Analysis

  • max time kernel
    114s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/11/2024, 14:07

General

  • Target

    0daf4621ae40ad5fdf517ecd432a70e97a817059e5a50a85668ab33804f5e434N.exe

  • Size

    929KB

  • MD5

    54444247521730c54b0dfc08099bf7c0

  • SHA1

    e1a4bea1866c74b906c06f5b81d7b49aea907b0f

  • SHA256

    0daf4621ae40ad5fdf517ecd432a70e97a817059e5a50a85668ab33804f5e434

  • SHA512

    a535a05f2281b87c9e6e64bcef7b9eb536f6fa79992df594795e1350a2be12beab6f4f40efa32b075cb2526a30c57033c623878c9b0cecd7b01ab268481f8b60

  • SSDEEP

    24576:dyeHF/hVltc4V3lToBThCzHSr5A6Fj18bgfk:4el/hNj3poBTCAXjKU

Malware Config

Extracted

Family

amadey

Version

3.80

Botnet

9c0adb

C2

http://193.3.19.154

Attributes
  • install_dir

    cb7ae701b3

  • install_file

    oneetx.exe

  • strings_key

    23b27c80db2465a8e1dc15491b69b82f

  • url_paths

    /store/games/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 6 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0daf4621ae40ad5fdf517ecd432a70e97a817059e5a50a85668ab33804f5e434N.exe
    "C:\Users\Admin\AppData\Local\Temp\0daf4621ae40ad5fdf517ecd432a70e97a817059e5a50a85668ab33804f5e434N.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st802405.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st802405.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3452
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\KF361654.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\KF361654.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1576
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\114016600.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\114016600.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4736
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\255615461.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\255615461.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1132
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1132 -s 1092
            5⤵
            • Program crash
            PID:4800
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\301609041.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\301609041.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1152
        • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
          "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:960
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:4000
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3968
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1320
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1528
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:R" /E
              6⤵
              • System Location Discovery: System Language Discovery
              PID:3248
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1328
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "..\cb7ae701b3" /P "Admin:N"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1756
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "..\cb7ae701b3" /P "Admin:R" /E
              6⤵
              • System Location Discovery: System Language Discovery
              PID:4488
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\475095745.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\475095745.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2168
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1132 -ip 1132
    1⤵
      PID:3304
    • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
      C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
      1⤵
      • Executes dropped EXE
      PID:1820
    • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
      C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
      1⤵
      • Executes dropped EXE
      PID:4364

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\475095745.exe

      Filesize

      340KB

      MD5

      3f34df34e8d1a4e22055283658035b99

      SHA1

      55779dcf0461289602c9a063b7add24946cd6322

      SHA256

      b52bad3ea313125428d8da8098e561560245aa40482efb0ccf321dd1fa4dc4e9

      SHA512

      4efed6c698cdaa90024ef0226c2e3c14146566b68f0ada43bc070793b191dcbba3a1a898d03e76ba866452901196b39a12fb09e1a77a5ab6eb93523acaa54f93

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st802405.exe

      Filesize

      577KB

      MD5

      8e2fb08ad1ae2c8d34fb35e06aab9f68

      SHA1

      828a62993c64be5513fe4677f4649364ba0c80d7

      SHA256

      c3b65ea99e1fe07a06d03ca0f3e720c285c7142042df6315811163de034cee19

      SHA512

      cdf77f4697e0ac6ce670c324bf445204046f4d8f73958881063a18d155bf3c2e4e7cde1ea456902ce23ff2b075dd16ce3f860c4bd226f4a9c506051dd5dce7bf

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\301609041.exe

      Filesize

      204KB

      MD5

      1304f384653e08ae497008ff13498608

      SHA1

      d9a76ed63d74d4217c5027757cb9a7a0d0093080

      SHA256

      2a9dabab35fb09085750e1cc762e32b0fe4cbd7ed4276ef7e68ba159ae330eaa

      SHA512

      4138217fd538e827c89db5c0cd4ea21bd8c8d3a7196d2eabf10412caf7b929479e768747df5fd92fc022d758f1840474530ba82dcb7e8672cc6eb88caeaf38c1

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\KF361654.exe

      Filesize

      406KB

      MD5

      a0ca4132a5f032fbb6e22845b3cb30c4

      SHA1

      936079621b645bf10f3fb9e1912750b85a89aa2a

      SHA256

      42ec226b7fe23e83f4da740b51ce5486f598a4a3df59f5bac196683a6c2e9535

      SHA512

      2dda45a023ae239eb4398fed76166ac7ec860e6a353e4e12f7be7f305e357766fade92367e293a1e15866c137b2fc3284e782546231604f440b90bfefa83acf1

