Analysis

  • max time kernel
    107s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/11/2024, 17:21

General

  • Target

    6f236b914f4d0ca38be3b4da1f23eee4e697014a7d27576105af5fb1c7305199.exe

  • Size

    1.2MB

  • MD5

    1a07433d0eeed3e2580b9944607c3e73

  • SHA1

    e118faeb725c1ba1497a0100230227495ffe3a1d

  • SHA256

    6f236b914f4d0ca38be3b4da1f23eee4e697014a7d27576105af5fb1c7305199

  • SHA512

    41fa11a2217edfb07e613a63e518bbd46de26495b8e1678dfbc24ccf79d70479642cdd777518ba7b5333f6e70d95eec01e62c9e356188d37d529e7520d27499f

  • SSDEEP

    24576:lyw75BbKf+MNBoF1CUS0aioeMbrsaQY5sI85OdF1AbV3L5VScua0oG:A+Kf+M5US0aiWboQ545Od3c7vua0r

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

amadey

Version

3.70

Botnet

47f88f

C2

http://193.201.9.43

Attributes
  • install_dir

    595f021478

  • install_file

    oneetx.exe

  • strings_key

    4971eddfd380996ae21bea987102e417

  • url_paths

    /plays/chapter/index.php

rc4.plain

Extracted

Family

redline

Botnet

maxi

C2

185.161.248.90:4125

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 19 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f236b914f4d0ca38be3b4da1f23eee4e697014a7d27576105af5fb1c7305199.exe
    "C:\Users\Admin\AppData\Local\Temp\6f236b914f4d0ca38be3b4da1f23eee4e697014a7d27576105af5fb1c7305199.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki658514.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki658514.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2512
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki332149.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki332149.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4696
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki769923.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki769923.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2252
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az023168.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az023168.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1544
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu381352.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu381352.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3476
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3476 -s 1084
              6⤵
              • Program crash
              PID:3916
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\co352102.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\co352102.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4400
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:5372
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4400 -s 1388
            5⤵
            • Program crash
            PID:5448
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\duO41t74.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\duO41t74.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5500
        • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
          "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:5604
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:5712
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ft762131.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ft762131.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5640
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3476 -ip 3476
    1⤵
      PID:4252
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4400 -ip 4400
      1⤵
        PID:5400
      • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
        C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
        1⤵
        • Executes dropped EXE
        PID:1180

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ft762131.exe

        Filesize

        168KB

        MD5

        f3f0110dd728ebd7a2e20609f3b7ff33

        SHA1

        9e846ddfc4e53793c77a8b74395ed1c1c73da027

        SHA256

        f7dbb53256eb8a1896925f31a12ef486afea188abd1ff3b67ae7325e5e756751

        SHA512

        81da25c6e399a6f312473b567541a72cb9a7907dec4a572af2e3b44fe8ff37465a06652b8cf903e152518f518b16a5055c598f34dd96306aa1b620d0b0a0bc4f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki658514.exe

        Filesize

        1.1MB

        MD5

        27ab76368422dd7ae04eac7a2d95290d

        SHA1

        ddd6d69d5ed8e62689e9b9b1412c062005dbabb7

        SHA256

        ed4c6e3917af898a3d33b9beb3607b2a63fd43d620285e63b420cab1aa432c9c

        SHA512

        8731cd0ce78909a584fd3eb3857a489e4bc8d2b98a6b02d5a6310b179648c1a6ee47c3afdecc9011d6251579aac53a9028b34dd9d38976d6c9af7fcbcc154dad

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\duO41t74.exe

        Filesize

        229KB

        MD5

        ee1f5f0e1168ce5938997c932b4dcd27

        SHA1

        b8c0928da3a41d579c19f44b9e1fef6014d06452

        SHA256

        dea01b17d6e06c3bdf6f5387faa77a788ce9726a3110db90294b2e207b3d51ed

        SHA512

        bacc2d22b71bc5bc73c0699aaf4e2271effa4fe47c3ac63f3ee3ae3385d963eb6f93db082a9530d75d5c6f13884f30b0375d41badfe540f31ef747003a36c0a8

