Overview
overview
10Static
static
305b48b2909...29.exe
windows10-2004-x64
1018c3050e5a...e4.exe
windows10-2004-x64
102577bd2a22...1d.exe
windows10-2004-x64
1028839ba22b...c4.exe
windows10-2004-x64
104efca8805f...a2.exe
windows10-2004-x64
106603f1832a...ef.exe
windows10-2004-x64
106ba0db3b66...b3.exe
windows10-2004-x64
1074fe770b34...18.exe
windows10-2004-x64
10b6b53c7022...c9.exe
windows10-2004-x64
10eedc883713...91.exe
windows10-2004-x64
10Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 10:39
Static task
static1
Behavioral task
behavioral1
Sample
05b48b2909386e117184a0bdde8c6718992cf21d07674042c9d076292b260729.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
18c3050e5ad727d8fc6d2b16a53db9904ba34d7413ce2abfe2cd0baa2cd5dce4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
2577bd2a22a0df03082a3d61b193668ccfa94a1aef60cb7bb0a7a5123c552c1d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
28839ba22be16cab09b3664b34397e918be834c1459cde49048ffd421d2876c4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
4efca8805f96c16e636fc6f51197b43215b96da00409608d7658fea7ee155ea2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
6603f1832a5054b7e8305ef7814111e74fc6f8356ae86cc81f0bd306722236ef.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
6ba0db3b66f5f3df269e1eb1b3241575d1ec8d58b19767274aae0af44946bbb3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
74fe770b3414b7af5432877eaaf1d2520b875a38c461d63983c77f7c1b39d918.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
b6b53c7022ec83f58037dc5fee6d8a5dd71ff675b2851d1ebdaac02d608ebac9.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
eedc883713775fd0c74224f0bedec2b1e88a105737c823318fc8ba819901d991.exe
Resource
win10v2004-20240508-en
General
-
Target
6ba0db3b66f5f3df269e1eb1b3241575d1ec8d58b19767274aae0af44946bbb3.exe
-
Size
515KB
-
MD5
3133d51b9cb5dff2ffb1eb479a3a8197
-
SHA1
c7751780b417509447b6374f2044c4a70bd3aea2
-
SHA256
6ba0db3b66f5f3df269e1eb1b3241575d1ec8d58b19767274aae0af44946bbb3
-
SHA512
4d0249966b11f4933be1aa3126d2ebd6d93700ff22f858457c0cde49a6e691f89d6480068f00d26b5aaa07b48f71ec0ec67f6ad6951d92815777801153789ae2
-
SSDEEP
12288:2Mr3y90Mp419rk/h+B4egjTgl+ZP3SFgHEgD/r17DZ:ByDp4vg+uegjTgl6PQeESr91
Malware Config
Extracted
amadey
3.85
http://77.91.68.3
-
install_dir
3ec1f323b5
-
install_file
danke.exe
-
strings_key
827021be90f1e85ab27949ea7e9347e8
-
url_paths
/home/love/index.php
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral7/files/0x0008000000023404-19.dat healer behavioral7/memory/2372-21-0x0000000000FC0000-0x0000000000FCA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a6050394.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a6050394.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a6050394.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a6050394.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a6050394.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a6050394.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral7/files/0x00070000000233ff-43.dat family_redline behavioral7/memory/1172-45-0x0000000000E70000-0x0000000000EA0000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation b5038122.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation danke.exe -
Executes dropped EXE 9 IoCs
pid Process 216 v2439283.exe 5092 v6626793.exe 2372 a6050394.exe 404 b5038122.exe 1540 danke.exe 1368 c9387752.exe 2092 danke.exe 1172 d9946860.exe 3200 danke.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a6050394.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6ba0db3b66f5f3df269e1eb1b3241575d1ec8d58b19767274aae0af44946bbb3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2439283.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v6626793.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c9387752.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c9387752.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c9387752.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4960 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2372 a6050394.exe 2372 a6050394.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2372 a6050394.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2456 wrote to memory of 216 2456 6ba0db3b66f5f3df269e1eb1b3241575d1ec8d58b19767274aae0af44946bbb3.exe 82 PID 2456 wrote to memory of 216 2456 6ba0db3b66f5f3df269e1eb1b3241575d1ec8d58b19767274aae0af44946bbb3.exe 82 PID 2456 wrote to memory of 216 2456 6ba0db3b66f5f3df269e1eb1b3241575d1ec8d58b19767274aae0af44946bbb3.exe 82 PID 216 wrote to memory of 5092 216 v2439283.exe 83 PID 216 wrote to memory of 5092 216 v2439283.exe 83 PID 216 wrote to memory of 5092 216 v2439283.exe 83 PID 5092 wrote to memory of 2372 5092 v6626793.exe 84 PID 5092 wrote to memory of 2372 5092 v6626793.exe 84 PID 5092 wrote to memory of 404 5092 v6626793.exe 85 PID 5092 wrote to memory of 404 5092 v6626793.exe 85 PID 5092 wrote to memory of 404 5092 v6626793.exe 85 PID 404 wrote to memory of 1540 404 b5038122.exe 86 PID 404 wrote to memory of 1540 404 b5038122.exe 86 PID 404 wrote to memory of 1540 404 b5038122.exe 86 PID 216 wrote to memory of 1368 216 v2439283.exe 87 PID 