Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02/08/2023, 09:16

General

  • Target

    adba51f22513fb57acc5db101db8186a7ed102f61f58c627dd583d330f0ebfc4.exe

  • Size

    641KB

  • MD5

    14a15b2421e04572f5e42fb3ad8119a9

  • SHA1

    af92f4faf7cc4639180db684a97d784d13f53336

  • SHA256

    adba51f22513fb57acc5db101db8186a7ed102f61f58c627dd583d330f0ebfc4

  • SHA512

    9a8f237bfc3b1f604068ddecbe135e519c4bbca38ea3c966dc17ee9238f75b45dcb2312efc1681531afaf45d18e526750bbe29a60f3cbb8962d52cc57a81e7a2

  • SSDEEP

    12288:mMrxy90C6kmAelcbILFDKaz+9+hjhWJnp0j3HRfSkxWWiMgO6:Xyv6PAXILFDXz1hjAARSiW9Mp6

Malware Config

Extracted

Family

amadey

Version

3.86

C2

77.91.68.61/rock/index.php

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

maxik

C2

77.91.124.156:19071

Attributes
  • auth_value

    a7714e1bc167c67e3fc8f9e368352269

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\adba51f22513fb57acc5db101db8186a7ed102f61f58c627dd583d330f0ebfc4.exe
    "C:\Users\Admin\AppData\Local\Temp\adba51f22513fb57acc5db101db8186a7ed102f61f58c627dd583d330f0ebfc4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3188
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4767106.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4767106.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5100
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5335322.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5335322.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4524
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7138741.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7138741.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:492
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1972776.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1972776.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3000
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6411510.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6411510.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:320
            • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
              "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2132
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:316
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2004
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:4204
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "pdates.exe" /P "Admin:N"
                    8⤵
                      PID:2848
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "pdates.exe" /P "Admin:R" /E
                      8⤵
                        PID:5104
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:3888
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\925e7e99c5" /P "Admin:N"
                          8⤵
                            PID:3692
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\925e7e99c5" /P "Admin:R" /E
                            8⤵
                              PID:5060
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:4368
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8420170.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8420170.exe
                      4⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: MapViewOfSection
                      PID:4908
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d5882091.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d5882091.exe
                    3⤵
                    • Executes dropped EXE
                    PID:1716
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:2016
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:3200

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                230KB

                MD5

                991d3e3c767e709b3b415fc591217ef9

                SHA1

                51cf39b05ee704e790661faa6477128ab2e9abbf

                SHA256

                28cbf635593311ef8c67cb3a8f9fc740dcaadcb6e921c338fd64f696aab69985

                SHA512

                2b88d7d074b5332f6018555289367bf708fb32162ba1f2a8fff4f92ddcd3f12b97f5a0655616d7291c800ad7d6ae670857d5e8c2b8b7632846dd86b0fe49d221

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                230KB

                MD5

                991d3e3c767e709b3b415fc591217ef9

                SHA1

                51cf39b05ee704e790661faa6477128ab2e9abbf

                SHA256

                28cbf635593311ef8c67cb3a8f9fc740dcaadcb6e921c338fd64f696aab69985

                SHA512

                2b88d7d074b5332f6018555289367bf708fb32162ba1f2a8fff4f92ddcd3f12b97f5a0655616d7291c800ad7d6ae670857d5e8c2b8b7632846dd86b0fe49d221

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                230KB

                MD5

                991d3e3c767e709b3b415fc591217ef9

                SHA1

                51cf39b05ee704e790661faa6477128ab2e9abbf

                SHA256

                28cbf635593311ef8c67cb3a8f9fc740dcaadcb6e921c338fd64f696aab69985

                SHA512

                2b88d7d074b5332f6018555289367bf708fb32162ba1f2a8fff4f92ddcd3f12b97f5a0655616d7291c800ad7d6ae670857d5e8c2b8b7632846dd86b0fe49d221

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                230KB

                MD5

                991d3e3c767e709b3b415fc591217ef9

                SHA1

                51cf39b05ee704e790661faa6477128ab2e9abbf

                SHA256

                28cbf635593311ef8c67cb3a8f9fc740dcaadcb6e921c338fd64f696aab69985

                SHA512

                2b88d7d074b5332f6018555289367bf708fb32162ba1f2a8fff4f92ddcd3f12b97f5a0655616d7291c800ad7d6ae670857d5e8c2b8b7632846dd86b0fe49d221

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                230KB

                MD5

                991d3e3c767e709b3b415fc591217ef9

                SHA1

                51cf39b05ee704e790661faa6477128ab2e9abbf

                SHA256

                28cbf635593311ef8c67cb3a8f9fc740dcaadcb6e921c338fd64f696aab69985

                SHA512

                2b88d7d074b5332f6018555289367bf708fb32162ba1f2a8fff4f92ddcd3f12b97f5a0655616d7291c800ad7d6ae670857d5e8c2b8b7632846dd86b0fe49d221

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4767106.exe

                Filesize

                515KB

                MD5

                aa164c9a48194775dae5fe0ef57a06bb

                SHA1

                1cf75be4a44968bb5974022dceca0ca0c1767375

                SHA256

                7443750fa97a527aa1bdd8ce5c02ab69133f265497f7355ce64f53d30ee2f7b4

                SHA512

                9e517c7ae2f5d29c8b2deb8b8ac3abbdb4e61616fa1f45de5954f1574aaad005149ff86fa930a074b6a597814a0e6c27dd300c34b2180170c356bb8c37eede5d

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4767106.exe

                Filesize

                515KB

                MD5

                aa164c9a48194775dae5fe0ef57a06bb

                SHA1

                1cf75be4a44968bb5974022dceca0ca0c1767375

                SHA256

                7443750fa97a527aa1bdd8ce5c02ab69133f265497f7355ce64f53d30ee2f7b4

                SHA512

                9e517c7ae2f5d29c8b2deb8b8ac3abbdb4e61616fa1f45de5954f1574aaad005149ff86fa930a074b6a597814a0e6c27dd300c34b2180170c356bb8c37eede5d

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d5882091.exe

                Filesize

                174KB

                MD5

                8ed0b13b021ce97cc2c23648186acc1c

                SHA1

                5471129cd42f6ba9d13c99b6e24ea82f0c619494

                SHA256

                8d299656acdcb58b73826022dde3a8b8ae23a5e113e9df986a1673b0d535453a

                SHA512

                5853c3f337fd8bb2ebd57b60f4c297738f359b2983200a47e6f92ab66735a0a8fea35e900fabfa23d58dcf12ec355a8c780baa9204ddc32f19b57eea5efde79c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d5882091.exe

                Filesize

                174KB

                MD5

                8ed0b13b021ce97cc2c23648186acc1c

                SHA1

                5471129cd42f6ba9d13c99b6e24ea82f0c619494

                SHA256

                8d299656acdcb58b73826022dde3a8b8ae23a5e113e9df986a1673b0d535453a

                SHA512

                5853c3f337fd8bb2ebd57b60f4c297738f359b2983200a47e6f92ab66735a0a8fea35e900fabfa23d58dcf12ec355a8c780baa9204ddc32f19b57eea5efde79c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5335322.exe

                Filesize

                359KB

                MD5

                a91603e7207e0247e906cf56b2f29f3c

                SHA1

                1818de57e676fd628168c4bdd9082f87a2b3f4a5

                SHA256

                bea15cbd1c3a067e9814c55be4062afb42f237778da57e2bea29720d20411d8d

                SHA512

                ef8c62b6762fc6d69e987e0b5c788b70bf44c0e7a55665ef48523ec8b5076d858d231f258360d3b7a5e4e0143ae1c914a7e7c217da26256734267f106c371e61

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5335322.exe

                Filesize

                359KB

                MD5

                a91603e7207e0247e906cf56b2f29f3c

                SHA1

                1818de57e676fd628168c4bdd9082f87a2b3f4a5

                SHA256

                bea15cbd1c3a067e9814c55be4062afb42f237778da57e2bea29720d20411d8d

                SHA512

                ef8c62b6762fc6d69e987e0b5c788b70bf44c0e7a55665ef48523ec8b5076d858d231f258360d3b7a5e4e0143ae1c914a7e7c217da26256734267f106c371e61

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8420170.exe

                Filesize

                39KB

                MD5

                f1d5011026de20caebb382f2d8dab0b7

                SHA1

                e8635e551469954f3d562b86b4d23eba5d455f37

                SHA256

                547f20fd0694aaccf4a920199ab641d92cb7175881ba283b04dfab4d738630cb

                SHA512

                086cd88bb623163cb08fb902cba84aa30301f8964f718093701b8224bcb974a08067422de3a0b059eabfbbe952c7e149e822319d890d05d12611078745bfd57d

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8420170.exe

                Filesize

                39KB

                MD5

                f1d5011026de20caebb382f2d8dab0b7

                SHA1

                e8635e551469954f3d562b86b4d23eba5d455f37

                SHA256

                547f20fd0694aaccf4a920199ab641d92cb7175881ba283b04dfab4d738630cb

                SHA512

                086cd88bb623163cb08fb902cba84aa30301f8964f718093701b8224bcb974a08067422de3a0b059eabfbbe952c7e149e822319d890d05d12611078745bfd57d

