

        416KB

      • memory/1400-4326-0x0000000004F70000-0x0000000004FD6000-memory.dmp

        Filesize

        408KB

      • memory/1400-6474-0x0000000005770000-0x00000000057A2000-memory.dmp

        Filesize

        200KB

      • memory/2096-6492-0x0000000004CF0000-0x0000000004D2C000-memory.dmp

        Filesize

        240KB

      • memory/2096-6487-0x0000000000310000-0x000000000033E000-memory.dmp

        Filesize

        184KB

      • memory/2096-6488-0x0000000002420000-0x0000000002426000-memory.dmp

        Filesize

        24KB

      • memory/2096-6489-0x0000000005250000-0x0000000005868000-memory.dmp

        Filesize

        6.1MB

      • memory/2096-6490-0x0000000004D60000-0x0000000004E6A000-memory.dmp

        Filesize

        1.0MB

      • memory/2096-6491-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/2096-6497-0x0000000004E70000-0x0000000004EBC000-memory.dmp

        Filesize

        304KB

      • memory/2392-2174-0x0000000000510000-0x000000000051A000-memory.dmp

        Filesize

        40KB

      • memory/4352-4305-0x0000000005750000-0x00000000057E2000-memory.dmp

        Filesize

        584KB

      • memory/5844-6498-0x0000000000AF0000-0x0000000000B20000-memory.dmp

        Filesize

        192KB

      • memory/5844-6499-0x0000000001350000-0x0000000001356000-memory.dmp

        Filesize

        24KB