216 wrote to memory of 1368 216 v2439283.exe 87 PID 216 wrote to memory of 1368 216 v2439283.exe 87 PID 1540 wrote to memory of 4960 1540 danke.exe 88 PID 1540 wrote to memory of 4960 1540 danke.exe 88 PID 1540 wrote to memory of 4960 1540 danke.exe 88 PID 1540 wrote to memory of 4024 1540 danke.exe 90 PID 1540 wrote to memory of 4024 1540 danke.exe 90 PID 1540 wrote to memory of 4024 1540 danke.exe 90 PID 4024 wrote to memory of 1932 4024 cmd.exe 92 PID 4024 wrote to memory of 1932 4024 cmd.exe 92 PID 4024 wrote to memory of 1932 4024 cmd.exe 92 PID 4024 wrote to memory of 2448 4024 cmd.exe 93 PID 4024 wrote to memory of 2448 4024 cmd.exe 93 PID 4024 wrote to memory of 2448 4024 cmd.exe 93 PID 4024 wrote to memory of 2728 4024 cmd.exe 94 PID 4024 wrote to memory of 2728 4024 cmd.exe 94 PID 4024 wrote to memory of 2728 4024 cmd.exe 94 PID 4024 wrote to memory of 1148 4024 cmd.exe 95 PID 4024 wrote to memory of 1148 4024 cmd.exe 95 PID 4024 wrote to memory of 1148 4024 cmd.exe 95 PID 4024 wrote to memory of 432 4024 cmd.exe 96 PID 4024 wrote to memory of 432 4024 cmd.exe 96 PID 4024 wrote to memory of 432 4024 cmd.exe 96 PID 4024 wrote to memory of 4880 4024 cmd.exe 97 PID 4024 wrote to memory of 4880 4024 cmd.exe 97 PID 4024 wrote to memory of 4880 4024 cmd.exe 97 PID 2456 wrote to memory of 1172 2456 6ba0db3b66f5f3df269e1eb1b3241575d1ec8d58b19767274aae0af44946bbb3.exe 100 PID 2456 wrote to memory of 1172 2456 6ba0db3b66f5f3df269e1eb1b3241575d1ec8d58b19767274aae0af44946bbb3.exe 100 PID 2456 wrote to memory of 1172 2456 6ba0db3b66f5f3df269e1eb1b3241575d1ec8d58b19767274aae0af44946bbb3.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ba0db3b66f5f3df269e1eb1b3241575d1ec8d58b19767274aae0af44946bbb3.exe"C:\Users\Admin\AppData\Local\Temp\6ba0db3b66f5f3df269e1eb1b3241575d1ec8d58b19767274aae0af44946bbb3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2439283.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2439283.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6626793.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6626793.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6050394.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6050394.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5038122.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5038122.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F6⤵
- Creates scheduled task(s)
PID:4960
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1932
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:N"7⤵PID:2448
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:R" /E7⤵PID:2728
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1148
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:N"7⤵PID:432
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:R" /E7⤵PID:4880
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c9387752.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c9387752.exe3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:1368
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9946860.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9946860.exe2⤵
- Executes dropped EXE
PID:1172
-
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:2092
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:3200
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173KB
MD5b787561ef39443cd949621f9c189edce
SHA16fa6607cb82c22e522547240c8fc40a69cc7c3f7
SHA25675fe759176072d5688b12d57a87b086cd843600351d953b9ae7672dfe407fc56
SHA5123fc333966851e5179410aee1b2cfc788d20ce8057af2f1205c2a15add8c77f87e474f404c5cf91d6b5f37e35270ff3596c8c22cfbde61e6b93766f37f575a59e
-
Filesize
359KB
MD51867f755c2e50bec05eb667e0d0a1184
SHA18fb81278c740f702f51a45a067b28c2b2564e2ed
SHA256f34e8c5cb56f19f07740954bfbda5b828aec62e6cb8d7cadbf1354b3f811c2d2
SHA51230148c0a3b0fc230fa4f455493319343186b7f9d71b33388133ab772ea0a10460d40514bda15486591f0da714904f7a1239c40274fd18fd19b8eb872c4be0cb3
-
Filesize
32KB
MD5df6d3dd8d25c7c1afe3a7756ed9e9ecc
SHA1a66f386ff69133f8ba6478ae69d56b7880ac0177
SHA2569916aae975cc1b7af1360bc7de341ddc914a619eeb9cb468cc713147ca4e95f8
SHA5124c6ec99bd9b06fc4723aefd5a7a637f641aba4fca5d40ae89555a52ec286557675335f2d22ab83710c07a0cd93bbbbcb55614288b4a3cb436c484b7ba173d59b
-
Filesize
235KB
MD5f4707a9db7540780ee9da722fde3e0d8
SHA138c1069235780f3b2132f28cf526557d418b62b5
SHA256cb1f767773f8b86ba74d1fac8848b3130be3bc93cc3930e1d123abe7d9329de9
SHA5121e61b996234ad10e82753fdd995d3a87781b57585e4e24ea8bd11b506541bf57e2f4915f6ea6d8ed0665d23920a0e556723143cb0a4986a46c637f1d02431290
-
Filesize
14KB
MD5a74dd029101a25504d8fc7ca33c1adc2
SHA122cc29079d98d3ff79f13b8ebf9a27c67757594e
SHA2561361d5cc17da4688d29e0a60cdb9fe1669d80f3c999292e2467969cf898f3f84
SHA5122a6bb5b8fe48c838d9af2c95a32b69729e32ee0d2ce1fe35d281b286e910657a8792037d3a52b825d24d7e69730eff09f99ec549ecd3da6e4cb69a277a81f5d0
-
Filesize
227KB
MD5787410f258f680e28c135ac0ecc645ca
SHA106505649a3c2729796b57e7de0869c8b5a2fd84c
SHA256064ca5e3fc52bd168e29697fc755b7310781344cafad50e1cd14555e7255641e
SHA5123c5c3d74569766c30fabe448ec04e1560de75ba10244c4179b0b19deda31ecf5207b7545b6e1c8411e2587409f7d5ca54f35cb04f2bcba109239f83d48294580