Analysis

  • max time kernel
    146s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 10:39

General

  • Target

    28839ba22be16cab09b3664b34397e918be834c1459cde49048ffd421d2876c4.exe

  • Size

    514KB

  • MD5

    319bd25cccb75fc18a1fe19c7beaf3e8

  • SHA1

    fc22a7d780f89b6ca0e1b449871fd3392fb16ba5

  • SHA256

    28839ba22be16cab09b3664b34397e918be834c1459cde49048ffd421d2876c4

  • SHA512

    50d2ad696cb60b2de8452c6556b0ccf938c131ad170c4981fd3cbaba172afc2833a4ecddd7829f98bb2bd80758b698d6ef5a2d65e6930dd2e92872dbb02d0089

  • SSDEEP

    12288:JMrOy90iUBwxKnDbdDEPT9iOhjRBu0h0PrwjWh:ry5UBwQnXd4PpiQRBywjWh

Malware Config

Extracted

Family

amadey

Version

3.86

C2

http://77.91.68.61

Attributes
  • install_dir

    925e7e99c5

  • install_file

    pdates.exe

  • strings_key

    ada76b8b0e1f6892ee93c20ab8946117

  • url_paths

    /rock/index.php

rc4.plain

Extracted

Family

redline

Botnet

lande

C2

77.91.124.84:19071

Attributes
  • auth_value

    9fa41701c47df37786234f3373f21208

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\28839ba22be16cab09b3664b34397e918be834c1459cde49048ffd421d2876c4.exe
    "C:\Users\Admin\AppData\Local\Temp\28839ba22be16cab09b3664b34397e918be834c1459cde49048ffd421d2876c4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4052
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0789688.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0789688.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2604
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4476752.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4476752.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2520
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7861888.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7861888.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4352
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8290668.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8290668.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1680
          • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
            "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2804
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:4596
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:916
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:4696
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "pdates.exe" /P "Admin:N"
                  7⤵
                    PID:3636
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "pdates.exe" /P "Admin:R" /E
                    7⤵
                      PID:2732
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:1516
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\925e7e99c5" /P "Admin:N"
                        7⤵
                          PID:3944
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\925e7e99c5" /P "Admin:R" /E
                          7⤵
                            PID:5084
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c9372028.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c9372028.exe
                    3⤵
                    • Executes dropped EXE
                    • Checks SCSI registry key(s)
                    PID:4656
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7527756.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7527756.exe
                  2⤵
                  • Executes dropped EXE
                  PID:3004
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:516
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:2244

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7527756.exe

                Filesize

                173KB

                MD5

                f2838192a5d6aca68c7a612bac16536e

                SHA1

                89887c8e378292ef4269cf010fec648fc5f5554f

                SHA256

                b2506923f9ced252c2dc04c8b7552c033678855db7e9302c0c53c5895360be02

                SHA512

                d1bbb7268f63b5c452aaf7a78f5969861de24d72dc3bcd4fdb7384062d7b5a2d17fa35ed777b61424580599fda79fc2cbbd2b4a96b761e83c4a68fc1ad7c7da8

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0789688.exe

                Filesize

                359KB

                MD5

                b8962ab74bbc663bebdc94e8b075fe60

                SHA1

                0395320f888868a33a0458050120337d6c641e44

                SHA256

                47a2cc1984e2485bdb0575ccf862006524a321174e5217e91ff3a361fde635fb

                SHA512

                3aabc15f1f4f9d98222235128dc68451734697b1ceca592986fee2f9c03b4ae41843aa78fcd5012ffd11ee91e6a5def6a69182f94e10e3cbb8707e0653ce66fe

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c9372028.exe

                Filesize

                36KB

                MD5

                727821dfc632ae4fc2f4ed05681992f2

                SHA1

                1187f617d37e6f23376f761e17f1346908c5e247

                SHA256

                c9fac79d67650f13c91b2b15e0723701cc2f00d92b972a22093d31b6d8a2e341

                SHA512

                d7bbc9833e6b604e5ec05954c63b0a92895d9a9bde2c85943d41fd5f617ee75efa96b802c0aa53cef67c5454eb01e53445da6a9242758bf5dc781bf8068e6e49

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4476752.exe

                Filesize

                234KB

                MD5

                b40e57aa7887085dfb3d3419794be6bd

                SHA1

                100fa51e992298687db6390e88a399d0da984400

                SHA256

                4e98cbb0c6b62ad5b66be8eacd8d2a41286bb79712438df127347b07183da4e4

                SHA512

                ead1263b9e7e94e02553276cebee91d0f4bbee7fe33ae91d3c003e937d5314022018ec0b357a3c6ecc38787d1457a915a2a0e3aa1fda0e6590959f4998cda42b

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7861888.exe

                Filesize

                12KB

                MD5

                2789d687ff47653ebff181dbc78d4863

                SHA1

                ba2d3320bf2710d0cefbbb6fde4da8719de394a5

                SHA256

                fd692a3c7ec1dd78824b241a9b1a3b3c95fb2c9835c86eba66d7939c5635e541

                SHA512

                07ddc15d8694a00ce234a90255470b0b733df0c317d99543509d72da5e44d0bfd4bda7475d15502b8259c3825a06da0d2a5cd03a5321c20e05ed828476ee2e83

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8290668.exe

                Filesize

                224KB

                MD5

                fc7434cd4d7bf307611d2e9f1a3aaab5

                SHA1

                9e39789e05e29d57d60ef97f056ad69b4c6ab0d6

                SHA256

                27d855bf4f97591f33a1f031beaf4e13ea83978cd88adb83bd0c1132b6e564ac

                SHA512

                880313b505fc511e38972d8c7343e626fc90ff6d1ee964e96f09c7d62577740020c6f8c961f36fdfeb96039f3a4b58d70a0feb050022ab6bea1627715d7eba8e

              • memory/3004-48-0x0000000009FC0000-0x000000000A0CA000-memory.dmp

                Filesize

                1.0MB

              • memory/3004-45-0x0000000000010000-0x0000000000040000-memory.dmp

                Filesize

                192KB

              • memory/3004-46-0x0000000000910000-0x0000000000916000-memory.dmp

                Filesize

                24KB

              • memory/3004-47-0x000000000A4C0000-0x000000000AAD8000-memory.dmp

                Filesize

                6.1MB

              • memory/3004-49-0x0000000009F00000-0x0000000009F12000-memory.dmp

                Filesize

                72KB

              • memory/3004-50-0x0000000009F60000-0x0000000009F9C000-memory.dmp

                Filesize

                240KB

              • memory/3004-51-0x00000000043C0000-0x000000000440C000-memory.dmp

                Filesize

                304KB

              • memory/4352-22-0x0000000000170000-0x000000000017A000-memory.dmp

                Filesize

                40KB

              • memory/4352-21-0x00007FFD61033000-0x00007FFD61035000-memory.dmp

                Filesize

                8KB

              • memory/4656-40-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB