Analysis
-
max time kernel
24s -
max time network
29s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
17/07/2023, 18:37
Static task
static1
Behavioral task
behavioral1
Sample
d84ef9785152317da89e92b6629982e3449ff1f33fab527e6817bbbe0fbb83b2.exe
Resource
win10v2004-20230703-en
General
-
Target
d84ef9785152317da89e92b6629982e3449ff1f33fab527e6817bbbe0fbb83b2.exe
-
Size
514KB
-
MD5
ac3cc8ce16a1f0330deaf6c2e424c78a
-
SHA1
f6ff2201504e7fc615f6e6070c873d9a7fffe104
-
SHA256
d84ef9785152317da89e92b6629982e3449ff1f33fab527e6817bbbe0fbb83b2
-
SHA512
15b9a7e7da1a70e34df7b74eca13d257ef5f0b684ff28f4444d4633e83ce4dc58e3f880736bc22c874e12eed7dfa241b0ef2ab9f0b49a77502d502d5b37adcff
-
SSDEEP
12288:xMrhy90ZUwmCkbLhqN/NkXZ0JLCtdplG0OGs2LCW1cQJ:oyUIlgLJ0OGs2l1cY
Malware Config
Extracted
amadey
3.85
77.91.68.3/home/love/index.php
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
roma
77.91.68.56:19071
-
auth_value
f099c2cf92834dbc554a94e1456cf576
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x00070000000231f1-153.dat healer behavioral1/files/0x00070000000231f1-152.dat healer behavioral1/memory/2360-154-0x0000000000440000-0x000000000044A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4408603.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4408603.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4408603.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4408603.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4408603.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a4408603.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\Control Panel\International\Geo\Nation b4347562.exe Key value queried \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\Control Panel\International\Geo\Nation danke.exe -
Executes dropped EXE 7 IoCs
pid Process 4184 v4781796.exe 1676 v2068715.exe 2360 a4408603.exe 1928 b4347562.exe 2156 danke.exe 700 c4500302.exe 4112 d9322098.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a4408603.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v4781796.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2068715.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v2068715.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d84ef9785152317da89e92b6629982e3449ff1f33fab527e6817bbbe0fbb83b2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d84ef9785152317da89e92b6629982e3449ff1f33fab527e6817bbbe0fbb83b2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4781796.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c4500302.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c4500302.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c4500302.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1996 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2360 a4408603.exe 2360 a4408603.exe 700 c4500302.exe 700 c4500302.exe 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 700 c4500302.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2360 a4408603.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1928 b4347562.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1300 wrote to memory of 4184 1300 d84ef9785152317da89e92b6629982e3449ff1f33fab527e6817bbbe0fbb83b2.exe 84 PID 1300 wrote to memory of 4184 1300 d84ef9785152317da89e92b6629982e3449ff1f33fab527e6817bbbe0fbb83b2.exe 84 PID 1300 wrote to memory of 4184 1300 d84ef9785152317da89e92b6629982e3449ff1f33fab527e6817bbbe0fbb83b2.exe 84 PID 4184 wrote to memory of 1676 4184 v4781796.exe 85 PID 4184 wrote to memory of 1676 4184 v4781796.exe 85 PID 4184 wrote to memory of 1676 4184 v4781796.exe 85 PID 1676 wrote to memory of 2360 1676 v2068715.exe 86 PID 1676 wrote to memory of 2360 1676 v2068715.exe 86 PID 1676 wrote to memory of 1928 1676 v2068715.exe 92 PID 1676 wrote to memory of 1928 1676 v2068715.exe 92 PID 1676 wrote to memory of 1928 1676 v2068715.exe 92 PID 1928 wrote to memory of 2156 1928 b4347562.exe 93 PID 1928 wrote to memory of 2156 1928 b4347562.exe 93 PID 1928 wrote to memory of 2156 1928 b4347562.exe 93 PID 4184 wrote to memory of 700 4184 v4781796.exe 94 PID 4184 wrote to memory of 700 4184 v4781796.exe 94 PID 4184 wrote to memory of 700 4184 v4781796.exe 94 PID 2156 wrote to memory of 1996 2156 danke.exe 95 PID 2156 wrote to memory of 1996 2156 danke.exe 95 PID 2156 wrote to memory of 1996 2156 danke.exe 95 PID 2156 wrote to memory of 2924 2156 danke.exe 97 PID 2156 wrote to memory of 2924 2156 danke.exe 97 PID 2156 wrote to memory of 2924 2156 danke.exe 97 PID 2924 wrote to memory of 4020 2924 cmd.exe 99 PID 2924 wrote to memory of 4020 2924 cmd.exe 99 PID 2924 wrote to memory of 4020 2924 cmd.exe 99 PID 2924 wrote to memory of 4284 2924 cmd.exe 100 PID 2924 wrote to memory of 4284 2924 cmd.exe 100 PID 2924 wrote to memory of 4284 2924 cmd.exe 100 PID 2924 wrote to memory of 1136 2924 cmd.exe 101 PID 2924 wrote to memory of 1136 2924 cmd.exe 101 PID 2924 wrote to memory of 1136 2924 cmd.exe 101 PID 2924 wrote to memory of 5008 2924 cmd.exe 102 PID 2924 wrote to memory of 5008 2924 cmd.exe 102 PID 2924 wrote to memory of 5008 2924 cmd.exe 102 PID 2924 wrote to memory of 2984 2924 cmd.exe 103 PID 2924 wrote to memory of 2984 2924 cmd.exe 103 PID 2924 wrote to memory of 2984 2924 cmd.exe 103 PID 2924 wrote to memory of 3956 2924 cmd.exe 104 PID 2924 wrote to memory of 3956 2924 cmd.exe 104 PID 2924 wrote to memory of 3956 2924 cmd.exe 104 PID 1300 wrote to memory of 4112 1300 d84ef9785152317da89e92b6629982e3449ff1f33fab527e6817bbbe0fbb83b2.exe 105 PID 1300 wrote to memory of 4112 1300 d84ef9785152317da89e92b6629982e3449ff1f33fab527e6817bbbe0fbb83b2.exe 105 PID 1300 wrote to memory of 4112 1300 d84ef9785152317da89e92b6629982e3449ff1f33fab527e6817bbbe0fbb83b2.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\d84ef9785152317da89e92b6629982e3449ff1f33fab527e6817bbbe0fbb83b2.exe"C:\Users\Admin\AppData\Local\Temp\d84ef9785152317da89e92b6629982e3449ff1f33fab527e6817bbbe0fbb83b2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4781796.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4781796.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2068715.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2068715.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4408603.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4408603.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4347562.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4347562.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F6⤵
- Creates scheduled task(s)
PID:1996
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4020
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:N"7⤵PID:4284
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:R" /E7⤵PID:1136
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:5008
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:N"7⤵PID:2984
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:R" /E7⤵PID:3956
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c4500302.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c4500302.exe3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:700
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9322098.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9322098.exe2⤵
- Executes dropped EXE
PID:4112
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
225KB
MD55c9b63f02a5a778bff756ec3c62f727d
SHA140ef9ab878eb19ecd44821009286ed90a5c848d8
SHA2566300b73e931453bb6472b15c35bf5657b55aa4ecbea944ba0d3d1d1642477e2f
SHA512cd7eff03867cb77c0f2e4128cfb9665236e195730abd67a7267b99cb1c7865cece95fd6e7a2a16dbedfb91aed2c72d264d24626edba38eb424b04c501b5a8965
-
Filesize
225KB
MD55c9b63f02a5a778bff756ec3c62f727d
SHA140ef9ab878eb19ecd44821009286ed90a5c848d8
SHA2566300b73e931453bb6472b15c35bf5657b55aa4ecbea944ba0d3d1d1642477e2f
SHA512cd7eff03867cb77c0f2e4128cfb9665236e195730abd67a7267b99cb1c7865cece95fd6e7a2a16dbedfb91aed2c72d264d24626edba38eb424b04c501b5a8965
-
Filesize
225KB
MD55c9b63f02a5a778bff756ec3c62f727d
SHA140ef9ab878eb19ecd44821009286ed90a5c848d8
SHA2566300b73e931453bb6472b15c35bf5657b55aa4ecbea944ba0d3d1d1642477e2f
SHA512cd7eff03867cb77c0f2e4128cfb9665236e195730abd67a7267b99cb1c7865cece95fd6e7a2a16dbedfb91aed2c72d264d24626edba38eb424b04c501b5a8965
-
Filesize
172KB
MD532fc5ff35c6ca6cd2f5b4858ecfad101
SHA16b5f0c0372ba7e469f8546f88647d27f712c746e
SHA2565ab415d8dbc41cab780bd18074b335087e27b89d4d8b8e19b1d1d4d14590cfb8
SHA5129faa92fa8dc262a05818b8f7beeed1deabed5750ba0dc4d53805fd72138ad3570bcf9c507c5d22904bcafc9471eea47578e61c40eaac5a5b38390608b4b1ab77
-
Filesize
172KB
MD532fc5ff35c6ca6cd2f5b4858ecfad101
SHA16b5f0c0372ba7e469f8546f88647d27f712c746e
SHA2565ab415d8dbc41cab780bd18074b335087e27b89d4d8b8e19b1d1d4d14590cfb8
SHA5129faa92fa8dc262a05818b8f7beeed1deabed5750ba0dc4d53805fd72138ad3570bcf9c507c5d22904bcafc9471eea47578e61c40eaac5a5b38390608b4b1ab77
-
Filesize
359KB
MD5a912f7962cf7f93b28f7f4473fef1b35
SHA1005d60d0eada4c11c472e7f42ad7df3fec575b4c
SHA25627051d6ec69f1c6dad992a6878a91857f396953d31f819f75760107f44a80b55
SHA51205541cd746ea31414e77fc27787dfa43393f12f33d1342b0acce1774602da7d02fce005fa2f8295cf87dd5bfb28a75840d8c5399d1971d822fbb3a709ee8da43
-
Filesize
359KB
MD5a912f7962cf7f93b28f7f4473fef1b35
SHA1005d60d0eada4c11c472e7f42ad7df3fec575b4c
SHA25627051d6ec69f1c6dad992a6878a91857f396953d31f819f75760107f44a80b55
SHA51205541cd746ea31414e77fc27787dfa43393f12f33d1342b0acce1774602da7d02fce005fa2f8295cf87dd5bfb28a75840d8c5399d1971d822fbb3a709ee8da43
-
Filesize
30KB
MD5cbc07c7e7ee6b932ccaf00a61b328bbe
SHA1d8048ea52f47c6a253f637dbee0ef69995159296
SHA256d3a28ed910c539f49cb2239a6b223b5fae7699346fb668dd489a82876eca216b
SHA51228b5291fb179a48f236f786c969401f67a9c479bee03056ca07786383f7a2193997396858a5583c1628d35daa81399539851678e21f1bde78bce46d9bba49bb7
-
Filesize
30KB
MD5cbc07c7e7ee6b932ccaf00a61b328bbe
SHA1d8048ea52f47c6a253f637dbee0ef69995159296
SHA256d3a28ed910c539f49cb2239a6b223b5fae7699346fb668dd489a82876eca216b
SHA51228b5291fb179a48f236f786c969401f67a9c479bee03056ca07786383f7a2193997396858a5583c1628d35daa81399539851678e21f1bde78bce46d9bba49bb7
-
Filesize
235KB
MD58dc758cfe7bd6bc240e9f676730d3b68
SHA12f1d5a6dcddef756fa2c7f414b0e4fd6fffec1c3
SHA25694cb76dff1aeabef9ad00bbd2c196d505734f2332f347d69077e9069d9048ec9
SHA512ce510fd072d02e55f54a96a8ff7f4f532af2444a2dc12b16437d1e94e3bdc26af5e4a371b7a99527246e637228315381b4914b3aa785f05bedbe8a2b36244bb8
-
Filesize
235KB
MD58dc758cfe7bd6bc240e9f676730d3b68
SHA12f1d5a6dcddef756fa2c7f414b0e4fd6fffec1c3
SHA25694cb76dff1aeabef9ad00bbd2c196d505734f2332f347d69077e9069d9048ec9
SHA512ce510fd072d02e55f54a96a8ff7f4f532af2444a2dc12b16437d1e94e3bdc26af5e4a371b7a99527246e637228315381b4914b3aa785f05bedbe8a2b36244bb8
-
Filesize
12KB
MD50be10b8a960de16117443d4d611eacb7
SHA1bdc3cb23bec765390dfb5018c2bc1454c5b94b6a
SHA256cadca287b061cd2f17afc82ad8ba7cf556e487ccff2e5d513c7206260757c0bd
SHA512801fd0a3d1b5ba176a58ca557492816e98877bcd343005d9f3b85f874d7a3f3548d4ff31f5353acd25539f964df6495b1b8c6f4afde3b96570bca7bfb429d387
-
Filesize
12KB
MD50be10b8a960de16117443d4d611eacb7
SHA1bdc3cb23bec765390dfb5018c2bc1454c5b94b6a
SHA256cadca287b061cd2f17afc82ad8ba7cf556e487ccff2e5d513c7206260757c0bd
SHA512801fd0a3d1b5ba176a58ca557492816e98877bcd343005d9f3b85f874d7a3f3548d4ff31f5353acd25539f964df6495b1b8c6f4afde3b96570bca7bfb429d387
-
Filesize
225KB
MD55c9b63f02a5a778bff756ec3c62f727d
SHA140ef9ab878eb19ecd44821009286ed90a5c848d8
SHA2566300b73e931453bb6472b15c35bf5657b55aa4ecbea944ba0d3d1d1642477e2f
SHA512cd7eff03867cb77c0f2e4128cfb9665236e195730abd67a7267b99cb1c7865cece95fd6e7a2a16dbedfb91aed2c72d264d24626edba38eb424b04c501b5a8965
-
Filesize
225KB
MD55c9b63f02a5a778bff756ec3c62f727d
SHA140ef9ab878eb19ecd44821009286ed90a5c848d8
SHA2566300b73e931453bb6472b15c35bf5657b55aa4ecbea944ba0d3d1d1642477e2f
SHA512cd7eff03867cb77c0f2e4128cfb9665236e195730abd67a7267b99cb1c7865cece95fd6e7a2a16dbedfb91aed2c72d264d24626edba38eb424b04c501b5a8965