Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-01-2025 10:18

General

  • Target

    00fa85d1b7df666624e986fae4bb65de8602d49d09f37e7a8a04bb52470febb3.exe

  • Size

    705KB

  • MD5

    f67aac6e64021331802841e1ab6a1284

  • SHA1

    0e5443344edfba236e919e9f7633051a7dfa1fa4

  • SHA256

    00fa85d1b7df666624e986fae4bb65de8602d49d09f37e7a8a04bb52470febb3

  • SHA512

    d592a740b682e0927479c75e0299de623ebce19ab3e837f5f4aedbc863ec469c98878dca9b5f55c8a0e3c5701d74469be0236edc9a3fe35696d78f506428998c

  • SSDEEP

    12288:UMrVy90bD0VCvCdg5EBeTy0PdSZc1wxcLPYPVpyddt5i8RUu8684l:Ry6o+0ePBp1wiLPOAtm4l

Malware Config

Extracted

Family

amadey

Version

3.87

Botnet

59b440

C2

http://77.91.68.18

Attributes
  • install_dir

    b40d11255d

  • install_file

    saves.exe

  • strings_key

    fa622dfc42544927a6471829ee1fa9fe

  • url_paths

    /nice/index.php

rc4.plain

Extracted

Family

redline

Botnet

stas

C2

77.91.124.82:19071

Attributes
  • auth_value

    db6d96c4eade05afc28c31d9ad73a73c

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00fa85d1b7df666624e986fae4bb65de8602d49d09f37e7a8a04bb52470febb3.exe
    "C:\Users\Admin\AppData\Local\Temp\00fa85d1b7df666624e986fae4bb65de8602d49d09f37e7a8a04bb52470febb3.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3636
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3960684.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3960684.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3292
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7600373.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7600373.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4668
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3983882.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3983882.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3612
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4922914.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4922914.exe
            5⤵
            • Modifies Windows Defender DisableAntiSpyware settings
            • Modifies Windows Defender Real-time Protection settings
            • Modifies Windows Defender TamperProtection settings
            • Modifies Windows Defender notification settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2728
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1483029.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1483029.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1696
            • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
              "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4012
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                7⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:2500
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2476
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:5004
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "saves.exe" /P "Admin:N"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4000
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "saves.exe" /P "Admin:R" /E
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3684
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1096
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\b40d11255d" /P "Admin:N"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3184
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\b40d11255d" /P "Admin:R" /E
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4648
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i4983280.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i4983280.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1800
  • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
    C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
    1⤵
    • Executes dropped EXE
    PID:5076
  • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
    C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
    1⤵
    • Executes dropped EXE
    PID:3380
  • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
    C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
    1⤵
    • Executes dropped EXE
    PID:4968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3960684.exe

    Filesize

    599KB

    MD5

    b857be03778edec380cbd25d82ded809

    SHA1

    694f3b65229a1e527e175ce5d798c2ed334fce0a

    SHA256

    55abb3f14f37a0f2355dcc4e00102c7bcc77b41322395490a84a3b5530a2dc8d

    SHA512

    00c3a765b69ffc36355c28156e19d389a358ff39e3653cc6495e589be4a3b657bd3d2053af90b410c0e1613dd4819cd06df32245171a05ee1a5a3a550111f203

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7600373.exe

    Filesize

    433KB

    MD5

    6ef20132fa83bcf769079b96d9d71038

    SHA1

    74f57ee5b1dbbf413a8c4ff50b423d611d4a1107

    SHA256

    b8a65ba5d1ca68779229d2261c0e2c8cd574d7efa83ac0fafc6d3cbd750346a4

    SHA512

    9f548128c6536cd123e8bbebdae3350e960a9dd0ddfb68390b16870dffa69acdcac51f1710ff726a83d7315fa9185c3f4e79506499f39d0bb8c7754c5bf478b1

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i4983280.exe

    Filesize

    174KB

    MD5

    ac97ff2f572224bb29f733651d14c66b

    SHA1

    da58348bfc3043d20e47b938a385ad69f05a05bb

    SHA256

    07b580992772a2c00dce50e84b89e1379ba48020188be665547a3081e865c62e

    SHA512

    3a9ee518a27ff0ad08873de2357d2ee64b1fe2df6002ea7ca3313ab23be3c4561c8ac702884d9e720e1336ea40503df18b36b29eb6e12d01ce1f390bd822de13

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3983882.exe

    Filesize

    277KB

    MD5

    d4340cd392960113e1fd74691951f261

    SHA1

    20bf61ebaf7d091187acf2c24fe812b57f70cc28

    SHA256

    44c66c20f12040728e9dd5cbf423419c07a7a30a0a110bb0f0a927dd0c17fda6

    SHA512

    c7945bd32619b4daa66124eeee2bb6bdc6c86545955a628116c67d619a45cdab2c50393feaabf11b361ee533d796cdc1d127792c5a9757b4b42aec627cb4f482

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4922914.exe

    Filesize

    15KB

    MD5

    d28069656dcfda9c1a4897783d4e7f36

    SHA1

    e6bfb7150e88c8d75d7591a64b0b58a964de2957

    SHA256

    d276a57f62ca06578b16e9fcd713bd4a7ae87a5a97457be9ed01cc42d63f5f3e

    SHA512

    8fd90570b3ef86c924976b83d5fd85d904f4f1a72fc631590b262dcf391819a77c301dbdf96854eb8045d8b383b83572e50a5669eb4b917de5d61afd66df6f98

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1483029.exe

    Filesize

    322KB

    MD5

    e0105cdac8cb92a683b9a5b9ee3d11ff

    SHA1

    7d54b067cd78a8701f80255a3f87a53a72b0f0e8

    SHA256

    3afe7ccdedc43a4578bb49fa2cabd54ed0889cfeb28bba5706aad34463c23691

    SHA512

    29cec183cc2fdf39781ec02fc09fa53ecceb10ae5d786e8b9a2d5fbf89d132191b78289faf69827b83d97360c0157a1cf765767c4dd117ca7df2ec5d15d017a1

  • memory/1800-45-0x0000000000990000-0x00000000009C0000-memory.dmp

    Filesize

    192KB

  • memory/1800-46-0x0000000007640000-0x0000000007646000-memory.dmp

    Filesize

    24KB

  • memory/1800-47-0x00000000058E0000-0x0000000005EF8000-memory.dmp

    Filesize

    6.1MB

  • memory/1800-48-0x00000000053D0000-0x00000000054DA000-memory.dmp

    Filesize

    1.0MB

  • memory/1800-49-0x0000000005310000-0x0000000005322000-memory.dmp

    Filesize

    72KB

  • memory/1800-50-0x0000000005370000-0x00000000053AC000-memory.dmp

    Filesize

    240KB

  • memory/1800-51-0x00000000054E0000-0x000000000552C000-memory.dmp

    Filesize

    304KB

  • memory/2728-28-0x00000000005B0000-0x00000000005BA000-memory.dmp

    Filesize

    40KB