Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/08/2023, 10:20

General

  • Target

    491f9531f4b705935524e1d8a6be07eff285c18f1fc2d58c3a575e4743ef3ca1.exe

  • Size

    680KB

  • MD5

    9d945f04997d61742a7d751749fdf5ed

  • SHA1

    ce186b435eb6ed90f9640ea7c6742eddaca07489

  • SHA256

    491f9531f4b705935524e1d8a6be07eff285c18f1fc2d58c3a575e4743ef3ca1

  • SHA512

    61ca2720b23e70834936308f3021c4109071ac30fe3d25adcdacd566aa5d06465c8a33b072f2bce413c3cc457f9e96746b3900098c858e3aabca6d09cc055c3b

  • SSDEEP

    12288:XMrZy90vbVqXPfNExO6vXlyurBK/iXg8ZfojHduL/sWwsp:2yWsp6vVd1K/irfUEL6sp

Malware Config

Extracted

Family

amadey

Version

3.86

C2

77.91.68.61/rock/index.php

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

maxik

C2

77.91.124.156:19071

Attributes
  • auth_value

    a7714e1bc167c67e3fc8f9e368352269

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\491f9531f4b705935524e1d8a6be07eff285c18f1fc2d58c3a575e4743ef3ca1.exe
    "C:\Users\Admin\AppData\Local\Temp\491f9531f4b705935524e1d8a6be07eff285c18f1fc2d58c3a575e4743ef3ca1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2304
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6744428.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6744428.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1576
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8012460.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8012460.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2196
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5999639.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5999639.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4732
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5653534.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5653534.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2560
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4272762.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4272762.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:2892
            • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
              "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1288
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:4972
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1720
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:684
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "pdates.exe" /P "Admin:N"
                    8⤵
                      PID:1156
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "pdates.exe" /P "Admin:R" /E
                      8⤵
                        PID:2616
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:3620
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\925e7e99c5" /P "Admin:N"
                          8⤵
                            PID:2252
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\925e7e99c5" /P "Admin:R" /E
                            8⤵
                              PID:4616
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:1472
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2034727.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2034727.exe
                      4⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: MapViewOfSection
                      PID:3344
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d6440780.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d6440780.exe
                    3⤵
                    • Executes dropped EXE
                    PID:3780
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:4080
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe start wuauserv
                1⤵
                • Launches sc.exe
                PID:2844
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:3452

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                231KB

                MD5

                f16e10e17d1fe49fd10f4105e57a3862

                SHA1

                1ff748e72f864449e93462957d300dfa902b32c8

                SHA256

                8aedfc31b99a06bc93064004a1077d71765e120d0832bc2c69c64ce62451d7c9

                SHA512

                9b8a1ee9d16c647718358996d32b73d98fa9e1ed52e2782d51d1c8a3d8e00613167a3d5782eca85ed2823b2e1d01d297721dc44acaf0235ced532fd11d2c68c2

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                231KB

                MD5

                f16e10e17d1fe49fd10f4105e57a3862

                SHA1

                1ff748e72f864449e93462957d300dfa902b32c8

                SHA256

                8aedfc31b99a06bc93064004a1077d71765e120d0832bc2c69c64ce62451d7c9

                SHA512

                9b8a1ee9d16c647718358996d32b73d98fa9e1ed52e2782d51d1c8a3d8e00613167a3d5782eca85ed2823b2e1d01d297721dc44acaf0235ced532fd11d2c68c2

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                231KB

                MD5

                f16e10e17d1fe49fd10f4105e57a3862

                SHA1

                1ff748e72f864449e93462957d300dfa902b32c8

                SHA256

                8aedfc31b99a06bc93064004a1077d71765e120d0832bc2c69c64ce62451d7c9

                SHA512

                9b8a1ee9d16c647718358996d32b73d98fa9e1ed52e2782d51d1c8a3d8e00613167a3d5782eca85ed2823b2e1d01d297721dc44acaf0235ced532fd11d2c68c2

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                231KB

                MD5

                f16e10e17d1fe49fd10f4105e57a3862

                SHA1

                1ff748e72f864449e93462957d300dfa902b32c8

                SHA256

                8aedfc31b99a06bc93064004a1077d71765e120d0832bc2c69c64ce62451d7c9

                SHA512

                9b8a1ee9d16c647718358996d32b73d98fa9e1ed52e2782d51d1c8a3d8e00613167a3d5782eca85ed2823b2e1d01d297721dc44acaf0235ced532fd11d2c68c2

