Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:29

General

  • Target

    4a7442296e32a063b5c713a961b3655a323bee3e805b0a15da39350d76122bc2.exe

  • Size

    1.5MB

  • MD5

    b8357e806f20bf379c7349a4da769a01

  • SHA1

    5a4dc0f3434cbed2e02f2aa7637d923d89620fb4

  • SHA256

    4a7442296e32a063b5c713a961b3655a323bee3e805b0a15da39350d76122bc2

  • SHA512

    113654eb1486f6770d671f20ce49f91d961fac75ec00685e4d7cd8ccdb5e3ccf289fc434cd3c46551f6859392c4e7ca0085977445627e37104be83c7594caadc

  • SSDEEP

    24576:nylAR1ytDxAU/tEyt+MwfkrkZ3QtazOJTcMkl6A1xx5QD8ldv1lod:ylSytlAytxt9tkZXPMkoA1t48LNK

Malware Config

Extracted

Family

amadey

Version

3.80

Botnet

9c0adb

C2

http://193.3.19.154

Attributes
  • install_dir

    cb7ae701b3

  • install_file

    oneetx.exe

  • strings_key

    23b27c80db2465a8e1dc15491b69b82f

  • url_paths

    /store/games/index.php

rc4.plain

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

most

C2

185.161.248.73:4164

Attributes
  • auth_value

    7da4dfa153f2919e617aa016f7c36008

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a7442296e32a063b5c713a961b3655a323bee3e805b0a15da39350d76122bc2.exe
    "C:\Users\Admin\AppData\Local\Temp\4a7442296e32a063b5c713a961b3655a323bee3e805b0a15da39350d76122bc2.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nq092299.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nq092299.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4784
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\VQ353578.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\VQ353578.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3272
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\BH180710.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\BH180710.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2572
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\114708159.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\114708159.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:112
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:5476
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\258986101.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\258986101.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:912
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 912 -s 1256
              6⤵
              • Program crash
              PID:2756
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\342830947.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\342830947.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:6052
          • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:5904
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F
              6⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:2552
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4436
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:2352
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:N"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:2484
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                7⤵
                • System Location Discovery: System Language Discovery
                PID:2452
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:5536
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "..\cb7ae701b3" /P "Admin:N"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:5844
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "..\cb7ae701b3" /P "Admin:R" /E
                7⤵
                • System Location Discovery: System Language Discovery
                PID:3404
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\436123287.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\436123287.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2200
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:5468
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2200 -s 1188
          4⤵
          • Program crash
          PID:4944
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\571962902.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\571962902.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5228
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 912 -ip 912
    1⤵
      PID:1528
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2200 -ip 2200
      1⤵
        PID:5308
      • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        1⤵
        • Executes dropped EXE
        PID:2568
      • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        1⤵
        • Executes dropped EXE
        PID:2948

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\571962902.exe

        Filesize

        168KB

        MD5

        23bf8277fe81d432902a96d16906735b

        SHA1

        998bd641c8084bf425b2185419f3d91f4cf0dec4

        SHA256

        743b918aa649e9dfb54739b2ac00523fa048d1495dcf1ed3baf6afe5b10b106b

        SHA512

        cd0db15dd275d05d7156842ee3033fdd834c623a321ee476e53dfc400f6bf9f1a3df06e4e815071da554ba2e2b075bfc16ba2087ff92e84a29b55f501e3aadf2

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nq092299.exe

        Filesize

        1.3MB

        MD5

        3ea153dbb26079801b11301563133e97

        SHA1

        0b027870a17a22bcb0e072a6a85e0b998ac185ba

        SHA256

        49b162187591d351a4cf4f8e0dd1dbd9f9a8398ef3bdfd5f8b258eaef5260765

        SHA512

        cd68a9a59d21747dda5d0f8f66ad5c2a9eeb4d4dae7dc46a4aaedda960283259972372a5e35aad6f335a1aa5321109c7d9e65bcaedccb58470d0942cfea1e439

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\436123287.exe

        Filesize

        538KB

        MD5

        0f14d3c5a4496e392b2552d2693a3a47

        SHA1

        17ec5448fe7c200a1fe420beaebb61b8c0a66b48

        SHA256

        868318bb1150da5325e8733c17a083e25b733a9d92b35e695e6b4b6ea3efe7c1

        SHA512

        7de8f9d0ba6fe910fe5fbc71c6baf227bd6e99fb7a2adc8b2f8de58c1ae689352e004f3c3f15faec24572a09ee1ed345a0ebca10b10d5cd2c7e74c0ba042c6f3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\VQ353578.exe

