Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/11/2024, 06:52

General

  • Target

    509cee6b1ec1870aa8fdd2e43897608b312d5ad6e7ce41604a431201bade87a3.exe

  • Size

    1.7MB

  • MD5

    6e926567e33188a822f96e422be3c718

  • SHA1

    81a902714bacc1270a358028478c90b060cca8ac

  • SHA256

    509cee6b1ec1870aa8fdd2e43897608b312d5ad6e7ce41604a431201bade87a3

  • SHA512

    fdb380e57a8e24e2e50188562b7375fdcafb14101bca262f256e36759d7d632900741d3f35401855e677c51d4eb353213e9930f4574ab2098708eb49f392fa6d

  • SSDEEP

    24576:Xy7urPgOI+lYZLHLfnyDJtY4S6zs1dYuLzOcRDBRDNfU/cCq0PPUKQP4pvi:i7SPgD+knaltRpAtucxRU/hHLc

Malware Config

Extracted

Family

amadey

Version

3.80

Botnet

9c0adb

C2

http://193.3.19.154

Attributes
  • install_dir

    cb7ae701b3

  • install_file

    oneetx.exe

  • strings_key

    23b27c80db2465a8e1dc15491b69b82f

  • url_paths

    /store/games/index.php

rc4.plain

Extracted

Family

redline

Botnet

most

C2

185.161.248.73:4164

Attributes
  • auth_value

    7da4dfa153f2919e617aa016f7c36008

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\509cee6b1ec1870aa8fdd2e43897608b312d5ad6e7ce41604a431201bade87a3.exe
    "C:\Users\Admin\AppData\Local\Temp\509cee6b1ec1870aa8fdd2e43897608b312d5ad6e7ce41604a431201bade87a3.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3940
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Nf684364.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Nf684364.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1700
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\og640244.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\og640244.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:844
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Hx960184.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Hx960184.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3488
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mI101953.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mI101953.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3620
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a95693396.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a95693396.exe
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1804
              • C:\Windows\Temp\1.exe
                "C:\Windows\Temp\1.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Executes dropped EXE
                • Windows security modification
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:5416
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b03073167.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b03073167.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:3392
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3392 -s 1256
                7⤵
                • Program crash
                PID:4104
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c98312345.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c98312345.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:7128
            • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
              "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4496
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F
                7⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:5532
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:6348
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4284
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "oneetx.exe" /P "Admin:N"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3680
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "oneetx.exe" /P "Admin:R" /E
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2000
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4248
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\cb7ae701b3" /P "Admin:N"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4396
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\cb7ae701b3" /P "Admin:R" /E
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:5180
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d08655786.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d08655786.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:4588
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4588 -s 1256
            5⤵
            • Program crash
            PID:6548
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f15721497.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f15721497.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:6900
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3392 -ip 3392
    1⤵
      PID:2912
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4588 -ip 4588
      1⤵
        PID:6656
      • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        1⤵
        • Executes dropped EXE
        PID:5252
      • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        1⤵
        • Executes dropped EXE
        PID:4892
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:6784

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Nf684364.exe

              Filesize

              1.4MB

              MD5

              aa7766bfe4f2f688040885b3fdb83ca2

              SHA1

              1b57095dc7b0091f707765b38b8b3835f9638033

              SHA256

              247f37a845d8ac8919f48b1581412723974b0c18b69ce176c1e7811602f47654

              SHA512

              7e9b1ed0b1812fa38d8d8b95f41ec57e754daf9ffa9e757ebf95758a1119c6a42f60d277fa7b56c4f8e1e4d9b1c1dbc4a7d86af7aa6a247cca99813fdd19ec88

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f15721497.exe

              Filesize

              168KB

              MD5

              d679c6013fb80be818b8945bfddf6ff0

              SHA1

              b3144aa51ba3b45da7e0496176c50e916e0a02df

              SHA256

              425762b9abf9f7b0d651271e7045004f9e56aea06302cb5b41527cf05e685495

              SHA512

              d99eb25597e77b0266dcb79611f163dc5235dc90333482acbf7202157309a5b67c915d2048d8429422f1579b04f0a0a8234b4702b21652429c7bd705fb5b1cdb

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\og640244.exe

              Filesize

              1.3MB

              MD5

              07119ac9d33f1c7041c83638534095d6

              SHA1

              6ae43686d662101d15b45838b581cc5841f4db1a

              SHA256

              11593409330b48f9881d37f44243385665ad57a65f48a2957821367d75e2decc

              SHA512

              1504f759bd41c4265f0acac5c045fc43d298ca384b4b60fb376d250ec66431c478286be69e3afcbdf86a8da3adca1836e82deb5349106e8883ea5dbe64130043

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Hx960184.exe

              Filesize

              851KB

              MD5

              b12aad66de250fbcaabc6862e28826e7

              SHA1

              94603ad8e8cfb575c67e92c2d13566131f7b7584

              SHA256

              83be2b37789cbbedf59cbadd598e05a902e43886c7ae711cae19edd22dce0d11

              SHA512

              0f64c159a24c1aed209461fa9eefc62fe2ccf757b316ab222366c60367296c337bd7d1ad657349a0b3b100e58db5a8630c14fc15c0a4958a810352a843d761ef

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d08655786.exe

              Filesize

              581KB

              MD5

              038220d815fc59d31f26eb2ca15f506b

              SHA1

              05980eb8df0524b0fb2a1b2aa85e90ed86bada44

              SHA256

              d520f057dc6fde621e07737f18b079b2ecb86cc6ac64b28782d6d30f87b20be3

              SHA512

              0f68368494794ce70df4b9127e08cdfd6ee1888b17dd183cdc8121304279c7cdd21e977ca46dbf360897bc6cdeca279e04b219de941e796e3482c4c2ee7c67c3

            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c98312345.exe

              Filesize

              205KB

              MD5

              a9957e674098f1bb820748119e81177b

              SHA1

              fa25e405b9734247a6093f3824c4ad7a05b59c3a

              SHA256

              621d71ad5083b58c431991c4a5e7ddd674936f85d498391d9f66cc1696081a32

              SHA512

              a060c17fb4b374b088ccb3e691564a2547bcfe0108083d24c5d475174c1cb828490e2c32721c543bddd04d1915ad78f9e26a5a8caa955ef06d3cc18843c65b3b

            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mI101953.exe

              Filesize

              679KB

              MD5

              9690a8823170512f959f7176eca659f0

              SHA1

              5a181e74407b883ab6d39abaaadf867c03c14554

              SHA256

              18e925b493de0df198ae88d9665610518af9a2a4a9c2ad94bb7cadfda98d12d5

              SHA512

              320694f39c7c3ab877fcfa9be9b8fd487d15224fe2ae055d152bf520e43febb6849d0223280f12c2e80bc6c41aa411d3de89264ecc49c91296b4c376ef78a0d8

            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a95693396.exe

              Filesize

              301KB

              MD5

              75ec67ee87c64b7f06f7e5f0f8e0b19f

              SHA1

              ce796dda43d14cb7ba5723cbb0d470f3b761140a

              SHA256

              b52eb1a66da94d197b79ac8f37491c473429d8095a8bebf07895e7330a97bf83

              SHA512

              8f0a65cc0b93968c8f6b70f0811dab0dddcee0659504ae9cc70f24cc8fb065993dd0fcc8f5f66b16467c889ea4a93567cd87c2b276ca4b948d19c90129024617

            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b03073167.exe

              Filesize

              521KB

              MD5

              4a3783b4884b565c12c4a2811eda718b

              SHA1

              621d854f656026f80ee58f46f28a3f2d9def3c11

              SHA256

              1ff01d296547ff2a6879c4490707d3a8ba6fb81efaf3c8e82c86c3f956b3c334

              SHA512

              672df1e461c5fa88d5f6979c1503301fe81ef231f927f0e711982bed8669e385a0448ba8eb13a62f061351374b1214b5c3326bfe3aa67e733c76c23f69d7b18c

            • C:\Windows\Temp\1.exe

              Filesize

              11KB

              MD5

              7e93bacbbc33e6652e147e7fe07572a0

              SHA1

              421a7167da01c8da4dc4d5234ca3dd84e319e762

              SHA256

              850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

              SHA512

              250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

            • memory/1804-59-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

              Filesize

              324KB

            • memory/1804-45-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

              Filesize

              324KB

            • memory/1804-98-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

              Filesize

              324KB

            • memory/1804-95-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

              Filesize

              324KB

            • memory/1804-93-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

              Filesize

              324KB

            • memory/1804-91-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

              Filesize

              324KB

            • memory/1804-89-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

              Filesize

              324KB

            • memory/1804-85-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

              Filesize

              324KB

            • memory/1804-83-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

              Filesize

              324KB

            • memory/1804-81-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

              Filesize

              324KB

            • memory/1804-79-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

              Filesize

              324KB

            • memory/1804-77-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

              Filesize

              324KB

            • memory/1804-75-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

              Filesize

              324KB

            • memory/1804-73-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

              Filesize

              324KB

            • memory/1804-69-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

              Filesize

              324KB

            • memory/1804-67-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

              Filesize

              324KB

            • memory/1804-66-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

              Filesize

              324KB

            • memory/1804-61-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

              Filesize

              324KB

            • memory/1804-101-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

              Filesize

              324KB

            • memory/1804-57-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

              Filesize

              324KB

            • memory/1804-55-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

              Filesize

              324KB

            • memory/1804-53-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

              Filesize

              324KB

            • memory/1804-51-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

              Filesize

              324KB

            • memory/1804-49-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

              Filesize

              324KB

            • memory/1804-47-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

              Filesize

              324KB

            • memory/1804-99-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

              Filesize

              324KB

            • memory/1804-43-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

              Filesize

              324KB

            • memory/1804-87-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

              Filesize

              324KB

            • memory/1804-41-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

              Filesize

              324KB

            • memory/1804-39-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

              Filesize

              324KB

            • memory/1804-38-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

              Filesize

              324KB

            • memory/1804-2166-0x00000000052F0000-0x00000000052FA000-memory.dmp

              Filesize

              40KB

            • memory/1804-71-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

              Filesize

              324KB

            • memory/1804-35-0x00000000048F0000-0x0000000004948000-memory.dmp

              Filesize

              352KB

            • memory/1804-63-0x0000000004FA0000-0x0000000004FF1000-memory.dmp

              Filesize

              324KB

            • memory/1804-36-0x00000000049F0000-0x0000000004F94000-memory.dmp

              Filesize

              5.6MB

            • memory/1804-37-0x0000000004FA0000-0x0000000004FF6000-memory.dmp

              Filesize

              344KB

            • memory/3392-4312-0x0000000005750000-0x00000000057E2000-memory.dmp

              Filesize

              584KB

            • memory/4588-4332-0x0000000004C30000-0x0000000004C98000-memory.dmp

              Filesize

              416KB

            • memory/4588-4333-0x0000000005520000-0x0000000005586000-memory.dmp

              Filesize

              408KB

            • memory/4588-6480-0x0000000005760000-0x0000000005792000-memory.dmp

              Filesize

              200KB

            • memory/5416-2179-0x0000000000370000-0x000000000037A000-memory.dmp

              Filesize

              40KB

            • memory/6900-6486-0x0000000000480000-0x00000000004B0000-memory.dmp

              Filesize

              192KB

            • memory/6900-6487-0x0000000002870000-0x0000000002876000-memory.dmp

              Filesize

              24KB

            • memory/6900-6488-0x00000000054F0000-0x0000000005B08000-memory.dmp

              Filesize

              6.1MB

            • memory/6900-6489-0x0000000005010000-0x000000000511A000-memory.dmp

              Filesize

              1.0MB

            • memory/6900-6490-0x0000000004F40000-0x0000000004F52000-memory.dmp

              Filesize

              72KB

            • memory/6900-6491-0x0000000004FA0000-0x0000000004FDC000-memory.dmp

              Filesize

              240KB

            • memory/6900-6493-0x0000000005120000-0x000000000516C000-memory.dmp

              Filesize

              304KB