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                231KB

                MD5

                f16e10e17d1fe49fd10f4105e57a3862

                SHA1

                1ff748e72f864449e93462957d300dfa902b32c8

                SHA256

                8aedfc31b99a06bc93064004a1077d71765e120d0832bc2c69c64ce62451d7c9

                SHA512

                9b8a1ee9d16c647718358996d32b73d98fa9e1ed52e2782d51d1c8a3d8e00613167a3d5782eca85ed2823b2e1d01d297721dc44acaf0235ced532fd11d2c68c2

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6744428.exe

                Filesize

                514KB

                MD5

                48dfcea016b73be6a62a6759ff350ccd

                SHA1

                b6222bb7c8ad3b73e024d8346bbd1b5784cd266d

                SHA256

                87ce9e7e0c77fc10fc85de5d4a24cc5148f7b384162103bc52b2070a43f03caf

                SHA512

                ebdfeba060106c82c865e5d6790d1bb9f669b110d9b5da96d4010499ffc18491aeb9d0c782612fa9be74cfe1df430690e9dd543567536ac615e0c23b4d6d9fdd

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6744428.exe

                Filesize

                514KB

                MD5

                48dfcea016b73be6a62a6759ff350ccd

                SHA1

                b6222bb7c8ad3b73e024d8346bbd1b5784cd266d

                SHA256

                87ce9e7e0c77fc10fc85de5d4a24cc5148f7b384162103bc52b2070a43f03caf

                SHA512

                ebdfeba060106c82c865e5d6790d1bb9f669b110d9b5da96d4010499ffc18491aeb9d0c782612fa9be74cfe1df430690e9dd543567536ac615e0c23b4d6d9fdd

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d6440780.exe

                Filesize

                175KB

                MD5

                7b3c87945766ea20c8d6818b0debbac8

                SHA1

                1eaffe65f6030878032c49e99b67ea4b32ed567d

                SHA256

                c3b628501b989f2beba07abca7fac8edb2600c68134063e736ec88e120e7369b

                SHA512

                6dee75505e500d93cb453d69887056009540a1ccf094483afd69aab0f914315fd60095afbca26237cf4dee0d5eac5440d298ce977da2e03072a743c104d951da

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d6440780.exe

                Filesize

                175KB

                MD5

                7b3c87945766ea20c8d6818b0debbac8

                SHA1

                1eaffe65f6030878032c49e99b67ea4b32ed567d

                SHA256

                c3b628501b989f2beba07abca7fac8edb2600c68134063e736ec88e120e7369b

                SHA512

                6dee75505e500d93cb453d69887056009540a1ccf094483afd69aab0f914315fd60095afbca26237cf4dee0d5eac5440d298ce977da2e03072a743c104d951da

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8012460.exe

                Filesize

                359KB

                MD5

                22fca5fd0ae188f881237fb0ef105032

                SHA1

                9d421bb98bb4a5d6e4edf81995e45c981a3d5487

                SHA256

                6045866afb6a34515074fb8f1d67362105a4d0a281bf6f05c0b335de66947f30

                SHA512

                dd0598e8b07d71c45ca6788e2dcad309688cc6c5169fc92d937c5e7d32f28b8bb48e726db490f536913b53cac8c108b3d18511b0025c6e046e99b913d2c5e42b

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8012460.exe

                Filesize

                359KB

                MD5

                22fca5fd0ae188f881237fb0ef105032

                SHA1

                9d421bb98bb4a5d6e4edf81995e45c981a3d5487

                SHA256

                6045866afb6a34515074fb8f1d67362105a4d0a281bf6f05c0b335de66947f30

                SHA512

                dd0598e8b07d71c45ca6788e2dcad309688cc6c5169fc92d937c5e7d32f28b8bb48e726db490f536913b53cac8c108b3d18511b0025c6e046e99b913d2c5e42b

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2034727.exe

                Filesize

                39KB

                MD5

                216dcbd9f7e9153e8781d7e2bcf0dc5b

                SHA1

                361724e83dfd8c9271578bcef05758308065697b

                SHA256

                766ebbb71147af0339d5e7de327be38af24bc8c0d3269ca46f2d733a7652804e

                SHA512

                250ac95559febdb1600e79e4a79bd4e6b63b666583d310b75b4632a8c373b77c41f71cae8f78332cc13aab6cbb30344198408b960d3b0f2243248b29262a30d4

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2034727.exe

                Filesize

                39KB

                MD5

                216dcbd9f7e9153e8781d7e2bcf0dc5b

                SHA1

                361724e83dfd8c9271578bcef05758308065697b

                SHA256

                766ebbb71147af0339d5e7de327be38af24bc8c0d3269ca46f2d733a7652804e

                SHA512

                250ac95559febdb1600e79e4a79bd4e6b63b666583d310b75b4632a8c373b77c41f71cae8f78332cc13aab6cbb30344198408b960d3b0f2243248b29262a30d4

