Analysis

  • max time kernel
    151s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-08-2023 19:40

General

  • Target

    f1fc7864f1f39f640873d6318ff9bdb9d3bcc92947bc4f730735ce2d209fb06f.exe

  • Size

    642KB

  • MD5

    c8b2f68c48aeef74fda589c909a6a6f8

  • SHA1

    fa9a5aee7d858f0cb8224991e21e26f484ae0d8e

  • SHA256

    f1fc7864f1f39f640873d6318ff9bdb9d3bcc92947bc4f730735ce2d209fb06f

  • SHA512

    922606c4424af02f8532e78e37951e71e98e05e50ecaaccd191e6791427f78743a73379559f07065021e35fb851ed887fc80fdad5701627315d66558c3cd130e

  • SSDEEP

    12288:NMrFy90578Ek6nJZIS9070bcYnICThZ14bNTXbEaAP:wyU6EKSBcYICTqNTk

Malware Config

Extracted

Family

amadey

Version

3.86

C2

77.91.68.61/rock/index.php

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

maxik

C2

77.91.124.156:19071

Attributes
  • auth_value

    a7714e1bc167c67e3fc8f9e368352269

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1fc7864f1f39f640873d6318ff9bdb9d3bcc92947bc4f730735ce2d209fb06f.exe
    "C:\Users\Admin\AppData\Local\Temp\f1fc7864f1f39f640873d6318ff9bdb9d3bcc92947bc4f730735ce2d209fb06f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4996
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8790923.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8790923.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4464
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4944030.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4944030.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:864
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6967736.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6967736.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4008
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a4619967.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a4619967.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3696
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0454187.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0454187.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:552
            • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
              "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1472
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:4632
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2712
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:4820
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "pdates.exe" /P "Admin:N"
                    8⤵
                      PID:4816
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "pdates.exe" /P "Admin:R" /E
                      8⤵
                        PID:4556
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:1228
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\925e7e99c5" /P "Admin:N"
                          8⤵
                            PID:2776
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\925e7e99c5" /P "Admin:R" /E
                            8⤵
                              PID:3108
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:2792
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1728175.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1728175.exe
                      4⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: MapViewOfSection
                      PID:3752
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d1603547.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d1603547.exe
                    3⤵
                    • Executes dropped EXE
                    PID:2200
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:2492
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:5108

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                231KB

                MD5

                8e85ad0e2601a6cc8f319cf2707f1bee

                SHA1

                dee4dc89eb7499048afb4dc7cc332690b8945bc3

                SHA256

                9c989e54f88e9c6b2ee6c329d7a31e1f4985ec2e652e288643f4cc5e63efd288

                SHA512

                dc99e3e8a61b15f1cac6f6e3e5a2153335791c19882f21bd919da0283d85342b413f712e6a889011fa61ca850304e28a2283d2205cd4e20ff31cf0888d7a9242

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                231KB

                MD5

                8e85ad0e2601a6cc8f319cf2707f1bee

                SHA1

                dee4dc89eb7499048afb4dc7cc332690b8945bc3

                SHA256

                9c989e54f88e9c6b2ee6c329d7a31e1f4985ec2e652e288643f4cc5e63efd288

                SHA512

                dc99e3e8a61b15f1cac6f6e3e5a2153335791c19882f21bd919da0283d85342b413f712e6a889011fa61ca850304e28a2283d2205cd4e20ff31cf0888d7a9242

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                231KB

                MD5

                8e85ad0e2601a6cc8f319cf2707f1bee

                SHA1

                dee4dc89eb7499048afb4dc7cc332690b8945bc3

                SHA256

                9c989e54f88e9c6b2ee6c329d7a31e1f4985ec2e652e288643f4cc5e63efd288

                SHA512

                dc99e3e8a61b15f1cac6f6e3e5a2153335791c19882f21bd919da0283d85342b413f712e6a889011fa61ca850304e28a2283d2205cd4e20ff31cf0888d7a9242

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                231KB

                MD5

                8e85ad0e2601a6cc8f319cf2707f1bee

                SHA1

                dee4dc89eb7499048afb4dc7cc332690b8945bc3

                SHA256

                9c989e54f88e9c6b2ee6c329d7a31e1f4985ec2e652e288643f4cc5e63efd288

                SHA512

                dc99e3e8a61b15f1cac6f6e3e5a2153335791c19882f21bd919da0283d85342b413f712e6a889011fa61ca850304e28a2283d2205cd4e20ff31cf0888d7a9242

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                231KB

                MD5

                8e85ad0e2601a6cc8f319cf2707f1bee

                SHA1

                dee4dc89eb7499048afb4dc7cc332690b8945bc3

                SHA256

                9c989e54f88e9c6b2ee6c329d7a31e1f4985ec2e652e288643f4cc5e63efd288

                SHA512

                dc99e3e8a61b15f1cac6f6e3e5a2153335791c19882f21bd919da0283d85342b413f712e6a889011fa61ca850304e28a2283d2205cd4e20ff31cf0888d7a9242

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8790923.exe

                Filesize

                514KB

                MD5

                1ef96117ae276cc36ca0dd2070e29bf3

                SHA1

                e63147ba8026ea8a1c691881e36bd01808b94161

                SHA256

                690f699fb4bea17c13440b65b9f68f03528159d7177f6238b4900e070d9e353c

                SHA512

                25be999779adb441c9270ad66c9e8ba930eb626ba130dda277a7fc11f3aed589a9e6394be95f4d5ab957fb76b5c054d29b5f6e5c41a63081c71c825acb346519

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8790923.exe

                Filesize

                514KB

                MD5

                1ef96117ae276cc36ca0dd2070e29bf3

                SHA1

                e63147ba8026ea8a1c691881e36bd01808b94161

                SHA256

                690f699fb4bea17c13440b65b9f68f03528159d7177f6238b4900e070d9e353c

                SHA512

                25be999779adb441c9270ad66c9e8ba930eb626ba130dda277a7fc11f3aed589a9e6394be95f4d5ab957fb76b5c054d29b5f6e5c41a63081c71c825acb346519

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d1603547.exe

                Filesize

                174KB

                MD5

                f7641c28c3c4fbab1423fa51df559590

                SHA1

                608d9956d93e14fd8279f4bbbea62fe3fbc59410

                SHA256

                c52474743b4cb37803d59031f9bc29c571e21c6038c1c9c399d7dd0877d6559d

                SHA512

                b2c82149d6a10dc80749e19eafd46f0779d838838494a3dc00956d7893950c7eeb6c408806a5406e48eaacadeb0ddf3c3840df7f97f0b47ef744026efacc6ad7

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d1603547.exe

                Filesize

                174KB

                MD5

                f7641c28c3c4fbab1423fa51df559590

                SHA1

                608d9956d93e14fd8279f4bbbea62fe3fbc59410

                SHA256

                c52474743b4cb37803d59031f9bc29c571e21c6038c1c9c399d7dd0877d6559d

                SHA512

                b2c82149d6a10dc80749e19eafd46f0779d838838494a3dc00956d7893950c7eeb6c408806a5406e48eaacadeb0ddf3c3840df7f97f0b47ef744026efacc6ad7

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4944030.exe

                Filesize

                359KB

                MD5

                e262fca84d3ace91706efdbfe1e98cfc

                SHA1

                5c9d0bba7daf4f4cc0637b36a4769c14823c90f2

                SHA256

                7d05d9b57622de44cf09d61dad9c9761613a5338aeb8a135a5d6e1268e8a69e5

                SHA512

                750fa72a622b64674dfd039cd2c075830dd8cc95b8470b3734f4df887125d52a3b554c00c6b48d626caacf1ce291317656d3ea0879eab1907b6289b91b7d285c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4944030.exe

                Filesize

                359KB

                MD5

                e262fca84d3ace91706efdbfe1e98cfc

                SHA1

                5c9d0bba7daf4f4cc0637b36a4769c14823c90f2

                SHA256

                7d05d9b57622de44cf09d61dad9c9761613a5338aeb8a135a5d6e1268e8a69e5

                SHA512

                750fa72a622b64674dfd039cd2c075830dd8cc95b8470b3734f4df887125d52a3b554c00c6b48d626caacf1ce291317656d3ea0879eab1907b6289b91b7d285c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1728175.exe

                Filesize

                39KB

                MD5

                2d2a590bc28ac514a592dd7a9f1c1935

                SHA1

                3c6b897f54f4e8404023997ba218c5b6ca7a77be

                SHA256

                2994553c32d95f5ef3a29ac5d8b75f20536749b3859ab78ce5c5c8201ed83bda

                SHA512

                b17a5a821f83da0689a4b2df49079f4f85b0ec2e13ccc6da2f96ac87419cad4e347e729332b72b26242f2020d4fe65187e61c9ea51eb1cac120c4b6993b99a5c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1728175.exe

                Filesize

                39KB

                MD5

                2d2a590bc28ac514a592dd7a9f1c1935

                SHA1

                3c6b897f54f4e8404023997ba218c5b6ca7a77be

                SHA256

                2994553c32d95f5ef3a29ac5d8b75f20536749b3859ab78ce5c5c8201ed83bda

                SHA512

                b17a5a821f83da0689a4b2df49079f4f85b0ec2e13ccc6da2f96ac87419cad4e347e729332b72b26242f2020d4fe65187e61c9ea51eb1cac120c4b6993b99a5c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6967736.exe

