Analysis

  • max time kernel
    113s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 06:23 UTC

General

  • Target

    c9cef5da964d65a1da5fd8b1f9291c49e54a9550b118715bff4c724b99ceaf24N.exe

  • Size

    1.1MB

  • MD5

    d3a91b03ab70f47b0c918a594e977800

  • SHA1

    dca79d7dc44276b4890f7e078f93b1c777e79d78

  • SHA256

    c9cef5da964d65a1da5fd8b1f9291c49e54a9550b118715bff4c724b99ceaf24

  • SHA512

    4be3f8b793385b64b81d6a75f398a3fe0bc106e48bd360f1d02f90f787d408283ae792999d59e11205c699235332bb162df857e1ee8f9cd05c395ed2311b53aa

  • SSDEEP

    24576:PyjaySBLJQjb0HF0XIQE/1TEqzQDEZ4UxKCQbGIvw3MtTQoKFI:ajhSBujoOYXNoUtJxK1xvkMtTQV

Malware Config

Extracted

Family

amadey

Version

3.80

Botnet

9c0adb

C2

http://193.3.19.154

Attributes
  • install_dir

    cb7ae701b3

  • install_file

    oneetx.exe

  • strings_key

    23b27c80db2465a8e1dc15491b69b82f

  • url_paths

    /store/games/index.php

rc4.plain
1
006700e5a2ab05704bbb0c589b88924d

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 6 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c9cef5da964d65a1da5fd8b1f9291c49e54a9550b118715bff4c724b99ceaf24N.exe
    "C:\Users\Admin\AppData\Local\Temp\c9cef5da964d65a1da5fd8b1f9291c49e54a9550b118715bff4c724b99ceaf24N.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1148
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ja267622.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ja267622.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2860
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eI542519.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eI542519.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4452
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aX114507.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aX114507.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3192
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\121720816.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\121720816.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2000
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\286090553.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\286090553.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5020
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 1084
              6⤵
              • Program crash
              PID:3344
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\315315594.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\315315594.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2004
          • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3132
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F
              6⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:2892
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4916
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4720
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:N"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:2300
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                7⤵
                • System Location Discovery: System Language Discovery
                PID:3352
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4728
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "..\cb7ae701b3" /P "Admin:N"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4316
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "..\cb7ae701b3" /P "Admin:R" /E
                7⤵
                • System Location Discovery: System Language Discovery
                PID:2204
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\450786308.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\450786308.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2476
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5020 -ip 5020
    1⤵
      PID:4600
    • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
      C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
      1⤵
      • Executes dropped EXE
      PID:4408
    • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
      C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
      1⤵
      • Executes dropped EXE
      PID:5076

    Network

    • flag-us
      DNS
      8.8.8.8.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      8.8.8.8.in-addr.arpa
      IN PTR
      Response
      8.8.8.8.in-addr.arpa
      IN PTR
      dnsgoogle
    • flag-us
      DNS
      133.211.185.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      133.211.185.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      172.214.232.199.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      172.214.232.199.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      140.32.126.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      140.32.126.40.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      95.221.229.192.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      95.221.229.192.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      197.87.175.4.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      197.87.175.4.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      198.187.3.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      198.187.3.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      24.139.73.23.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      24.139.73.23.in-addr.arpa
      IN PTR
      Response
      24.139.73.23.in-addr.arpa
      IN PTR
      a23-73-139-24deploystaticakamaitechnologiescom
    • flag-us
      DNS
      97.17.167.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      97.17.167.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      172.210.232.199.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      172.210.232.199.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      21.236.111.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      21.236.111.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      21.236.111.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      21.236.111.52.in-addr.arpa
      IN PTR
    • 193.3.19.154:80
      oneetx.exe
      260 B
      5
    • 185.161.248.143:38452
      450786308.exe
      260 B
      5
    • 185.161.248.143:38452
      450786308.exe
      260 B
      5
    • 185.161.248.143:38452
      450786308.exe
      260 B
      5
    • 193.3.19.154:80
      oneetx.exe
      260 B
      5
    • 185.161.248.143:38452
      450786308.exe
      260 B
      5
    • 193.3.19.154:80
      oneetx.exe
      260 B
      5
    • 185.161.248.143:38452
      450786308.exe
      208 B
      4
    • 8.8.8.8:53
      8.8.8.8.in-addr.arpa
      dns
      66 B
      90 B
      1
      1

      DNS Request

      8.8.8.8.in-addr.arpa

    • 8.8.8.8:53
      133.211.185.52.in-addr.arpa
      dns
      73 B
      147 B
      1
      1

      DNS Request

      133.211.185.52.in-addr.arpa

    • 8.8.8.8:53
      172.214.232.199.in-addr.arpa
      dns
      74 B
      128 B
      1
      1

      DNS Request

      172.214.232.199.in-addr.arpa

    • 8.8.8.8:53
      140.32.126.40.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      140.32.126.40.in-addr.arpa

    • 8.8.8.8:53
      95.221.229.192.in-addr.arpa
      dns
      73 B
      144 B
      1
      1

      DNS Request

      95.221.229.192.in-addr.arpa

    • 8.8.8.8:53
      197.87.175.4.in-addr.arpa
      dns
      71 B
      157 B
      1
      1

      DNS Request

      197.87.175.4.in-addr.arpa

    • 8.8.8.8:53
      198.187.3.20.in-addr.arpa
      dns
      71 B
      157 B
      1
      1

      DNS Request

      198.187.3.20.in-addr.arpa

    • 8.8.8.8:53
      24.139.73.23.in-addr.arpa
      dns
      71 B
      135 B
      1
      1

      DNS Request

      24.139.73.23.in-addr.arpa

    • 8.8.8.8:53
      97.17.167.52.in-addr.arpa
      dns
      71 B
      145 B
      1
      1

      DNS Request

      97.17.167.52.in-addr.arpa

    • 8.8.8.8:53
      172.210.232.199.in-addr.arpa
      dns
      74 B
      128 B
      1
      1

      DNS Request

      172.210.232.199.in-addr.arpa

    • 8.8.8.8:53
      21.236.111.52.in-addr.arpa
      dns
      144 B
      158 B
      2
      1

      DNS Request

      21.236.111.52.in-addr.arpa

      DNS Request

      21.236.111.52.in-addr.arpa

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ja267622.exe

      Filesize

      940KB

      MD5

      b10a769a1a27bd6f3c0a83eb9cf1113e

      SHA1

      119373c40a18d17357faed9bec4ffbd048c3c7b4

      SHA256

      3b64af670e8bb2ef5f29fffe3dd8718b3e2b4893ae9d9c659a860e40d98d6923

      SHA512

      554e8608d8755a43c24abb5e3279d25626989c3d47e1e7c693086655c324fa9368cb27a34f56323f72ebcadb777d5e286a924079416c848c2ff19b80c4c028dc

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\450786308.exe

      Filesize

      341KB

      MD5

      f8048e05b2492041824f1f1ba9c3762e

      SHA1

      fb7046935cd6f45f5fd2572bece6f753a2b0ca05

      SHA256

      151043e941937f53a1f4bf21a677f9f162fa9772d8c3075c68db9459490e6bc3

      SHA512

      d309acca14b2c7b19f528b9173446335c56c9ed6ff1922a9df7b80b30eff14b349d659f1ed3777bf674b966b35fb931a1301fbf4bd4e7e703e4ad9045af940cb

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eI542519.exe

      Filesize

      586KB

      MD5

      8df9c02de5aad044ec701e033c1c8f90

      SHA1

      b986a89e7560b3657567303cf71a6b9c7d2dc336

      SHA256

      2c8c4c0461a6dfcf236b56f3e6703d1d08cee54b54d3575b27bd68757634c174

      SHA512

      894e6899d2aa3d7013bc389878d5c93fe83b122a395cc77e6fccbf2cbf8f10950a4906d461a16554ce02b2ba99ab6c7f64a21c53626dbcf2c3803c61841b2dcd

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\315315594.exe

      Filesize

      204KB

      MD5

      1304f384653e08ae497008ff13498608

      SHA1

      d9a76ed63d74d4217c5027757cb9a7a0d0093080

      SHA256

      2a9dabab35fb09085750e1cc762e32b0fe4cbd7ed4276ef7e68ba159ae330eaa

      SHA512

      4138217fd538e827c89db5c0cd4ea21bd8c8d3a7196d2eabf10412caf7b929479e768747df5fd92fc022d758f1840474530ba82dcb7e8672cc6eb88caeaf38c1

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aX114507.exe

      Filesize

      414KB

      MD5

      d50a0732ce7ba50d487bbbec2ec982fb

      SHA1

      deaf51f8743b55f0941c2081702f3c9c5f09ddfd

      SHA256

      15575837fe45c9dcef78f314f545685360ce101bc0bdb8991e7b7f817082cee4

      SHA512

      12da607bd45460e7702879f1b5a6f088ebca1db4b259768a2bbf831555a1e6345ccee45f0922d4255f58adfde97a17628e70c2c88201b7a223fb57a0a671a483