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5999639.exe

                Filesize

                234KB

                MD5

                74acf9fbda4af85733ccbfc30050a875

                SHA1

                49ddecf2daf132e6bb9f16876668e41dfc5df69d

                SHA256

                19fce63445599a037ed00b4af99bc0478108e1c97c4087b76aaae00688cbd802

                SHA512

                a0950c57e3183b658dec613d120c036660e05a59afb1a92510791b279070e44a75c2caa09f27c77f2b3b0ac425094e8905965f93292c6a4489163687d5d47090

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5999639.exe

                Filesize

                234KB

                MD5

                74acf9fbda4af85733ccbfc30050a875

                SHA1

                49ddecf2daf132e6bb9f16876668e41dfc5df69d

                SHA256

                19fce63445599a037ed00b4af99bc0478108e1c97c4087b76aaae00688cbd802

                SHA512

                a0950c57e3183b658dec613d120c036660e05a59afb1a92510791b279070e44a75c2caa09f27c77f2b3b0ac425094e8905965f93292c6a4489163687d5d47090

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5653534.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5653534.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4272762.exe

                Filesize

                231KB

                MD5

                f16e10e17d1fe49fd10f4105e57a3862

                SHA1

                1ff748e72f864449e93462957d300dfa902b32c8

                SHA256

                8aedfc31b99a06bc93064004a1077d71765e120d0832bc2c69c64ce62451d7c9

                SHA512

                9b8a1ee9d16c647718358996d32b73d98fa9e1ed52e2782d51d1c8a3d8e00613167a3d5782eca85ed2823b2e1d01d297721dc44acaf0235ced532fd11d2c68c2

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4272762.exe

                Filesize

                231KB

                MD5

                f16e10e17d1fe49fd10f4105e57a3862

                SHA1

                1ff748e72f864449e93462957d300dfa902b32c8

                SHA256

                8aedfc31b99a06bc93064004a1077d71765e120d0832bc2c69c64ce62451d7c9

                SHA512

                9b8a1ee9d16c647718358996d32b73d98fa9e1ed52e2782d51d1c8a3d8e00613167a3d5782eca85ed2823b2e1d01d297721dc44acaf0235ced532fd11d2c68c2

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                9851b884bf4aadfade57d911a3f03332

                SHA1

                aaadd1c1856c22844bb9fbb030cf4f586ed8866a

                SHA256

                03afb988f3eec62c2da682af371625adcac5a0e69615298f83d99365ab07ac0f

                SHA512

                a7de560f51bacd381d3e741f887c3c40ece88521ee93a22a4f7448297e8bda2131be866d9ae6438c528d9f40a277c18bae517deec16b6b723f67d4c308031327

              • memory/2560-164-0x00007FFE012E0000-0x00007FFE01DA1000-memory.dmp

                Filesize

                10.8MB

              • memory/2560-162-0x00007FFE012E0000-0x00007FFE01DA1000-memory.dmp

                Filesize

                10.8MB

              • memory/2560-161-0x0000000000380000-0x000000000038A000-memory.dmp

                Filesize

                40KB

              • memory/3176-182-0x0000000002910000-0x0000000002926000-memory.dmp

                Filesize

                88KB

              • memory/3344-180-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/3344-183-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/3780-194-0x00000000058D0000-0x00000000058E2000-memory.dmp

                Filesize

                72KB

              • memory/3780-195-0x0000000005930000-0x000000000596C000-memory.dmp

                Filesize

                240KB

              • memory/3780-196-0x00000000728D0000-0x0000000073080000-memory.dmp

                Filesize

                7.7MB

              • memory/3780-197-0x00000000058A0000-0x00000000058B0000-memory.dmp

                Filesize

                64KB

              • memory/3780-193-0x00000000058A0000-0x00000000058B0000-memory.dmp

                Filesize

                64KB

              • memory/3780-192-0x00000000059C0000-0x0000000005ACA000-memory.dmp

                Filesize

                1.0MB

              • memory/3780-191-0x0000000005ED0000-0x00000000064E8000-memory.dmp

                Filesize

                6.1MB

              • memory/3780-190-0x00000000728D0000-0x0000000073080000-memory.dmp

                Filesize

                7.7MB

              • memory/3780-189-0x0000000000F30000-0x0000000000F60000-memory.dmp

                Filesize

                192KB