        Filesize

        871KB

        MD5

        f9ea5c7ad902f1823268baab6c9f9310

        SHA1

        208cb81c4b0e981703840df4b8fa9054d3a35a76

        SHA256

        b21bd7ea1d5f3c6f8cdf748732914b3905d299ef09cbe7ce8f0f9f4ff4433741

        SHA512

        fc0879894f0f8011fc7d7c74dd1670aae40f996fd979c18a0ad72c14784788bbee07cb83f4b9c1bc28abe91def717e3b326a7c7d26d79886a156a039e736fc01

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\342830947.exe

        Filesize

        204KB

        MD5

        113ec1646c3a81b8f92c43648da431fc

        SHA1

        3f83f31ceeb207a85ffeebf862af8e1a20c48bdb

        SHA256

        863d2427e8c298458bcfcb19ef07dd151da7d4e29ba6d9e4353ac57e86793ccf

        SHA512

        7dbd19236de7f80c41d88038eabdc7317bc5c6db803150a5402d7fb81f993ed672125f49519a3e8dbf5284bb3b6ed088705a3b42362e2b391da97a241895df69

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\BH180710.exe

        Filesize

        699KB

        MD5

        25f539c994738776f6ac1f4033a525c4

        SHA1

        0ab84da3260ab9cf403206421d9c5c68bdb675d5

        SHA256

        f37cb056afde271af20f5d8ba5998d4983a8299fc7c3c7ed0c32999ea99baa1b

        SHA512

        3f56a140a32627f7bca0446f5e66a08bfe2a933a0faa9162a64358a0ae60292a6d6eb262e541e231f16f7e17e0413102ec2d8c65be071efe9b1aee59dd6f9619

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\114708159.exe

        Filesize

        300KB

        MD5

        1a9433f161bc1f3ceed57edd089a6383

        SHA1

        2443626c8af19e04932dc6c298922d354c745179

        SHA256

        8bef18d73db740896bed919b139375fb5b26f3f2b879c9345e6bc65a08e1471d

        SHA512

        6e221db10ed2070ebcfbade4e1e4f58af751d097bca9096488ba6e23a72d51bad1ddbae3a76f6f5eccbfe1b945f7be5b2b5e23e4f0dc2d7b3609794de14d3027

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\258986101.exe

        Filesize

        478KB

        MD5

        01a545c0518306c20b1d46768b515227

        SHA1

        b51ecf4f09af734a22ecf2884bfe8c281c7d17b2

        SHA256

        d6ea41ae5ba9768cffd8e62db6942c5071056d6c86effcd652cc9a336e937f9d

        SHA512

        1ec4bcb0facedea2de0ced6f123c323538578ef3e7e5d7eeec8914387a74b29ae7cc8cb42cdafef2a85746077db848a185840e4193a7849cc3606802570ed64f

      • C:\Windows\Temp\1.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        f16fb63d4e551d3808e8f01f2671b57e

        SHA1

        781153ad6235a1152da112de1fb39a6f2d063575

        SHA256

        8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

        SHA512

        fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

      • memory/112-92-0x0000000004FC0000-0x0000000005011000-memory.dmp

        Filesize

        324KB

      • memory/112-48-0x0000000004FC0000-0x0000000005011000-memory.dmp

        Filesize

        324KB

      • memory/112-66-0x0000000004FC0000-0x0000000005011000-memory.dmp

        Filesize

        324KB

      • memory/112-38-0x0000000004FC0000-0x0000000005011000-memory.dmp

        Filesize

        324KB

      • memory/112-31-0x0000000004FC0000-0x0000000005011000-memory.dmp

        Filesize

        324KB

      • memory/112-94-0x0000000004FC0000-0x0000000005011000-memory.dmp

        Filesize

        324KB

      • memory/112-90-0x0000000004FC0000-0x0000000005011000-memory.dmp

        Filesize

        324KB

      • memory/112-88-0x0000000004FC0000-0x0000000005011000-memory.dmp

        Filesize

        324KB

      • memory/112-84-0x0000000004FC0000-0x0000000005011000-memory.dmp

        Filesize

        324KB

      • memory/112-82-0x0000000004FC0000-0x0000000005011000-memory.dmp

        Filesize

        324KB

      • memory/112-80-0x0000000004FC0000-0x0000000005011000-memory.dmp

        Filesize

        324KB

      • memory/112-78-0x0000000004FC0000-0x0000000005011000-memory.dmp

        Filesize

        324KB

      • memory/112-76-0x0000000004FC0000-0x0000000005011000-memory.dmp

        Filesize

        324KB

      • memory/112-74-0x0000000004FC0000-0x0000000005011000-memory.dmp

        Filesize

        324KB

      • memory/112-72-0x0000000004FC0000-0x0000000005011000-memory.dmp

        Filesize

        324KB

      • memory/112-70-0x0000000004FC0000-0x0000000005011000-memory.dmp

        Filesize

        324KB

      • memory/112-68-0x0000000004FC0000-0x0000000005011000-memory.dmp

        Filesize

        324KB

      • memory/112-64-0x0000000004FC0000-0x0000000005011000-memory.dmp

        Filesize

        324KB

      • memory/112-62-0x0000000004FC0000-0x0000000005011000-memory.dmp

        Filesize

        324KB

      • memory/112-60-0x0000000004FC0000-0x0000000005011000-memory.dmp

        Filesize

        324KB

      • memory/112-58-0x0000000004FC0000-0x0000000005011000-memory.dmp

        Filesize

        324KB

      • memory/112-56-0x0000000004FC0000-0x0000000005011000-memory.dmp

        Filesize

        324KB

      • memory/112-54-0x0000000004FC0000-0x0000000005011000-memory.dmp

        Filesize

        324KB

      • memory/112-52-0x0000000004FC0000-0x0000000005011000-memory.dmp

        Filesize

        324KB

      • memory/112-50-0x0000000004FC0000-0x0000000005011000-memory.dmp

        Filesize

        324KB

      • memory/112-86-0x0000000004FC0000-0x0000000005011000-memory.dmp

        Filesize

        324KB

      • memory/112-46-0x0000000004FC0000-0x0000000005011000-memory.dmp

        Filesize

        324KB

      • memory/112-44-0x0000000004FC0000-0x0000000005011000-memory.dmp

        Filesize

        324KB

      • memory/112-42-0x0000000004FC0000-0x0000000005011000-memory.dmp

        Filesize

        324KB

      • memory/112-40-0x0000000004FC0000-0x0000000005011000-memory.dmp

        Filesize

        324KB

      • memory/112-2159-0x00000000052F0000-0x00000000052FA000-memory.dmp

        Filesize

        40KB

      • memory/112-34-0x0000000004FC0000-0x0000000005011000-memory.dmp

        Filesize

        324KB

      • memory/112-36-0x0000000004FC0000-0x0000000005011000-memory.dmp

        Filesize

        324KB

      • memory/112-28-0x0000000004970000-0x00000000049C8000-memory.dmp

        Filesize

        352KB

      • memory/112-29-0x00000000049D0000-0x0000000004F74000-memory.dmp

        Filesize

        5.6MB

      • memory/112-32-0x0000000004FC0000-0x0000000005011000-memory.dmp

        Filesize

        324KB

      • memory/112-30-0x0000000004FC0000-0x0000000005016000-memory.dmp

        Filesize

        344KB

      • memory/912-4305-0x0000000005740000-0x00000000057D2000-memory.dmp

        Filesize

        584KB

      • memory/2200-4326-0x0000000004DD0000-0x0000000004E38000-memory.dmp

        Filesize

        416KB

      • memory/2200-4327-0x0000000005580000-0x00000000055E6000-memory.dmp

        Filesize

        408KB

      • memory/2200-6474-0x0000000005750000-0x0000000005782000-memory.dmp

        Filesize

        200KB

      • memory/5228-6499-0x0000000005130000-0x0000000005136000-memory.dmp

        Filesize

        24KB

      • memory/5228-6498-0x0000000000810000-0x0000000000840000-memory.dmp

        Filesize

        192KB

      • memory/5468-6489-0x0000000005D30000-0x0000000006348000-memory.dmp

        Filesize

        6.1MB

      • memory/5468-6490-0x0000000005820000-0x000000000592A000-memory.dmp

        Filesize

        1.0MB

      • memory/5468-6491-0x0000000005750000-0x0000000005762000-memory.dmp

        Filesize

        72KB

      • memory/5468-6492-0x00000000057B0000-0x00000000057EC000-memory.dmp

        Filesize

        240KB

      • memory/5468-6494-0x0000000005930000-0x000000000597C000-memory.dmp

        Filesize

        304KB

      • memory/5468-6488-0x0000000002FD0000-0x0000000002FD6000-memory.dmp

        Filesize

        24KB

      • memory/5468-6487-0x0000000000DD0000-0x0000000000DFE000-memory.dmp

        Filesize

        184KB

      • memory/5476-2175-0x0000000000AD0000-0x0000000000ADA000-memory.dmp

        Filesize

        40KB