Overview
overview
10Static
static
305a0748d48...c0.exe
windows7-x64
305a0748d48...c0.exe
windows10-2004-x64
1016b83c8926...86.exe
windows10-2004-x64
101e756c3dd2...17.exe
windows10-2004-x64
102d35abe32a...2d.exe
windows10-2004-x64
103754d1115a...68.exe
windows10-2004-x64
10489287cb76...28.exe
windows10-2004-x64
104a64601cda...bb.exe
windows10-2004-x64
104f57ecadcb...56.exe
windows10-2004-x64
10678b5c88fa...33.exe
windows10-2004-x64
106ade339142...e8.exe
windows7-x64
36ade339142...e8.exe
windows10-2004-x64
106e1ca7d8d7...d7.exe
windows10-2004-x64
107a398dd87e...55.exe
windows10-2004-x64
10806347c33e...f1.exe
windows10-2004-x64
10853890cb43...68.exe
windows10-2004-x64
1085f2f1ff9e...04.exe
windows10-2004-x64
108ea62cf585...13.exe
windows7-x64
38ea62cf585...13.exe
windows10-2004-x64
10af1379c2cb...5d.exe
windows10-2004-x64
10b22005984d...40.exe
windows10-2004-x64
10b567e2a99f...c5.exe
windows10-2004-x64
10f8896ca2a9...6f.exe
windows10-2004-x64
10Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 18:26
Static task
static1
Behavioral task
behavioral1
Sample
05a0748d48b19e76e2ac6f6c7a81179bc89e5adf95615c3d3417fc86f39342c0.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
05a0748d48b19e76e2ac6f6c7a81179bc89e5adf95615c3d3417fc86f39342c0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
16b83c892688e1869a75fcf88075e1a7a0983c284c41a7ff721e23cb6b9c9f86.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
1e756c3dd2f7e40b65e81817bfdb8988cb9c718ec0f522915ca3dcd647e2f017.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
2d35abe32aaee5617d43bf1fd2ace13b082a8d22878b2f5ae8136ab65d54742d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
3754d1115a8a0a19cc2164cd88182e48f6c2435bfbbcd6af4c63cc5dc0d61e68.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
489287cb76171eb013ef8276977586b53061bbfae58f0a22402bd5aa83ff8d28.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
4a64601cda22ee78c5a65b16c6140cd47a27949c9b5b09685526fa936b55c3bb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
4f57ecadcb01211787f5486a7230a8018a0f8a85dfe1ad7b633beb40126c1c56.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
678b5c88fa07f2f823b7edf52683e4214bda0273e380b7a5d2d8c4b6bac35f33.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
6ade339142b77016063402bfde9702b7b9bb644452bae38929035daf779beae8.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
6ade339142b77016063402bfde9702b7b9bb644452bae38929035daf779beae8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
6e1ca7d8d7a0c42eccbd5723dfdd5c856c5bb683313ec6d6d042d9ba90afced7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
7a398dd87e73b31bd02e99eea6ac42ac6c884f0fed02dcf0a0a2184a33913555.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
806347c33e4007046137819a7a108692563d6b877051ff1016faf9a47ec660f1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
853890cb435781965f3dc9618397058d03c8d3e59706ede7d308b4afe12cbe68.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
85f2f1ff9ebbc00b11310cb6b89768dcf0eb2032b0a64810fc24c9ec9b4a6804.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
8ea62cf58512d2544c0f66fbf28e12c7a8344d4a08e8256c968a35de58ccc513.exe
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
8ea62cf58512d2544c0f66fbf28e12c7a8344d4a08e8256c968a35de58ccc513.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
af1379c2cbc8abd767e205c1b0a8be9e9c8b5765083700eb3fd2313bf3a76e5d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
b22005984d343fd352d0b9067646db68950aebfa2c1e0d33b05276c602f98e40.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral22
Sample
b567e2a99fadbe5df72750afd38b655036141fe91ab1982084901d6855e1c6c5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
f8896ca2a901da194a2479237a084ee46b329ef65d0a6795eb3717cbbacb106f.exe
Resource
win10v2004-20240508-en
General
-
Target
678b5c88fa07f2f823b7edf52683e4214bda0273e380b7a5d2d8c4b6bac35f33.exe
-
Size
514KB
-
MD5
1e6d11e2a9a40c2d205a289ef607ae24
-
SHA1
f26f81b52bed31e6603334652139784d0a8bfaac
-
SHA256
678b5c88fa07f2f823b7edf52683e4214bda0273e380b7a5d2d8c4b6bac35f33
-
SHA512
be2d827e7ad204b3b92c2c83f67a02e62cf4748c6b322493db36b282374d2c53aeb774a6a0f1eb465215e8ce6f956f6ee9f437da9606c8bf1dfc47a036b43d72
-
SSDEEP
12288:aMray90Q3D/EZvDisHKwoWljc/MistLDMn2OxRfsfO0lNKc:AyfEyMY/MiKLDqHRfsfO8Nn
Malware Config
Extracted
amadey
3.86
http://77.91.68.61
-
install_dir
925e7e99c5
-
install_file
pdates.exe
-
strings_key
ada76b8b0e1f6892ee93c20ab8946117
-
url_paths
/rock/index.php
Extracted
redline
krast
77.91.68.68:19071
-
auth_value
9059ea331e4599de3746df73ccb24514
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral10/files/0x00080000000235cc-19.dat healer behavioral10/memory/1200-21-0x0000000000760000-0x000000000076A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a8697821.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8697821.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8697821.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8697821.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8697821.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8697821.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral10/files/0x00070000000235c7-43.dat family_redline behavioral10/memory/4796-45-0x0000000000D40000-0x0000000000D70000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation b7297296.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation pdates.exe -
Executes dropped EXE 9 IoCs
pid Process 3572 v2156243.exe 3480 v4542108.exe 1200 a8697821.exe 4580 b7297296.exe 456 pdates.exe 940 c6702400.exe 4796 d4301600.exe 2324 pdates.exe 1408 pdates.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a8697821.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 678b5c88fa07f2f823b7edf52683e4214bda0273e380b7a5d2d8c4b6bac35f33.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2156243.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4542108.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c6702400.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c6702400.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c6702400.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2508 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1200 a8697821.exe 1200 a8697821.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1200 a8697821.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1376 wrote to memory of 3572 1376 678b5c88fa07f2f823b7edf52683e4214bda0273e380b7a5d2d8c4b6bac35f33.exe 88 PID 1376 wrote to memory of 3572 1376 678b5c88fa07f2f823b7edf52683e4214bda0273e380b7a5d2d8c4b6bac35f33.exe 88 PID 1376 wrote to memory of 3572 1376 678b5c88fa07f2f823b7edf52683e4214bda0273e380b7a5d2d8c4b6bac35f33.exe 88 PID 3572 wrote to memory of 3480 3572 v2156243.exe 89 PID 3572 wrote to memory of 3480 3572 v2156243.exe 89 PID 3572 wrote to memory of 3480 3572 v2156243.exe 89 PID 3480 wrote to memory of 1200 3480 v4542108.exe 91 PID 3480 wrote to memory of 1200 3480 v4542108.exe 91 PID 3480 wrote to memory of 4580 3480 v4542108.exe 94 PID 3480 wrote to memory of 4580 3480 v4542108.exe 94 PID 3480 wrote to memory of 4580 3480 v4542108.exe 94 PID 4580 wrote to memory of 456 4580 b7297296.exe 95 PID 4580 wrote to memory of 456 4580 b7297296.exe 95 PID 4580 wrote to memory of 456 4580 b7297296.exe 95 PID 3572 wrote to memory of 940 3572 v2156243.exe 96 PID 3572 wrote to memory of 940 3572 v2156243.exe 96 PID 3572 wrote to memory of 940 3572 v2156243.exe 96 PID 456 wrote to memory of 2508 456 pdates.exe 98 PID 456 wrote to memory of 2508 456 pdates.exe 98 PID 456 wrote to memory of 2508 456 pdates.exe 98 PID 456 wrote to memory of 5024 456 pdates.exe 100 PID 456 wrote to memory of 5024 456 pdates.exe 100 PID 456 wrote to memory of 5024 456 pdates.exe 100 PID 5024 wrote to memory of 4692 5024 cmd.exe 102 PID 5024 wrote to memory of 4692 5024 cmd.exe 102 PID 5024 wrote to memory of 4692 5024 cmd.exe 102 PID 5024 wrote to memory of 1308 5024 cmd.exe 103 PID 5024 wrote to memory of 1308 5024 cmd.exe 103 PID 5024 wrote to memory of 1308 5024 cmd.exe 103 PID 5024 wrote to memory of 4640 5024 cmd.exe 104 PID 5024 wrote to memory of 4640 5024 cmd.exe 104 PID 5024 wrote to memory of 4640 5024 cmd.exe 104 PID 5024 wrote to memory of 2580 5024 cmd.exe 105 PID 5024 wrote to memory of 2580 5024 cmd.exe 105 PID 5024 wrote to memory of 2580 5024 cmd.exe 105 PID 5024 wrote to memory of 2984 5024 cmd.exe 106 PID 5024 wrote to memory of 2984 5024 cmd.exe 106 PID 5024 wrote to memory of 2984 5024 cmd.exe 106 PID 5024 wrote to memory of 4212 5024 cmd.exe 107 PID 5024 wrote to memory of 4212 5024 cmd.exe 107 PID 5024 wrote to memory of 4212 5024 cmd.exe 107 PID 1376 wrote to memory of 4796 1376 678b5c88fa07f2f823b7edf52683e4214bda0273e380b7a5d2d8c4b6bac35f33.exe 112 PID 1376 wrote to memory of 4796 1376 678b5c88fa07f2f823b7edf52683e4214bda0273e380b7a5d2d8c4b6bac35f33.exe 112 PID 1376 wrote to memory of 4796 1376 678b5c88fa07f2f823b7edf52683e4214bda0273e380b7a5d2d8c4b6bac35f33.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\678b5c88fa07f2f823b7edf52683e4214bda0273e380b7a5d2d8c4b6bac35f33.exe"C:\Users\Admin\AppData\Local\Temp\678b5c88fa07f2f823b7edf52683e4214bda0273e380b7a5d2d8c4b6bac35f33.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2156243.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2156243.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4542108.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4542108.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8697821.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8697821.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1200
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7297296.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7297296.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F6⤵
- Creates scheduled task(s)
PID:2508
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4692
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:N"7⤵PID:1308
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:R" /E7⤵PID:4640
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2580
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:N"7⤵PID:2984
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:R" /E7⤵PID:4212
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6702400.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6702400.exe3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:940
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d4301600.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d4301600.exe2⤵
- Executes dropped EXE
PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4212,i,6576818814118437872,11004518367271063231,262144 --variations-seed-version --mojo-platform-channel-handle=1428 /prefetch:81⤵PID:3232
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:2324
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:1408
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173KB
MD509ff9e8194b9ad0696f1a83a1e45a8bd
SHA1bc6cc14f54612d4fb9a8c8cfd911b4c6c465622b
SHA256a4c56e11f4141a85fc9f59202fdca3d1efedc3df744d5ae2cf6f513cbb2a598d
SHA51293724ca75fc0d74f1e02155dbea45d6340f89914a7c22f4ce96518f3aa1214d506b2ceb6771a1501b74ac59e32a0a11bb070d09d17b91ed434f8a58ea5326125
-
Filesize
359KB
MD5f8b39bfd052a81ec0d573ebcaac1c566
SHA193d9f8e6c5dcc5b8b95f039298a5fb58f1d1e968
SHA256e9cb245bfea68f9bf09c96927a2039e0179748356419234cf5d7074ec2dc3fcf
SHA51264326fb13e0cf0ba39aa31fbc7d51e2552b7effec63bf1532a64503497e740238b41f74bfa77d12fce480d59e193735be5c330c2b47225ee9b25102bf4f1a49b
-
Filesize
35KB
MD5022c289b67255f1cae9a045e1ac11c7e
SHA163df7122392ecf04adee9d7b50146871eb860724
SHA25682e2550165ef2417b2b73e68d53b4b2044edff94d615c3cc2e221cb878ffcfd6
SHA5124f26f34a95ad5490ed491079ac38f645b48487cb0e0b7b5abffbb51d49e5294fb498d8c73ed7cd4cecc874dc259ec9d529d8eb4f542d3416ef07a5d7986b2148
-
Filesize
234KB
MD514fe65ca4c39b12df68426389b633aed
SHA10536ff02c6028e3c48420555be37554fc6201c00
SHA256b17e58f21b1a6a41ad1128690f0d562a055d70d0426ba4c394c57c792473e90f
SHA5120b17c1d010132aaae35d58cfc7fe33df11f308d4589b2d48c737c444e77073d3e22f26050b647dbb520728d049cbd2b2eaf3477f893c84ae54dfd22816ceca9d
-
Filesize
11KB
MD51767dda783c36bda069190df01c7467d
SHA14abc5215b48c67b2737aa8b103624cdc11c606c4
SHA25600935df1dc707bc0a575565e8a67f077182679d20e76142d949f1131ada74dca
SHA512a85598f6320fcccae160e7b37b44c572d66e52bc5b8efdcbe581fa3f51fbc4da9995d09415ad2ed4fc1d92dc8008925152a56f0b9703d9add5403dc20fe73208
-
Filesize
223KB
MD53251e050d74c269024a1f95e7c8bb02a
SHA197fea2859babf20a7284918694c62acb9c44ef43
SHA256bd784f2a39cba15491697a55fc222dd825a52729e77fe151621f1d296bab8cb3
SHA512b091edb615306fbb905d90cbb4ffdd5e0b324cba8a2521070997eb733f971bb6b34c65da61b47e752b29f3bbc9a27fd3ed7ab5da385c0a340e556c59e635996a