Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/11/2024, 23:35

General

  • Target

    deb4e03837a531b4707bfb1b45dbe8e87224b4b70f9a695d0c0d9bb4e11f9bd5.exe

  • Size

    931KB

  • MD5

    145eae4afa3d87451ed0656c5f169a10

  • SHA1

    a7724b6d0e30ed529a2839af916781995153f3e7

  • SHA256

    deb4e03837a531b4707bfb1b45dbe8e87224b4b70f9a695d0c0d9bb4e11f9bd5

  • SHA512

    95ac143e491655fcda20db80630d411230d9e3ca0274fdfcb16a0043771c196a75c9a7fb7cbe3ee1fb52c934dd1f1b2fc236fa3127adbbd79339e9c9a7ea2c7c

  • SSDEEP

    12288:Uy907KY50GJJExVfykBF6IxcbahUSK9p+vck0Dn8lxXcunKAHp6QZZRhuXHx0iDv:UyzYGBxVqC6ssSDckzKAIajMume0E6

Malware Config

Extracted

Family

amadey

Version

3.80

Botnet

9c0adb

C2

http://193.3.19.154

Attributes
  • install_dir

    cb7ae701b3

  • install_file

    oneetx.exe

  • strings_key

    23b27c80db2465a8e1dc15491b69b82f

  • url_paths

    /store/games/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 7 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\deb4e03837a531b4707bfb1b45dbe8e87224b4b70f9a695d0c0d9bb4e11f9bd5.exe
    "C:\Users\Admin\AppData\Local\Temp\deb4e03837a531b4707bfb1b45dbe8e87224b4b70f9a695d0c0d9bb4e11f9bd5.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1100
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Xz022258.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Xz022258.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1668
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Dq252905.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Dq252905.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4728
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\118647226.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\118647226.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3220
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\253781319.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\253781319.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1676
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1676 -s 1080
            5⤵
            • Program crash
            PID:4556
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\341986901.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\341986901.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4344
        • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
          "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4388
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:1892
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4468
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:5020
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2840
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:R" /E
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1008
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:112
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "..\cb7ae701b3" /P "Admin:N"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:3672
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "..\cb7ae701b3" /P "Admin:R" /E
              6⤵
              • System Location Discovery: System Language Discovery
              PID:4872
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\426914465.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\426914465.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2352
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1676 -ip 1676
    1⤵
      PID:1720
    • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
      C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
      1⤵
      • Executes dropped EXE
      PID:5036

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\426914465.exe

      Filesize

      348KB

      MD5

      04f6f4b8603a6d8229ede428616bb401

      SHA1

      dc84554ef057b8587c88045eddc2687706a36719

      SHA256

      f0f8ad6a661f7a5180cb24c473b94348fa72b54eaac421badb18395dcb56a4bb

      SHA512

      56c3944e0ef9c7f998cd5d125b7287462a818e177d04dca2c77a4d2c2f8960e4bbdf0a836e8a70cc97cca9368defe896990554ba308eb38451ec1c8beaf28fd3

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Xz022258.exe

      Filesize

      577KB

      MD5

      07f4d70bacceb118f146a3ca59913428

      SHA1

      b7c8550657295e754a7af21c6ec04e63d8e0cd3e

      SHA256

      ed13f75882ca10d5f85b22a61b2e556b96952fcbc07efa800357441ce58ec17c

      SHA512

      0b8477403a36ff6bc722252f51f20169f412f495b165c4f8ca58d37da4334d9801377d117f04989575929be0809fe76faf7bfc0428ac0d263aab4803d73e19d3

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\341986901.exe

      Filesize

      204KB

      MD5

      1304f384653e08ae497008ff13498608

      SHA1

      d9a76ed63d74d4217c5027757cb9a7a0d0093080

      SHA256

      2a9dabab35fb09085750e1cc762e32b0fe4cbd7ed4276ef7e68ba159ae330eaa

      SHA512

      4138217fd538e827c89db5c0cd4ea21bd8c8d3a7196d2eabf10412caf7b929479e768747df5fd92fc022d758f1840474530ba82dcb7e8672cc6eb88caeaf38c1

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Dq252905.exe

      Filesize

      406KB

      MD5

      0c01450fded1f37f17ceb1db556c118c

      SHA1

      a3f54f181fbace445697695820630932073e31c6

      SHA256

      c8d86313057548f804b8ec61202f653182ac60bf1ee6246ee1f515b46f4333bf

      SHA512

      3ac0fd356546214fdef3e2c85ea095cbfaceead5d6bae41232f88125bfef98abec7ee4d9640dff44eb56bdb6a446c8d3020319cd014445efdba1b2277baecc5a