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki332149.exe

        Filesize

        904KB

        MD5

        19e7d10fe58cac65e1ac5a241fa450e7

        SHA1

        36622121859971d7a9055fd516bf062b17c6f8c5

        SHA256

        bc44ed4170bce771998d81d3460c98636dd6bbed924a6758b3583bcd0799087a

        SHA512

        edbf06034a2a13974517e5382a2f3ea35aeca37da594705e497adcfdd8c6c547070c7b568b9b1b051d398c55c830f0f6d215819c896b47c8c9758ee3ece31d4f

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\co352102.exe

        Filesize

        588KB

        MD5

        c62d5b965e00d3e0b7ada4909d4d322d

        SHA1

        257e6772c6a08f0cb776cb78f5a5e8ea9440df97

        SHA256

        12c220d994d854b68c348dc8aa9f4a6f7945233557877a27620d5d97741cce4b

        SHA512

        092d793a3bf135d03e04ab6e43d6f182ae422f37ebb45344a22d295a42aa9dbe2f906388b209b13f1fd92c71110857f690c913cc1bf0f5339532acbdeaa553a6

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki769923.exe

        Filesize

        386KB

        MD5

        b62c7d108a74321960e17dff3b5dfff3

        SHA1

        7bc0ecd84235436e9291d75f9d28bcc701d5b78b

        SHA256

        51ca04eea08890ae5809c8bee8a8bc390289c98c83330d076b9399533ded9e34

        SHA512

        e39baa48c1edd654da66b6a0f4701a7a968d41b42ff0a43c5066b5dc250b1cd798db983d7919455d1299d8ea522a9a8c5cd7410dc2b1fba2e289bba7ef2320fe

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az023168.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu381352.exe

        Filesize

        405KB

        MD5

        1724ef59e6d6633633a38930aa9e30b0

        SHA1

        328371e0fe70e1f00db5bab5f8f6800d23dda677

        SHA256

        16a871bf55515f4969ae1f48148d2d55f156f7cce9849a99a8750ef996e48016

        SHA512

        090a7c8634709f27a0bacfd943e10482b5ef6c6ca0bf9301989c02dddaa48b72890c5719dd2d30e14edaed06d0d3a834e7e515b9ccfa5039ab18e2eb8ea921ed

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        03728fed675bcde5256342183b1d6f27

        SHA1

        d13eace7d3d92f93756504b274777cc269b222a2

        SHA256

        f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

        SHA512

        6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

      • memory/1544-28-0x0000000000040000-0x000000000004A000-memory.dmp

        Filesize

        40KB

      • memory/3476-34-0x0000000004D10000-0x0000000004D2A000-memory.dmp

        Filesize

        104KB

      • memory/3476-35-0x0000000004D70000-0x0000000005314000-memory.dmp

        Filesize

        5.6MB

      • memory/3476-36-0x0000000005360000-0x0000000005378000-memory.dmp

        Filesize

        96KB

      • memory/3476-40-0x0000000005360000-0x0000000005372000-memory.dmp

        Filesize

        72KB

      • memory/3476-44-0x0000000005360000-0x0000000005372000-memory.dmp

        Filesize

        72KB

      • memory/3476-64-0x0000000005360000-0x0000000005372000-memory.dmp

        Filesize

        72KB

      • memory/3476-62-0x0000000005360000-0x0000000005372000-memory.dmp

        Filesize

        72KB

      • memory/3476-60-0x0000000005360000-0x0000000005372000-memory.dmp

        Filesize

        72KB

      • memory/3476-58-0x0000000005360000-0x0000000005372000-memory.dmp

        Filesize

        72KB

      • memory/3476-56-0x0000000005360000-0x0000000005372000-memory.dmp

        Filesize

        72KB

      • memory/3476-54-0x0000000005360000-0x0000000005372000-memory.dmp

        Filesize

        72KB

      • memory/3476-52-0x0000000005360000-0x0000000005372000-memory.dmp

        Filesize

        72KB

      • memory/3476-50-0x0000000005360000-0x0000000005372000-memory.dmp

        Filesize

        72KB

      • memory/3476-48-0x0000000005360000-0x0000000005372000-memory.dmp

        Filesize

        72KB

      • memory/3476-46-0x0000000005360000-0x0000000005372000-memory.dmp

        Filesize

        72KB

      • memory/3476-42-0x0000000005360000-0x0000000005372000-memory.dmp

        Filesize

        72KB

      • memory/3476-38-0x0000000005360000-0x0000000005372000-memory.dmp

        Filesize

        72KB

      • memory/3476-37-0x0000000005360000-0x0000000005372000-memory.dmp

        Filesize

        72KB

      • memory/3476-65-0x0000000000400000-0x000000000080A000-memory.dmp

        Filesize

        4.0MB

      • memory/3476-67-0x0000000000400000-0x000000000080A000-memory.dmp

        Filesize

        4.0MB

      • memory/4400-72-0x0000000002830000-0x0000000002898000-memory.dmp

        Filesize

        416KB

      • memory/4400-73-0x0000000002A40000-0x0000000002AA6000-memory.dmp

        Filesize

        408KB

      • memory/4400-77-0x0000000002A40000-0x0000000002AA0000-memory.dmp

        Filesize

        384KB

      • memory/4400-81-0x0000000002A40000-0x0000000002AA0000-memory.dmp

        Filesize

        384KB

      • memory/4400-107-0x0000000002A40000-0x0000000002AA0000-memory.dmp

        Filesize

        384KB

      • memory/4400-105-0x0000000002A40000-0x0000000002AA0000-memory.dmp

        Filesize

        384KB

      • memory/4400-103-0x0000000002A40000-0x0000000002AA0000-memory.dmp

        Filesize

        384KB

      • memory/4400-101-0x0000000002A40000-0x0000000002AA0000-memory.dmp

        Filesize

        384KB

      • memory/4400-99-0x0000000002A40000-0x0000000002AA0000-memory.dmp

        Filesize

        384KB

      • memory/4400-97-0x0000000002A40000-0x0000000002AA0000-memory.dmp

        Filesize

        384KB

      • memory/4400-95-0x0000000002A40000-0x0000000002AA0000-memory.dmp

        Filesize

        384KB

      • memory/4400-93-0x0000000002A40000-0x0000000002AA0000-memory.dmp

        Filesize

        384KB

      • memory/4400-91-0x0000000002A40000-0x0000000002AA0000-memory.dmp

        Filesize

        384KB

      • memory/4400-87-0x0000000002A40000-0x0000000002AA0000-memory.dmp

        Filesize

        384KB

      • memory/4400-85-0x0000000002A40000-0x0000000002AA0000-memory.dmp

        Filesize

        384KB

      • memory/4400-84-0x0000000002A40000-0x0000000002AA0000-memory.dmp

        Filesize

        384KB

      • memory/4400-79-0x0000000002A40000-0x0000000002AA0000-memory.dmp

        Filesize

        384KB

      • memory/4400-75-0x0000000002A40000-0x0000000002AA0000-memory.dmp

        Filesize

        384KB

      • memory/4400-89-0x0000000002A40000-0x0000000002AA0000-memory.dmp

        Filesize

        384KB

      • memory/4400-74-0x0000000002A40000-0x0000000002AA0000-memory.dmp

        Filesize

        384KB

      • memory/4400-2216-0x0000000005760000-0x0000000005792000-memory.dmp

        Filesize

        200KB

      • memory/5372-2229-0x00000000007A0000-0x00000000007CE000-memory.dmp

        Filesize

        184KB

      • memory/5372-2230-0x0000000002800000-0x0000000002806000-memory.dmp

        Filesize

        24KB

      • memory/5372-2231-0x0000000005710000-0x0000000005D28000-memory.dmp

        Filesize

        6.1MB

      • memory/5372-2232-0x0000000005200000-0x000000000530A000-memory.dmp

        Filesize

        1.0MB

      • memory/5372-2233-0x0000000005120000-0x0000000005132000-memory.dmp

        Filesize

        72KB

      • memory/5372-2235-0x0000000005180000-0x00000000051BC000-memory.dmp

        Filesize

        240KB

      • memory/5372-2239-0x0000000005310000-0x000000000535C000-memory.dmp

        Filesize

        304KB

      • memory/5640-2253-0x0000000000060000-0x0000000000090000-memory.dmp

        Filesize

        192KB

      • memory/5640-2254-0x00000000006C0000-0x00000000006C6000-memory.dmp

        Filesize

        24KB