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\114016600.exe

      Filesize

      176KB

      MD5

      2b71f4b18ac8214a2bff547b6ce2f64f

      SHA1

      b8f2f25139a7b2e8d5e8fbc024eb5cac518bc6a5

      SHA256

      f7eedf3aec775a62c265d1652686b30a8a45a953523e2fb3cfc1fac3c6a66fbc

      SHA512

      33518eff768610bf54f9888d9d0d746b0c3500dc5f2b8fd5f1641d5a264f657a8311b40364f70932512581183b244fec3feb535e21c13e0ec8adec9994175177

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\255615461.exe

      Filesize

      258KB

      MD5

      2aaf211ab2444526caf304ff3428d5d8

      SHA1

      606f60574dfb89f689dbdf386bb1dffd755e1924

      SHA256

      4fa3a501027e4c1eefa272a817a0d9840ad7da17b1abd090981e102f6ef9f2a7

      SHA512

      f2610449891d297e2f7ad49023261cc0183fbcbb05a746da9e10744c91f8b54ebaac33910f70eed1ab8cad9fe7cb663df48f03e0f402e2cd22ce606e5922773e

    • memory/1132-86-0x0000000000400000-0x0000000002B9B000-memory.dmp

      Filesize

      39.6MB

    • memory/2168-110-0x0000000007180000-0x00000000071B5000-memory.dmp

      Filesize

      212KB

    • memory/2168-899-0x0000000009D20000-0x000000000A338000-memory.dmp

      Filesize

      6.1MB

    • memory/2168-900-0x000000000A340000-0x000000000A352000-memory.dmp

      Filesize

      72KB

    • memory/2168-107-0x0000000007180000-0x00000000071B5000-memory.dmp

      Filesize

      212KB

    • memory/2168-108-0x0000000007180000-0x00000000071B5000-memory.dmp

      Filesize

      212KB

    • memory/2168-112-0x0000000007180000-0x00000000071B5000-memory.dmp

      Filesize

      212KB

    • memory/2168-106-0x0000000007180000-0x00000000071BA000-memory.dmp

      Filesize

      232KB

    • memory/2168-105-0x00000000070F0000-0x000000000712C000-memory.dmp

      Filesize

      240KB

    • memory/2168-901-0x000000000A360000-0x000000000A46A000-memory.dmp

      Filesize

      1.0MB

    • memory/2168-902-0x000000000A470000-0x000000000A4AC000-memory.dmp

      Filesize

      240KB

    • memory/2168-903-0x0000000004BE0000-0x0000000004C2C000-memory.dmp

      Filesize

      304KB

    • memory/4736-49-0x0000000002350000-0x0000000002363000-memory.dmp

      Filesize

      76KB

    • memory/4736-27-0x0000000002350000-0x0000000002363000-memory.dmp

      Filesize

      76KB

    • memory/4736-25-0x0000000002350000-0x0000000002363000-memory.dmp

      Filesize

      76KB

    • memory/4736-29-0x0000000002350000-0x0000000002363000-memory.dmp

      Filesize

      76KB

    • memory/4736-31-0x0000000002350000-0x0000000002363000-memory.dmp

      Filesize

      76KB

    • memory/4736-33-0x0000000002350000-0x0000000002363000-memory.dmp

      Filesize

      76KB

    • memory/4736-35-0x0000000002350000-0x0000000002363000-memory.dmp

      Filesize

      76KB

    • memory/4736-37-0x0000000002350000-0x0000000002363000-memory.dmp

      Filesize

      76KB

    • memory/4736-39-0x0000000002350000-0x0000000002363000-memory.dmp

      Filesize

      76KB

    • memory/4736-43-0x0000000002350000-0x0000000002363000-memory.dmp

      Filesize

      76KB

    • memory/4736-45-0x0000000002350000-0x0000000002363000-memory.dmp

      Filesize

      76KB

    • memory/4736-47-0x0000000002350000-0x0000000002363000-memory.dmp

      Filesize

      76KB

    • memory/4736-51-0x0000000002350000-0x0000000002363000-memory.dmp

      Filesize

      76KB

    • memory/4736-41-0x0000000002350000-0x0000000002363000-memory.dmp

      Filesize

      76KB

    • memory/4736-24-0x0000000002350000-0x0000000002363000-memory.dmp

      Filesize

      76KB

    • memory/4736-23-0x0000000002350000-0x0000000002368000-memory.dmp

      Filesize

      96KB

    • memory/4736-22-0x0000000004AD0000-0x0000000005074000-memory.dmp

      Filesize

      5.6MB

    • memory/4736-21-0x0000000000900000-0x000000000091A000-memory.dmp

      Filesize

      104KB