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\118647226.exe

      Filesize

      175KB

      MD5

      3d10b67208452d7a91d7bd7066067676

      SHA1

      e6c3ab7b6da65c8cc7dd95351f118caf3a50248d

      SHA256

      5c8ae96739bd9454a59e92b5eb6965647030e87453f7c417dbd7d53ebd837302

      SHA512

      b86d5ff4f55c90922a890401ae4301da7e71eb5e546a82536073cc58780ce55585214cff39ec9b52f70704580ad36c1fa95ebee1515dd2e7ea313cb670f2b4df

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\253781319.exe

      Filesize

      264KB

      MD5

      7df80ac8c696004035e3a134de899be6

      SHA1

      4ee59ca41278f78bfe9aed030c1de580b81283be

      SHA256

      0cc43d8bbda7bc821a525d07d23678920599a2645d02570c6cb404118b4bdde5

      SHA512

      f544ab7fb054ef07250931c291617f828da082e036b55dac9c9a1f031e1dbff51e72a3de4642aae9d908f924428cc6ed55710a910c15f5cee8a5446e6dc1c0fc

    • memory/1676-85-0x0000000000400000-0x0000000002B9D000-memory.dmp

      Filesize

      39.6MB

    • memory/1676-87-0x0000000000400000-0x0000000002B9D000-memory.dmp

      Filesize

      39.6MB

    • memory/2352-108-0x0000000004D30000-0x0000000004D65000-memory.dmp

      Filesize

      212KB

    • memory/2352-107-0x0000000004D30000-0x0000000004D65000-memory.dmp

      Filesize

      212KB

    • memory/2352-899-0x0000000009C90000-0x000000000A2A8000-memory.dmp

      Filesize

      6.1MB

    • memory/2352-111-0x0000000004D30000-0x0000000004D65000-memory.dmp

      Filesize

      212KB

    • memory/2352-112-0x0000000004D30000-0x0000000004D65000-memory.dmp

      Filesize

      212KB

    • memory/2352-110-0x0000000004D30000-0x0000000004D65000-memory.dmp

      Filesize

      212KB

    • memory/2352-106-0x0000000004D30000-0x0000000004D6A000-memory.dmp

      Filesize

      232KB

    • memory/2352-105-0x00000000049C0000-0x00000000049FC000-memory.dmp

      Filesize

      240KB

    • memory/2352-900-0x000000000A340000-0x000000000A352000-memory.dmp

      Filesize

      72KB

    • memory/2352-901-0x000000000A360000-0x000000000A46A000-memory.dmp

      Filesize

      1.0MB

    • memory/2352-902-0x000000000A480000-0x000000000A4BC000-memory.dmp

      Filesize

      240KB

    • memory/2352-903-0x0000000004C50000-0x0000000004C9C000-memory.dmp

      Filesize

      304KB

    • memory/3220-45-0x0000000004AC0000-0x0000000004AD3000-memory.dmp

      Filesize

      76KB

    • memory/3220-24-0x0000000004AC0000-0x0000000004AD3000-memory.dmp

      Filesize

      76KB

    • memory/3220-25-0x0000000004AC0000-0x0000000004AD3000-memory.dmp

      Filesize

      76KB

    • memory/3220-27-0x0000000004AC0000-0x0000000004AD3000-memory.dmp

      Filesize

      76KB

    • memory/3220-29-0x0000000004AC0000-0x0000000004AD3000-memory.dmp

      Filesize

      76KB

    • memory/3220-31-0x0000000004AC0000-0x0000000004AD3000-memory.dmp

      Filesize

      76KB

    • memory/3220-33-0x0000000004AC0000-0x0000000004AD3000-memory.dmp

      Filesize

      76KB

    • memory/3220-35-0x0000000004AC0000-0x0000000004AD3000-memory.dmp

      Filesize

      76KB

    • memory/3220-37-0x0000000004AC0000-0x0000000004AD3000-memory.dmp

      Filesize

      76KB

    • memory/3220-39-0x0000000004AC0000-0x0000000004AD3000-memory.dmp

      Filesize

      76KB

    • memory/3220-41-0x0000000004AC0000-0x0000000004AD3000-memory.dmp

      Filesize

      76KB

    • memory/3220-43-0x0000000004AC0000-0x0000000004AD3000-memory.dmp

      Filesize

      76KB

    • memory/3220-47-0x0000000004AC0000-0x0000000004AD3000-memory.dmp

      Filesize

      76KB

    • memory/3220-49-0x0000000004AC0000-0x0000000004AD3000-memory.dmp

      Filesize

      76KB

    • memory/3220-51-0x0000000004AC0000-0x0000000004AD3000-memory.dmp

      Filesize

      76KB

    • memory/3220-23-0x0000000004AC0000-0x0000000004AD8000-memory.dmp

      Filesize

      96KB

    • memory/3220-22-0x0000000004B70000-0x0000000005114000-memory.dmp

      Filesize

      5.6MB

    • memory/3220-21-0x0000000002150000-0x000000000216A000-memory.dmp

      Filesize

      104KB