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7138741.exe

                Filesize

                234KB

                MD5

                df57b4f0176f16564f982880eb296742

                SHA1

                65adbc42f8077553d8c3e3bd5330377d9aecc86e

                SHA256

                8ee9beb6c9020ee8fd94a93927441c61f309a4f982cacab63ad9208b323be948

                SHA512

                ba249e2911b25b7c4b4d2efa1a0da2fc9ff1763cc4532ff1d08b4dd8b2dde05cfbf6bccc4b78113173b814dc3204480421dc4a077bdc7745aab400b39853373e

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7138741.exe

                Filesize

                234KB

                MD5

                df57b4f0176f16564f982880eb296742

                SHA1

                65adbc42f8077553d8c3e3bd5330377d9aecc86e

                SHA256

                8ee9beb6c9020ee8fd94a93927441c61f309a4f982cacab63ad9208b323be948

                SHA512

                ba249e2911b25b7c4b4d2efa1a0da2fc9ff1763cc4532ff1d08b4dd8b2dde05cfbf6bccc4b78113173b814dc3204480421dc4a077bdc7745aab400b39853373e

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1972776.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1972776.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6411510.exe

                Filesize

                230KB

                MD5

                991d3e3c767e709b3b415fc591217ef9

                SHA1

                51cf39b05ee704e790661faa6477128ab2e9abbf

                SHA256

                28cbf635593311ef8c67cb3a8f9fc740dcaadcb6e921c338fd64f696aab69985

                SHA512

                2b88d7d074b5332f6018555289367bf708fb32162ba1f2a8fff4f92ddcd3f12b97f5a0655616d7291c800ad7d6ae670857d5e8c2b8b7632846dd86b0fe49d221

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6411510.exe

                Filesize

                230KB

                MD5

                991d3e3c767e709b3b415fc591217ef9

                SHA1

                51cf39b05ee704e790661faa6477128ab2e9abbf

                SHA256

                28cbf635593311ef8c67cb3a8f9fc740dcaadcb6e921c338fd64f696aab69985

                SHA512

                2b88d7d074b5332f6018555289367bf708fb32162ba1f2a8fff4f92ddcd3f12b97f5a0655616d7291c800ad7d6ae670857d5e8c2b8b7632846dd86b0fe49d221

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                9851b884bf4aadfade57d911a3f03332

                SHA1

                aaadd1c1856c22844bb9fbb030cf4f586ed8866a

                SHA256

                03afb988f3eec62c2da682af371625adcac5a0e69615298f83d99365ab07ac0f

                SHA512

                a7de560f51bacd381d3e741f887c3c40ece88521ee93a22a4f7448297e8bda2131be866d9ae6438c528d9f40a277c18bae517deec16b6b723f67d4c308031327

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • memory/1716-177-0x000000000A080000-0x000000000A18A000-memory.dmp

                Filesize

                1.0MB

              • memory/1716-180-0x000000000A190000-0x000000000A1DB000-memory.dmp

                Filesize

                300KB

              • memory/1716-175-0x0000000002400000-0x0000000002406000-memory.dmp

                Filesize

                24KB

              • memory/1716-176-0x000000000A520000-0x000000000AB26000-memory.dmp

                Filesize

                6.0MB

              • memory/1716-173-0x0000000000270000-0x00000000002A0000-memory.dmp

                Filesize

                192KB

              • memory/1716-178-0x0000000009FB0000-0x0000000009FC2000-memory.dmp

                Filesize

                72KB

              • memory/1716-179-0x000000000A010000-0x000000000A04E000-memory.dmp

                Filesize

                248KB

              • memory/1716-174-0x0000000071990000-0x000000007207E000-memory.dmp

                Filesize

                6.9MB

              • memory/1716-181-0x0000000071990000-0x000000007207E000-memory.dmp

                Filesize

                6.9MB

              • memory/3000-151-0x00007FF92CD60000-0x00007FF92D74C000-memory.dmp

                Filesize

                9.9MB

              • memory/3000-149-0x00007FF92CD60000-0x00007FF92D74C000-memory.dmp

                Filesize

                9.9MB

              • memory/3000-148-0x0000000000780000-0x000000000078A000-memory.dmp

                Filesize

                40KB

              • memory/3148-166-0x0000000000F80000-0x0000000000F96000-memory.dmp

                Filesize

                88KB

              • memory/4908-168-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/4908-164-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB