Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19-01-2024 11:54

General

  • Target

    9ebbac2bbaa6ff937d94383e93ae1953ebcc3ed17f942b9a914556d1402e9220.exe

  • Size

    642KB

  • MD5

    eed421d8e4550632375fa205977352f4

  • SHA1

    d0427215a9c1f17169d3044134a8b4891432f602

  • SHA256

    9ebbac2bbaa6ff937d94383e93ae1953ebcc3ed17f942b9a914556d1402e9220

  • SHA512

    9e883d51e8877fa621abacf653c037956e651c5628e2aac1638c6d9af83bae51d907181c0541f30f5c464e39422df9add6bb52484b7d87ade6038a6e2190df55

  • SSDEEP

    12288:cMrcy90fzVl1UQoQDsSQ5YVpuutHrcKv9j3K0c+JSNH/w9FF1y5uXJ:QyOZUQ4SQWVpHLbZupI9Zn

Malware Config

Extracted

Family

amadey

Version

3.86

C2

http://77.91.68.61

Attributes
  • install_dir

    925e7e99c5

  • install_file

    pdates.exe

  • strings_key

    ada76b8b0e1f6892ee93c20ab8946117

  • url_paths

    /rock/index.php

rc4.plain

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

maxik

C2

77.91.124.156:19071

Attributes
  • auth_value

    a7714e1bc167c67e3fc8f9e368352269

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 16 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ebbac2bbaa6ff937d94383e93ae1953ebcc3ed17f942b9a914556d1402e9220.exe
    "C:\Users\Admin\AppData\Local\Temp\9ebbac2bbaa6ff937d94383e93ae1953ebcc3ed17f942b9a914556d1402e9220.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1088
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3169190.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3169190.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2400
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9357820.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9357820.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2344
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3509104.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3509104.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2764
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8793616.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8793616.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2680
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b8506718.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b8506718.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:2856
            • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
              "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1652
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:676
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1036
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:3000
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "pdates.exe" /P "Admin:N"
                    8⤵
                      PID:2604
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "pdates.exe" /P "Admin:R" /E
                      8⤵
                        PID:2464
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:2108
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\925e7e99c5" /P "Admin:N"
                          8⤵
                            PID:2092
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\925e7e99c5" /P "Admin:R" /E
                            8⤵
                              PID:2104
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1335382.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1335382.exe
                      4⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Checks SCSI registry key(s)
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: MapViewOfSection
                      PID:852
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d7739759.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d7739759.exe
                    3⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    PID:1592
              • C:\Windows\system32\taskeng.exe
                taskeng.exe {BDDF9F66-47E9-45A9-8DB5-F589D1941ECA} S-1-5-21-1603059206-2004189698-4139800220-1000:AILVMYUM\Admin:Interactive:[1]
                1⤵
                  PID:2872
                  • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                    C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                    2⤵
                    • Executes dropped EXE
                    PID:1536
                  • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                    C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                    2⤵
                    • Executes dropped EXE
                    PID:2036

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8793616.exe

                  Filesize

                  11KB

                  MD5

                  7e93bacbbc33e6652e147e7fe07572a0

                  SHA1

                  421a7167da01c8da4dc4d5234ca3dd84e319e762

                  SHA256

                  850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                  SHA512

                  250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v3169190.exe

                  Filesize

                  515KB

                  MD5

                  4766f6c16a2be63b1dd1edbce39b12de

                  SHA1

                  a0d66b657ca6f8cbd66cbc0cf35ad9e8ffd29115

                  SHA256

                  8d4618325aebe1e1d54ea077a65ce283635620f3e86c87808f9556bc69cc4218

                  SHA512

                  9dda378e3fc368510c54c9b39884c9506ce4397b95bb61e86b326ee7dae2d21fb00de2430df81d72cfdd98940ddfc38767eb2084462385a07752f6fa37158533

                • \Users\Admin\AppData\Local\Temp\IXP001.TMP\d7739759.exe

                  Filesize

                  174KB

                  MD5

                  76ded6367b2fab4e55883e9b20f8043c

                  SHA1

                  0c4a953f9c465a421ad4bd5a8bd6913f4f1ba265

                  SHA256

                  25fdb66625e3dacbb006f26062d41c2b3adac823d86b063adf1c460a9c959dfc

                  SHA512

                  34aeb665a4a1d8b39252ff77c982228e0633c7f9c4d531380552b677f034bacc38819cf920bd561974d941876a972109f4ab1a7039e8ac2b68962a85a3438aa8

                • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v9357820.exe

                  Filesize

                  359KB

                  MD5

                  1f94360c0be4fa13fd63dd926d75bd26

                  SHA1

                  72b9f4e7cc216dde8ca3bbbf42e3a5c579bd0d7f

                  SHA256

                  5e7fc1d5ad15a5dfa2f4c9f43f2e2c1c86d88a3822e1152d29f0bf46ebcea987

                  SHA512

                  73595f59cd4f7ba5810ffa67ca1b68a38525479b1eb656ad6f531b0f584f4c2cff2c5cdf570e6241cf3cc10b7a4f82dc47bd659b3d05db9ab6defc2816d1499e

                • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c1335382.exe

                  Filesize

                  39KB

                  MD5

                  01ea89c10b0228d0026072cdb06ba040

                  SHA1

                  3b164e335ea84450ed4f3c04a93e786145e13fbd

                  SHA256

                  f9be7f3afa083fb10258ece46786eb826e3b576d0f406a642f4da199cb53b8f0

                  SHA512

                  50f7896829152b0bc627b552a173cdb982fde67d6e2dc98440008132163734350eec9a922671456f8be1f418ba285dc83bb58761942ccf81ab191fff11afe710

                • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v3509104.exe

                  Filesize

                  234KB

                  MD5

                  8dba1d1511306b256354785676a538a1

                  SHA1

                  848d50cb51be14e2bf4ec6ab6d17b02ad4ce7e0e

                  SHA256

                  58917d2aac1c385654bdb9536f87cf7f0f0c87a173187a7ce1be910147d5d5f2

                  SHA512

                  74bc7b8a8946a04bfefbc4e7505292edfb77a1a8e26a462721c8ac98a20b0fd1117d4079fe9536ff9f5a27f9da15d418feb74e28742d822cf4a9742ccc3f3e01

                • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b8506718.exe

                  Filesize

                  230KB

                  MD5

                  e73052694833a0bd05cef48e25ebc353

                  SHA1

                  3cd1b2a6b7463d974647e9c0ab36f2821f1c83ee

                  SHA256

                  15f35e559f06fbfc84e71edaa9686896f89ca98b151570ef535408fdee3826d7

                  SHA512

                  48264582bee799ffb266de3ed566655d28640a1880b62a150102329e123de56884628b68dd4be371d2160f59c809dd786cae129f08494ca8baf69d22ff7dc489

                • memory/852-69-0x0000000000020000-0x0000000000029000-memory.dmp

                  Filesize

                  36KB

                • memory/852-68-0x0000000000400000-0x0000000000409000-memory.dmp

                  Filesize

                  36KB

                • memory/852-71-0x0000000000400000-0x0000000000409000-memory.dmp

                  Filesize

                  36KB

                • memory/1364-70-0x0000000001CD0000-0x0000000001CE6000-memory.dmp

                  Filesize

                  88KB

                • memory/1592-80-0x0000000001390000-0x00000000013C0000-memory.dmp

                  Filesize

                  192KB

                • memory/1592-81-0x0000000000380000-0x0000000000386000-memory.dmp

                  Filesize

                  24KB

                • memory/2344-66-0x0000000000120000-0x0000000000129000-memory.dmp

                  Filesize

                  36KB

                • memory/2344-67-0x0000000000120000-0x0000000000129000-memory.dmp

                  Filesize

                  36KB

                • memory/2680-40-0x000007FEF5FB0000-0x000007FEF699C000-memory.dmp

                  Filesize

                  9.9MB

                • memory/2680-39-0x000007FEF5FB0000-0x000007FEF699C000-memory.dmp

                  Filesize

                  9.9MB

                • memory/2680-38-0x0000000000AB0000-0x0000000000ABA000-memory.dmp

                  Filesize

                  40KB