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\121720816.exe

      Filesize

      175KB

      MD5

      a165b5f6b0a4bdf808b71de57bf9347d

      SHA1

      39a7b301e819e386c162a47e046fa384bb5ab437

      SHA256

      68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

      SHA512

      3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\286090553.exe

      Filesize

      259KB

      MD5

      f4787ed07727c1bd843ff53b864a2ab7

      SHA1

      e5de48cc63d70b83f7921dede41ce554996c78cc

      SHA256

      4daa022b1064425e55b26320fa2587c24c6e35513fac092690e703deae93b485

      SHA512

      7a5877355318e0b2fd3314a192c2cc78833dbe31ada99ca24ec0ded473cff3ccfbc6c497f9e8667721b0bf98fe9e82c971773a5edc48913ff3e574fdb5ef507a

    • memory/2000-38-0x00000000024F0000-0x0000000002503000-memory.dmp

      Filesize

      76KB

    • memory/2000-30-0x00000000024F0000-0x0000000002508000-memory.dmp

      Filesize

      96KB

    • memory/2000-56-0x00000000024F0000-0x0000000002503000-memory.dmp

      Filesize

      76KB

    • memory/2000-54-0x00000000024F0000-0x0000000002503000-memory.dmp

      Filesize

      76KB

    • memory/2000-52-0x00000000024F0000-0x0000000002503000-memory.dmp

      Filesize

      76KB

    • memory/2000-50-0x00000000024F0000-0x0000000002503000-memory.dmp

      Filesize

      76KB

    • memory/2000-48-0x00000000024F0000-0x0000000002503000-memory.dmp

      Filesize

      76KB

    • memory/2000-46-0x00000000024F0000-0x0000000002503000-memory.dmp

      Filesize

      76KB

    • memory/2000-44-0x00000000024F0000-0x0000000002503000-memory.dmp

      Filesize

      76KB

    • memory/2000-42-0x00000000024F0000-0x0000000002503000-memory.dmp

      Filesize

      76KB

    • memory/2000-40-0x00000000024F0000-0x0000000002503000-memory.dmp

      Filesize

      76KB

    • memory/2000-36-0x00000000024F0000-0x0000000002503000-memory.dmp

      Filesize

      76KB

    • memory/2000-31-0x00000000024F0000-0x0000000002503000-memory.dmp

      Filesize

      76KB

    • memory/2000-34-0x00000000024F0000-0x0000000002503000-memory.dmp

      Filesize

      76KB

    • memory/2000-32-0x00000000024F0000-0x0000000002503000-memory.dmp

      Filesize

      76KB

    • memory/2000-58-0x00000000024F0000-0x0000000002503000-memory.dmp

      Filesize

      76KB

    • memory/2000-28-0x0000000002260000-0x000000000227A000-memory.dmp

      Filesize

      104KB

    • memory/2000-29-0x0000000004AF0000-0x0000000005094000-memory.dmp

      Filesize

      5.6MB

    • memory/2476-114-0x00000000026F0000-0x0000000002725000-memory.dmp

      Filesize

      212KB

    • memory/2476-112-0x0000000002640000-0x000000000267C000-memory.dmp

      Filesize

      240KB

    • memory/2476-113-0x00000000026F0000-0x000000000272A000-memory.dmp

      Filesize

      232KB

    • memory/2476-115-0x00000000026F0000-0x0000000002725000-memory.dmp

      Filesize

      212KB

    • memory/2476-117-0x00000000026F0000-0x0000000002725000-memory.dmp

      Filesize

      212KB

    • memory/2476-119-0x00000000026F0000-0x0000000002725000-memory.dmp

      Filesize

      212KB

    • memory/2476-906-0x0000000007610000-0x0000000007C28000-memory.dmp

      Filesize

      6.1MB

    • memory/2476-907-0x0000000002840000-0x0000000002852000-memory.dmp

      Filesize

      72KB

    • memory/2476-908-0x0000000007C30000-0x0000000007D3A000-memory.dmp

      Filesize

      1.0MB

    • memory/2476-909-0x0000000007D40000-0x0000000007D7C000-memory.dmp

      Filesize

      240KB

    • memory/2476-910-0x0000000002490000-0x00000000024DC000-memory.dmp

      Filesize

      304KB

    • memory/5020-92-0x0000000000400000-0x0000000000455000-memory.dmp

      Filesize

      340KB

    • memory/5020-94-0x0000000000400000-0x0000000000455000-memory.dmp

      Filesize

      340KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.