                Filesize

                234KB

                MD5

                fa91e9482a47b5cf5449d2359293a8c8

                SHA1

                228dfefdaaa1e0663d48eb6c232b15f740d4feca

                SHA256

                cb1c160bafb992ac52cb3d2a51da675344a07f5affb716948ba4e822b9da2296

                SHA512

                52d33fedac13f3af75a0e230c2d2719a56b7e348ce24232c397c6d03d1a1312e2818f88bc10594fbfdfde4f278f1f3693970256bee25655d3ac5540b518b795f

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6967736.exe

                Filesize

                234KB

                MD5

                fa91e9482a47b5cf5449d2359293a8c8

                SHA1

                228dfefdaaa1e0663d48eb6c232b15f740d4feca

                SHA256

                cb1c160bafb992ac52cb3d2a51da675344a07f5affb716948ba4e822b9da2296

                SHA512

                52d33fedac13f3af75a0e230c2d2719a56b7e348ce24232c397c6d03d1a1312e2818f88bc10594fbfdfde4f278f1f3693970256bee25655d3ac5540b518b795f

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a4619967.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a4619967.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0454187.exe

                Filesize

                231KB

                MD5

                8e85ad0e2601a6cc8f319cf2707f1bee

                SHA1

                dee4dc89eb7499048afb4dc7cc332690b8945bc3

                SHA256

                9c989e54f88e9c6b2ee6c329d7a31e1f4985ec2e652e288643f4cc5e63efd288

                SHA512

                dc99e3e8a61b15f1cac6f6e3e5a2153335791c19882f21bd919da0283d85342b413f712e6a889011fa61ca850304e28a2283d2205cd4e20ff31cf0888d7a9242

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0454187.exe

                Filesize

                231KB

                MD5

                8e85ad0e2601a6cc8f319cf2707f1bee

                SHA1

                dee4dc89eb7499048afb4dc7cc332690b8945bc3

                SHA256

                9c989e54f88e9c6b2ee6c329d7a31e1f4985ec2e652e288643f4cc5e63efd288

                SHA512

                dc99e3e8a61b15f1cac6f6e3e5a2153335791c19882f21bd919da0283d85342b413f712e6a889011fa61ca850304e28a2283d2205cd4e20ff31cf0888d7a9242

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                9851b884bf4aadfade57d911a3f03332

                SHA1

                aaadd1c1856c22844bb9fbb030cf4f586ed8866a

                SHA256

                03afb988f3eec62c2da682af371625adcac5a0e69615298f83d99365ab07ac0f

                SHA512

                a7de560f51bacd381d3e741f887c3c40ece88521ee93a22a4f7448297e8bda2131be866d9ae6438c528d9f40a277c18bae517deec16b6b723f67d4c308031327

              • memory/2200-194-0x0000000005530000-0x0000000005540000-memory.dmp

                Filesize

                64KB

              • memory/2200-196-0x00000000732C0000-0x0000000073A70000-memory.dmp

                Filesize

                7.7MB

              • memory/2200-191-0x000000000B0E0000-0x000000000B6F8000-memory.dmp

                Filesize

                6.1MB

              • memory/2200-192-0x000000000ABD0000-0x000000000ACDA000-memory.dmp

                Filesize

                1.0MB

              • memory/2200-189-0x0000000000BD0000-0x0000000000C00000-memory.dmp

                Filesize

                192KB

              • memory/2200-193-0x000000000AAC0000-0x000000000AAD2000-memory.dmp

                Filesize

                72KB

              • memory/2200-195-0x000000000AB20000-0x000000000AB5C000-memory.dmp

                Filesize

                240KB

              • memory/2200-190-0x00000000732C0000-0x0000000073A70000-memory.dmp

                Filesize

                7.7MB

              • memory/2200-197-0x0000000005530000-0x0000000005540000-memory.dmp

                Filesize

                64KB

              • memory/3128-182-0x0000000002F70000-0x0000000002F86000-memory.dmp

                Filesize

                88KB

              • memory/3696-164-0x00007FFFD4000000-0x00007FFFD4AC1000-memory.dmp

                Filesize

                10.8MB

              • memory/3696-162-0x00007FFFD4000000-0x00007FFFD4AC1000-memory.dmp

                Filesize

                10.8MB

              • memory/3696-161-0x00000000008B0000-0x00000000008BA000-memory.dmp

                Filesize

                40KB

              • memory/3752-183-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/3752-180-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB