Overview
overview
10Static
static
30e13a10fd6...cb.exe
windows10-2004-x64
100f3fc05fe2...99.exe
windows10-2004-x64
101437361c67...55.exe
windows10-2004-x64
1023bea5b85d...33.exe
windows10-2004-x64
1027054c4ef8...56.exe
windows10-2004-x64
102b700615cb...c1.exe
windows10-2004-x64
1030fb90dbd1...b4.exe
windows10-2004-x64
10312c299a84...a6.exe
windows7-x64
3312c299a84...a6.exe
windows10-2004-x64
1035d50aca92...42.exe
windows10-2004-x64
10627c0990f7...d9.exe
windows10-2004-x64
1065db5d7052...3e.exe
windows10-2004-x64
10677afbc183...fd.exe
windows7-x64
3677afbc183...fd.exe
windows10-2004-x64
10841ea03e18...82.exe
windows10-2004-x64
1085594a9dff...ab.exe
windows10-2004-x64
108c7a2623ea...7d.exe
windows10-2004-x64
109a0ecac5f6...8e.exe
windows10-2004-x64
10adaea581d9...c2.exe
windows10-2004-x64
10c64d3873d4...2e.exe
windows10-2004-x64
10ffa14d4c0b...02.exe
windows10-2004-x64
10Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 15:04
Static task
static1
Behavioral task
behavioral1
Sample
0e13a10fd67a47892e598c6953856fd7786d3e7b1f70c519cae5cfe6b7ce37cb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
0f3fc05fe2db9d3b03c0b7d1c6af9353f3d7c1d340577a71dabad5617658cb99.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
1437361c67b59d113cebaa24a142650e8b8b3172ab6a6714c71515ad86d9fa55.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
23bea5b85d6bafc9a62fa8bb8337d9c39b8f4f7d139c32113e8eaa6099afc933.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
27054c4ef87730930ab8bbec2331b567a7518f766c3e7f55e066fb7014ae3556.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
2b700615cbaa89c4d3e0272582a4db8e51bcfe6c3333a5be92e93784b2855ac1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
30fb90dbd15d7cf28cd8c2c3ac256de3f63d31799b3d6452d6448ff5fc3a88b4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
312c299a844cf7520e53edede1e26057b44acb35e70aba017a6e87804cd037a6.exe
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
312c299a844cf7520e53edede1e26057b44acb35e70aba017a6e87804cd037a6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
35d50aca923965e5a644e1735c8cd657d562282a8fddd8a654982c84f9258342.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
627c0990f7c6fa8cc9a276966f3e2b428f8323bdd73c68bdf8034799f948f0d9.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
65db5d7052987e7e8d814719a1e9c77b7d0f755b7f100a0b3f0b0d1b83d9b43e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
677afbc18346258efc780d794cf589d9e949ec77c0f68fc663b38c6f663cf7fd.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
677afbc18346258efc780d794cf589d9e949ec77c0f68fc663b38c6f663cf7fd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
841ea03e181082fcf7f5533397a6731021c045058047518f2795b78fd69dda82.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
85594a9dffbaaedca9ea95760b5683bb9ed199e29a54525ac755697a6e18aaab.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
8c7a2623ea0bfbad72a17add57243068958fa7289cd1319d5cbc3af84eeac07d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
9a0ecac5f61531b0c28426e6e97edeaa0c930397169075cb98b077174beb638e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
adaea581d959a8c0e4a570708711cc0a4112daa9ef8d47d1f5dafe486a1b32c2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
c64d3873d4dbf74d0c6e28f27a09adb2a8c897e218d1a4a4f5822391bf80c92e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
ffa14d4c0be8bc789970a81ab0d1c4ceb689e261224f173a8dbd9609a9b45102.exe
Resource
win10v2004-20240508-en
General
-
Target
2b700615cbaa89c4d3e0272582a4db8e51bcfe6c3333a5be92e93784b2855ac1.exe
-
Size
515KB
-
MD5
468b8fb8fee779e9bb718ae1d50c891d
-
SHA1
e829e9c23aced9a9b956ae9a3f58ad6c5b014ab3
-
SHA256
2b700615cbaa89c4d3e0272582a4db8e51bcfe6c3333a5be92e93784b2855ac1
-
SHA512
0d8438c09c31c11d72fd3f28a4e39fba7ef6133728d2e6309a64b9236e1ef853b57bda48b8130d4ed2153616849869024e00a544dbcf95b6d858d0ec4d1c7cb5
-
SSDEEP
12288:hMrTy900gkEayaYWCJZ80zpbB5akxvA5TcR2tXPs:aygkUWwZ80zpbB8k6E
Malware Config
Extracted
amadey
3.85
http://77.91.68.3
-
install_dir
3ec1f323b5
-
install_file
danke.exe
-
strings_key
827021be90f1e85ab27949ea7e9347e8
-
url_paths
/home/love/index.php
Extracted
redline
news
77.91.68.68:19071
-
auth_value
99ba2ffe8d72ebe9fdc7e758c94db148
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral6/files/0x0008000000023446-19.dat healer behavioral6/memory/5084-21-0x0000000000CF0000-0x0000000000CFA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5482627.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a5482627.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5482627.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5482627.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5482627.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5482627.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral6/files/0x0007000000023440-42.dat family_redline behavioral6/memory/1556-44-0x0000000000AC0000-0x0000000000AF0000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation b9830090.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation danke.exe -
Executes dropped EXE 9 IoCs
pid Process 3992 v6722793.exe 1260 v0212287.exe 5084 a5482627.exe 4428 b9830090.exe 1852 danke.exe 4068 c0555315.exe 1556 d2581591.exe 3580 danke.exe 4820 danke.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a5482627.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2b700615cbaa89c4d3e0272582a4db8e51bcfe6c3333a5be92e93784b2855ac1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v6722793.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v0212287.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c0555315.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c0555315.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c0555315.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 976 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5084 a5482627.exe 5084 a5482627.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5084 a5482627.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2160 wrote to memory of 3992 2160 2b700615cbaa89c4d3e0272582a4db8e51bcfe6c3333a5be92e93784b2855ac1.exe 83 PID 2160 wrote to memory of 3992 2160 2b700615cbaa89c4d3e0272582a4db8e51bcfe6c3333a5be92e93784b2855ac1.exe 83 PID 2160 wrote to memory of 3992 2160 2b700615cbaa89c4d3e0272582a4db8e51bcfe6c3333a5be92e93784b2855ac1.exe 83 PID 3992 wrote to memory of 1260 3992 v6722793.exe 84 PID 3992 wrote to memory of 1260 3992 v6722793.exe 84 PID 3992 wrote to memory of 1260 3992 v6722793.exe 84 PID 1260 wrote to memory of 5084 1260 v0212287.exe 85 PID 1260 wrote to memory of 5084 1260 v0212287.exe 85 PID 1260 wrote to memory of 4428 1260 v0212287.exe 98 PID 1260 wrote to memory of 4428 1260 v0212287.exe 98 PID 1260 wrote to memory of 4428 1260 v0212287.exe 98 PID 4428 wrote to memory of 1852 4428 b9830090.exe 100 PID 4428 wrote to memory of 1852 4428 b9830090.exe 100 PID 4428 wrote to memory of 1852 4428 b9830090.exe 100 PID 3992 wrote to memory of 4068 3992 v6722793.exe 101 PID 3992 wrote to memory of 4068 3992 v6722793.exe 101 PID 3992 wrote to memory of 4068 3992 v6722793.exe 101 PID 1852 wrote to memory of 976 1852 danke.exe 102 PID 1852 wrote to memory of 976 1852 danke.exe 102 PID 1852 wrote to memory of 976 1852 danke.exe 102 PID 1852 wrote to memory of 2744 1852 danke.exe 104 PID 1852 wrote to memory of 2744 1852 danke.exe 104 PID 1852 wrote to memory of 2744 1852 danke.exe 104 PID 2744 wrote to memory of 1196 2744 cmd.exe 106 PID 2744 wrote to memory of 1196 2744 cmd.exe 106 PID 2744 wrote to memory of 1196 2744 cmd.exe 106 PID 2744 wrote to memory of 4164 2744 cmd.exe 107 PID 2744 wrote to memory of 4164 2744 cmd.exe 107 PID 2744 wrote to memory of 4164 2744 cmd.exe 107 PID 2744 wrote to memory of 3976 2744 cmd.exe 108 PID 2744 wrote to memory of 3976 2744 cmd.exe 108 PID 2744 wrote to memory of 3976 2744 cmd.exe 108 PID 2744 wrote to memory of 4388 2744 cmd.exe 109 PID 2744 wrote to memory of 4388 2744 cmd.exe 109 PID 2744 wrote to memory of 4388 2744 cmd.exe 109 PID 2744 wrote to memory of 3648 2744 cmd.exe 110 PID 2744 wrote to memory of 3648 2744 cmd.exe 110 PID 2744 wrote to memory of 3648 2744 cmd.exe 110 PID 2744 wrote to memory of 1936 2744 cmd.exe 111 PID 2744 wrote to memory of 1936 2744 cmd.exe 111 PID 2744 wrote to memory of 1936 2744 cmd.exe 111 PID 2160 wrote to memory of 1556 2160 2b700615cbaa89c4d3e0272582a4db8e51bcfe6c3333a5be92e93784b2855ac1.exe 114 PID 2160 wrote to memory of 1556 2160 2b700615cbaa89c4d3e0272582a4db8e51bcfe6c3333a5be92e93784b2855ac1.exe 114 PID 2160 wrote to memory of 1556 2160 2b700615cbaa89c4d3e0272582a4db8e51bcfe6c3333a5be92e93784b2855ac1.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b700615cbaa89c4d3e0272582a4db8e51bcfe6c3333a5be92e93784b2855ac1.exe"C:\Users\Admin\AppData\Local\Temp\2b700615cbaa89c4d3e0272582a4db8e51bcfe6c3333a5be92e93784b2855ac1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6722793.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6722793.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0212287.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0212287.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a5482627.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a5482627.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5084
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9830090.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9830090.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F6⤵
- Creates scheduled task(s)
PID:976
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1196
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:N"7⤵PID:4164
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:R" /E7⤵PID:3976
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4388
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:N"7⤵PID:3648
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:R" /E7⤵PID:1936
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0555315.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0555315.exe3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:4068
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2581591.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2581591.exe2⤵
- Executes dropped EXE
PID:1556
-
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:3580
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:4820
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5c53789658163743507e59840354aa22e
SHA15a338d9ef7b29ee707f808f61e2de07410d15e03
SHA256e9d542fcd0f849685e817f35600986a37a2886f95c52f55f52988e40bdb225d1
SHA512fafc23ac41d62c1a938ac2b277fd4ac0d7fdefcf9d0e1a9891c6ceca60e2f9ab3ac09f4f6e29607f6aa64db948a5b9d77f5e6d8f049371584cce7cb078b8c0bd
-
Filesize
359KB
MD5a84aec2543b96b819df1d6560a83b409
SHA14746f87511f4a706b498ce4b00ce04ab2ee34a96
SHA2568e85fd1916d7aa4be4b6d5433fe4d7bfd6cc2b6345dc0e66944e47a32f53283e
SHA5120d83d0790dc5103432caac5d3e8f099a24ef67e2c0f9da16a14611e0b515c12ee1da02b07b397863bbd0a1cd2983883d969ad900b093d0cb02a04526264db0e6
-
Filesize
33KB
MD5f20d18cd6b20d015eb19b47c477e1069
SHA1c49feb19e0a0285e9a4565bf59184ae951d07939
SHA2562f6378627677ef33a432850da660c8852b039ab0c2acfc11772d8cbe4b6a0bb8
SHA512f26c33ba50517d39037f70764f0f032012bf378c8e7a75f65c7189a8b6a6f8857aaeda9c5ab0b9d1340a873e63715e05a239aa2b57a6bd4a387750b9a45f6ac2
-
Filesize
235KB
MD57fb53a16038674b0ba753c48ce1c4d40
SHA1d953a2339156d23dc5ae893aad21de6b5d30f749
SHA256ab23c1eaa08a4c0824d555f3237b26870b9402e39a209383ba1b3a708b7c5fc0
SHA512416e81c736465104999c4e609b1d22b63e4d34c303dc4d495eb0c47bc59bee5616f63ad673029e4ee51c0e24031e6ae4938f640492f6deb58f8908b89ab268e9
-
Filesize
11KB
MD5259bb29209ae2578fb8b7cc4a582acc1
SHA1068f6221e70d483abf48150bd735a2ee27549788
SHA256d64ae6f3530eb8737ac7907d75b40e3f68e5a5dc43fd215cb1926fd6d31164d4
SHA512b0c893cc008329afbec7faa5cba70c025c31d72304d0ea411d7f25bf893908bae698984683a4f87c6f6962329936b092a503bc523a1b1050833f4c4948314f0f
-
Filesize
229KB
MD53084ee705552dca8fd17dd8edff172ad
SHA193bc086ad91b72a88b4a9f97b7e626e19735cb44
SHA25691363b4d41a2cfdb64c13bee2ff6c281fbf5ca0f72484beacbdb8182b31df29e
SHA5123b49cee028c72e2ed6e0b5987a44fa93bdabc4e6e1012a6ebe76acef70cb1d27e31391f5b79eefff84603de3cce6b5156d2f12f50aaea80da4f55821d78493f3