Overview
overview
10Static
static
330b55fc29e...75.exe
windows10-2004-x64
104f6b8faa68...86.exe
windows10-2004-x64
1068c37c8307...6a.exe
windows10-2004-x64
10699bfc597d...1d.exe
windows10-2004-x64
10844b5b7693...ab.exe
windows10-2004-x64
1086a6beb680...62.exe
windows10-2004-x64
109cf3d2bf3c...cb.exe
windows10-2004-x64
10ca9f078739...a4.exe
windows10-2004-x64
10d0ab8687e3...e2.exe
windows10-2004-x64
10fb468a211d...c3.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 10:51
Static task
static1
Behavioral task
behavioral1
Sample
30b55fc29eb4d6ba84b1f82bbfa69faa222f2bc6d243a759a624fbb454475275.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
4f6b8faa6814b26627c6c8eac0bc9c5237229efaec31a93ac5634db12970f986.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
68c37c83076969c58d0363958646c7804b3b22fd50f04aa720bc28b07793816a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
699bfc597d56fb4ed7153a5a4fe2851361b9e27b9b8c3109277f0c5a54afbe1d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
844b5b76938e178a82f8c18d5600f389ee4da147c66b379dbc5cb8587d11e5ab.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
86a6beb6802f9ec2aa387143ba41461fb82783226223ba68b44e49b21c8d3d62.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
9cf3d2bf3c4df3cc22948e45de303aec0f5ffce78a74c453774be0f6f060f6cb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
ca9f07873920ecd0518ecf148ae1351a8ecb3ce1fe033aa44b45de07f87202a4.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
d0ab8687e34a8f0343980bddd26689960bc998ce3537a995751d70b47f6b24e2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
fb468a211d9a74c5355215200cc2031ec364c8d8a99456c4a189cfea35cb72c3.exe
Resource
win10v2004-20240426-en
General
-
Target
30b55fc29eb4d6ba84b1f82bbfa69faa222f2bc6d243a759a624fbb454475275.exe
-
Size
389KB
-
MD5
836c2e6c543de8734f2293001cdeb892
-
SHA1
8d079b4246c7778350797bb66f290fa4f9e72d7a
-
SHA256
30b55fc29eb4d6ba84b1f82bbfa69faa222f2bc6d243a759a624fbb454475275
-
SHA512
ae73d335a26e2d0e826737c77d01cd38deca1f78fddca93483441da48dbf8c91e6ab64a1216706e6220840dfc75bb078943ab2db6b847b78f43d75f9296faf95
-
SSDEEP
12288:wMrwy90h82X+eb0XDKMSIgBYCzzq+f0D/:QyXeDPzioU
Malware Config
Extracted
amadey
3.86
http://77.91.68.61
-
install_dir
925e7e99c5
-
install_file
pdates.exe
-
strings_key
ada76b8b0e1f6892ee93c20ab8946117
-
url_paths
/rock/index.php
Extracted
redline
lande
77.91.124.84:19071
-
auth_value
9fa41701c47df37786234f3373f21208
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023419-25.dat healer behavioral1/memory/4264-27-0x0000000000200000-0x000000000020A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection h6319005.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h6319005.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h6319005.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h6319005.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h6319005.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h6319005.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023416-30.dat family_redline behavioral1/memory/3052-32-0x0000000000740000-0x0000000000770000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation g6157500.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation pdates.exe -
Executes dropped EXE 8 IoCs
pid Process 5096 x5758399.exe 4392 g6157500.exe 2672 pdates.exe 4264 h6319005.exe 3052 j3798517.exe 3440 pdates.exe 4528 pdates.exe 4240 pdates.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" h6319005.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 30b55fc29eb4d6ba84b1f82bbfa69faa222f2bc6d243a759a624fbb454475275.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5758399.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1220 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2756 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4264 h6319005.exe 4264 h6319005.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4264 h6319005.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 4504 wrote to memory of 5096 4504 30b55fc29eb4d6ba84b1f82bbfa69faa222f2bc6d243a759a624fbb454475275.exe 83 PID 4504 wrote to memory of 5096 4504 30b55fc29eb4d6ba84b1f82bbfa69faa222f2bc6d243a759a624fbb454475275.exe 83 PID 4504 wrote to memory of 5096 4504 30b55fc29eb4d6ba84b1f82bbfa69faa222f2bc6d243a759a624fbb454475275.exe 83 PID 5096 wrote to memory of 4392 5096 x5758399.exe 84 PID 5096 wrote to memory of 4392 5096 x5758399.exe 84 PID 5096 wrote to memory of 4392 5096 x5758399.exe 84 PID 4392 wrote to memory of 2672 4392 g6157500.exe 85 PID 4392 wrote to memory of 2672 4392 g6157500.exe 85 PID 4392 wrote to memory of 2672 4392 g6157500.exe 85 PID 5096 wrote to memory of 4264 5096 x5758399.exe 86 PID 5096 wrote to memory of 4264 5096 x5758399.exe 86 PID 2672 wrote to memory of 2756 2672 pdates.exe 87 PID 2672 wrote to memory of 2756 2672 pdates.exe 87 PID 2672 wrote to memory of 2756 2672 pdates.exe 87 PID 2672 wrote to memory of 2416 2672 pdates.exe 89 PID 2672 wrote to memory of 2416 2672 pdates.exe 89 PID 2672 wrote to memory of 2416 2672 pdates.exe 89 PID 2416 wrote to memory of 2016 2416 cmd.exe 92 PID 2416 wrote to memory of 2016 2416 cmd.exe 92 PID 2416 wrote to memory of 2016 2416 cmd.exe 92 PID 2416 wrote to memory of 3836 2416 cmd.exe 93 PID 2416 wrote to memory of 3836 2416 cmd.exe 93 PID 2416 wrote to memory of 3836 2416 cmd.exe 93 PID 2416 wrote to memory of 2188 2416 cmd.exe 94 PID 2416 wrote to memory of 2188 2416 cmd.exe 94 PID 2416 wrote to memory of 2188 2416 cmd.exe 94 PID 2416 wrote to memory of 3032 2416 cmd.exe 95 PID 2416 wrote to memory of 3032 2416 cmd.exe 95 PID 2416 wrote to memory of 3032 2416 cmd.exe 95 PID 2416 wrote to memory of 3636 2416 cmd.exe 96 PID 2416 wrote to memory of 3636 2416 cmd.exe 96 PID 2416 wrote to memory of 3636 2416 cmd.exe 96 PID 2416 wrote to memory of 2956 2416 cmd.exe 97 PID 2416 wrote to memory of 2956 2416 cmd.exe 97 PID 2416 wrote to memory of 2956 2416 cmd.exe 97 PID 4504 wrote to memory of 3052 4504 30b55fc29eb4d6ba84b1f82bbfa69faa222f2bc6d243a759a624fbb454475275.exe 106 PID 4504 wrote to memory of 3052 4504 30b55fc29eb4d6ba84b1f82bbfa69faa222f2bc6d243a759a624fbb454475275.exe 106 PID 4504 wrote to memory of 3052 4504 30b55fc29eb4d6ba84b1f82bbfa69faa222f2bc6d243a759a624fbb454475275.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\30b55fc29eb4d6ba84b1f82bbfa69faa222f2bc6d243a759a624fbb454475275.exe"C:\Users\Admin\AppData\Local\Temp\30b55fc29eb4d6ba84b1f82bbfa69faa222f2bc6d243a759a624fbb454475275.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5758399.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5758399.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6157500.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6157500.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F5⤵
- Creates scheduled task(s)
PID:2756
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2016
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:N"6⤵PID:3836
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:R" /E6⤵PID:2188
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3032
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:N"6⤵PID:3636
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:R" /E6⤵PID:2956
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h6319005.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h6319005.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4264
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j3798517.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j3798517.exe2⤵
- Executes dropped EXE
PID:3052
-
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:3440
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:4528
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1220
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:4240
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173KB
MD58635a57d17ac00b9bda1d2f0b424bb32
SHA1c1c7115c10c9328a94e486c3a0c8d5fc3f3768b2
SHA2567dbe20e520b746881df808b5a7b0c5ae306a65e2095fc951675e223b6a550022
SHA5127c61254cc1bb2a1aa5ece011b3751cf3391167fc39fee095c580a41f642cbcb76c90066c1ca25a4a0a0fbd899b9fd3bfd9b370e8f93656684ec3e78e49d9a950
-
Filesize
234KB
MD56092b931049705408b5c8b4669d207ff
SHA16e70b1118feec55ec6774e3203198eafe8f2bd13
SHA256de3f6367da3dae76890a609db3de780da484f2c5f252d9c146af3053b68e960c
SHA5120c3a783dd907f61b10c7e2612cbecefa53db9211e58d7c621fe27ff06eb1ac070ce78e5ff0e34906fb135b2bc3f76749290d0717b8c5cd5af52bc9fa1a7b18c2
-
Filesize
223KB
MD5aea234064483f651010cf9d981f59fea
SHA1002ad73a666d2d92d0c6d6b617e61c6fa0c5f3a6
SHA25658b02c8b4bc2bf7f5f1e8e45d7c206956f188ae56b648922ca75987b999db503
SHA512eae415ef55aeb1b4548c2422a72e618fce17c2c1322918d33dc6b9202a01c743a5684ba28e5d83b6cdb2b703bc12569e6bb0e87ef2decb4e8a18592e1380a434
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91