Overview
overview
10Static
static
303cef1108b...25.exe
windows10-2004-x64
10062bf5eda9...2b.exe
windows10-2004-x64
101c0cc29edf...ac.exe
windows10-2004-x64
101c46e1db34...f7.exe
windows10-2004-x64
1020811d5e08...84.exe
windows10-2004-x64
1028627b3333...c8.exe
windows10-2004-x64
10437213eb4b...b5.exe
windows10-2004-x64
1054a19d5a7a...d8.exe
windows10-2004-x64
106407653fb9...7c.exe
windows10-2004-x64
106dd993cade...4e.exe
windows10-2004-x64
10764d92d88b...5f.exe
windows10-2004-x64
109c51d813e0...74.exe
windows7-x64
39c51d813e0...74.exe
windows10-2004-x64
10b813f799e9...17.exe
windows10-2004-x64
10bc2ed7f926...f9.exe
windows10-2004-x64
10c1a9af1ad6...d5.exe
windows10-2004-x64
10cf90d774fa...01.exe
windows10-2004-x64
10e65fa29126...d8.exe
windows10-2004-x64
10e81854abc9...1a.exe
windows10-2004-x64
10ed835b70d5...6c.exe
windows10-2004-x64
10f48c36cb91...ef.exe
windows10-2004-x64
10Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 18:21
Static task
static1
Behavioral task
behavioral1
Sample
03cef1108b01e5304207d3fb3a53f024ec18e0178c6dc16454723a9c7852ab25.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
062bf5eda95fa04c7146882ac1efb5ae43eaee0cd4c121db8c1c2edf9412932b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
1c0cc29edf3fda05ac6cd12ee7acdaf9ca6233c60ef212f53b42d088f670c7ac.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
1c46e1db345610fe8ef6a2fe37c7407b77ab614fd47b00a74971f892275e38f7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
20811d5e089d4e2f65301bba6dbb3776615b8a82ea39cd03d088665a7bf27384.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
28627b333375a37a072336a76d858a5b0758fe2abe01c16f17f6acfab4c573c8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
437213eb4b67386b44ee8203e45489fe45f788fa215cc4f60982184a2231a6b5.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral8
Sample
54a19d5a7a4bbca3496b0edc5d80a240350e944513622d242341964e048d96d8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
6407653fb96eb144397cd5292be81f74ffb0eb8949a8d73e1a21ee3c9e85f97c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
6dd993cadea9e368a14c0ab840b0e2d0dd3ca3d699734998da4237aed7f2354e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
764d92d88ba9348555a1351396433cb6b93afd1bc3dcf27a5a06c2bb7aed5c5f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
9c51d813e0b6dfff0694c63e6d13665bb46ddf09cedb2159d701913f09142374.exe
Resource
win7-20240221-en
Behavioral task
behavioral13
Sample
9c51d813e0b6dfff0694c63e6d13665bb46ddf09cedb2159d701913f09142374.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
b813f799e9c2f3b9ed25625bea968e14cbcad8bb1b3918ebcd79f631192ca017.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
bc2ed7f9261c39ac6c835adcdf9ff7f4b70696ce459a50a2645194f5597507f9.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c1a9af1ad640c504ed95e8f26021a55d127de1e35d0794f2bdaddd1451de08d5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
cf90d774faa53f828a5c0c7fd9b7693ab9e6a5b59349863524aae5284b993f01.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e65fa291263fc43fdfd3ce7a071b11f1ea2a2f55c02321bfd476a1d4c33e7bd8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e81854abc9bd7ae970c918e0839982609691e44919d3a96eee12840676c28e1a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
ed835b70d57f3901ebdd0814415cbc64776d5bb9ee43a7077c0894540d7dde6c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
f48c36cb917c3b50876b9e4240a3abaae73007be0713d0630ca8279bfae862ef.exe
Resource
win10v2004-20240426-en
General
-
Target
1c46e1db345610fe8ef6a2fe37c7407b77ab614fd47b00a74971f892275e38f7.exe
-
Size
514KB
-
MD5
2245adfded81f5615b3656bb86678766
-
SHA1
5a564c26741b1918ee9614d3a032e5fbaa4831c0
-
SHA256
1c46e1db345610fe8ef6a2fe37c7407b77ab614fd47b00a74971f892275e38f7
-
SHA512
74d29b952864b9596037cdaac4e5e8f4435521082aeed7178051e3ef12f07ac23489e2c93b5db259707d11cb07b0a6b74e979ec41ed875d1bedbbbdc1ecbd28d
-
SSDEEP
12288:HMr7y903dIEV7W7qQAKEh+1mehzeG0XIBJny4:cy+IEVSzrEg1mq+gp
Malware Config
Extracted
amadey
3.85
http://77.91.68.3
-
install_dir
3ec1f323b5
-
install_file
danke.exe
-
strings_key
827021be90f1e85ab27949ea7e9347e8
-
url_paths
/home/love/index.php
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3848898.exe healer behavioral4/memory/3708-22-0x00000000007D0000-0x00000000007DA000-memory.dmp healer -
Processes:
a3848898.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a3848898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a3848898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a3848898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a3848898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a3848898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a3848898.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2363282.exe family_redline behavioral4/memory/1384-44-0x0000000000410000-0x0000000000440000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
b2435737.exedanke.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation b2435737.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation danke.exe -
Executes dropped EXE 9 IoCs
Processes:
v2704201.exev8794869.exea3848898.exeb2435737.exedanke.exec8262694.exed2363282.exedanke.exedanke.exepid process 4912 v2704201.exe 3548 v8794869.exe 3708 a3848898.exe 2080 b2435737.exe 3280 danke.exe 3316 c8262694.exe 1384 d2363282.exe 4624 danke.exe 1092 danke.exe -
Processes:
a3848898.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a3848898.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
v8794869.exe1c46e1db345610fe8ef6a2fe37c7407b77ab614fd47b00a74971f892275e38f7.exev2704201.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v8794869.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1c46e1db345610fe8ef6a2fe37c7407b77ab614fd47b00a74971f892275e38f7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2704201.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
c8262694.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c8262694.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c8262694.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c8262694.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
a3848898.exepid process 3708 a3848898.exe 3708 a3848898.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a3848898.exedescription pid process Token: SeDebugPrivilege 3708 a3848898.exe -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
1c46e1db345610fe8ef6a2fe37c7407b77ab614fd47b00a74971f892275e38f7.exev2704201.exev8794869.exeb2435737.exedanke.execmd.exedescription pid process target process PID 3260 wrote to memory of 4912 3260 1c46e1db345610fe8ef6a2fe37c7407b77ab614fd47b00a74971f892275e38f7.exe v2704201.exe PID 3260 wrote to memory of 4912 3260 1c46e1db345610fe8ef6a2fe37c7407b77ab614fd47b00a74971f892275e38f7.exe v2704201.exe PID 3260 wrote to memory of 4912 3260 1c46e1db345610fe8ef6a2fe37c7407b77ab614fd47b00a74971f892275e38f7.exe v2704201.exe PID 4912 wrote to memory of 3548 4912 v2704201.exe v8794869.exe PID 4912 wrote to memory of 3548 4912 v2704201.exe v8794869.exe PID 4912 wrote to memory of 3548 4912 v2704201.exe v8794869.exe PID 3548 wrote to memory of 3708 3548 v8794869.exe a3848898.exe PID 3548 wrote to memory of 3708 3548 v8794869.exe a3848898.exe PID 3548 wrote to memory of 2080 3548 v8794869.exe b2435737.exe PID 3548 wrote to memory of 2080 3548 v8794869.exe b2435737.exe PID 3548 wrote to memory of 2080 3548 v8794869.exe b2435737.exe PID 2080 wrote to memory of 3280 2080 b2435737.exe danke.exe PID 2080 wrote to memory of 3280 2080 b2435737.exe danke.exe PID 2080 wrote to memory of 3280 2080 b2435737.exe danke.exe PID 4912 wrote to memory of 3316 4912 v2704201.exe c8262694.exe PID 4912 wrote to memory of 3316 4912 v2704201.exe c8262694.exe PID 4912 wrote to memory of 3316 4912 v2704201.exe c8262694.exe PID 3280 wrote to memory of 2140 3280 danke.exe schtasks.exe PID 3280 wrote to memory of 2140 3280 danke.exe schtasks.exe PID 3280 wrote to memory of 2140 3280 danke.exe schtasks.exe PID 3280 wrote to memory of 3592 3280 danke.exe cmd.exe PID 3280 wrote to memory of 3592 3280 danke.exe cmd.exe PID 3280 wrote to memory of 3592 3280 danke.exe cmd.exe PID 3592 wrote to memory of 3312 3592 cmd.exe cmd.exe PID 3592 wrote to memory of 3312 3592 cmd.exe cmd.exe PID 3592 wrote to memory of 3312 3592 cmd.exe cmd.exe PID 3592 wrote to memory of 1292 3592 cmd.exe cacls.exe PID 3592 wrote to memory of 1292 3592 cmd.exe cacls.exe PID 3592 wrote to memory of 1292 3592 cmd.exe cacls.exe PID 3592 wrote to memory of 2736 3592 cmd.exe cacls.exe PID 3592 wrote to memory of 2736 3592 cmd.exe cacls.exe PID 3592 wrote to memory of 2736 3592 cmd.exe cacls.exe PID 3592 wrote to memory of 964 3592 cmd.exe cmd.exe PID 3592 wrote to memory of 964 3592 cmd.exe cmd.exe PID 3592 wrote to memory of 964 3592 cmd.exe cmd.exe PID 3592 wrote to memory of 4432 3592 cmd.exe cacls.exe PID 3592 wrote to memory of 4432 3592 cmd.exe cacls.exe PID 3592 wrote to memory of 4432 3592 cmd.exe cacls.exe PID 3592 wrote to memory of 4492 3592 cmd.exe cacls.exe PID 3592 wrote to memory of 4492 3592 cmd.exe cacls.exe PID 3592 wrote to memory of 4492 3592 cmd.exe cacls.exe PID 3260 wrote to memory of 1384 3260 1c46e1db345610fe8ef6a2fe37c7407b77ab614fd47b00a74971f892275e38f7.exe d2363282.exe PID 3260 wrote to memory of 1384 3260 1c46e1db345610fe8ef6a2fe37c7407b77ab614fd47b00a74971f892275e38f7.exe d2363282.exe PID 3260 wrote to memory of 1384 3260 1c46e1db345610fe8ef6a2fe37c7407b77ab614fd47b00a74971f892275e38f7.exe d2363282.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c46e1db345610fe8ef6a2fe37c7407b77ab614fd47b00a74971f892275e38f7.exe"C:\Users\Admin\AppData\Local\Temp\1c46e1db345610fe8ef6a2fe37c7407b77ab614fd47b00a74971f892275e38f7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2704201.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2704201.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8794869.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8794869.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3848898.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3848898.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3708
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2435737.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2435737.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F6⤵
- Creates scheduled task(s)
PID:2140
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3312
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:N"7⤵PID:1292
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:R" /E7⤵PID:2736
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:964
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:N"7⤵PID:4432
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:R" /E7⤵PID:4492
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c8262694.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c8262694.exe3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:3316
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2363282.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2363282.exe2⤵
- Executes dropped EXE
PID:1384
-
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:4624
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:1092
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173KB
MD5b7e21b46ca162782296a9e201d99ff06
SHA1ed2038b10d2047512045db6e5989cde60109cf3e
SHA256ee394f57217e6ff415326451320ba931cb83bf678e5d6316f32c7ba2d4b83d7b
SHA512539414fb636c924923d3c664368304bfc86968c36ff050b2c3c6622840c7ffe468f6785cc37c0cc9289194d27b2b0be84bd2a4bf2f698f8bd845f0f945f1226e
-
Filesize
359KB
MD558e6cc25a9792b8beecc64cddc879b26
SHA1bb2142e4e49cb123f1ed9cc12286b8cd5af78ad4
SHA256f95ecfb70a7c1e02b921e19ad5af2f00773c7c533ac12e19af18182ef63562b4
SHA512c97dd36d7b543850e8ebd393c6d4ad2bc7c50a5820a0d567da9c681508f48e5a9e4bf418340560238e4f13f21711c62215f8e0a05777ef4f7b1cf3fc05c5fe51
-
Filesize
32KB
MD52d91d81ac965bfeb635da7ad8cfe7c65
SHA144f1d984702dde8f182f6491d71c8912160a8c63
SHA2567fbf96cc89463da90fa962ea3ff11cebd0d742176e669631019787fe9c9e1430
SHA512899f9ba01b937f3dbc5ed38bd4f43a7f91f167841f23ddac6dfc3d8c4ccfae25c169c0bb77aa555b25bdc37f062cda122791211e664846cbc2ce75bb19c55d4b
-
Filesize
235KB
MD59caa7cdef31cf7432bf45402e6e92c20
SHA1bac911fb0a29fabf4082646a8a1015815b2a49d0
SHA256b9dc26ca43f95dbffc2186e57112006b646c6580c041a0366d03d86903c85488
SHA5127d4d380d67ea52193279793ac2fa1c1511e6d35a5358c985f0dae457ed34a861ad0cbb544db5fba2a3b19bcf264dc35c501c01f3298c3276105818dc3db86bbc
-
Filesize
14KB
MD5abe6da30d5e53e26b5c4885ddfb2f676
SHA17abb5addb3a909fca080dfb1b44235fe485da7db
SHA25665016359f4e11c6ca9486de582abdc662258c28d17e930c19f53a35f15597ddb
SHA512bdc1d5ebeaa76533ac88f5733500506976c44686c2797a030333717dcf1f8aebde2922bde866023326b8f21795df2c79c1c2071f51764d1cb268ce4382c75a97
-
Filesize
227KB
MD59b8344440004fc62c70df3f29a9180b8
SHA135d765eb1dff286f71dd8059519afe5782259d9f
SHA256273874857365a41f7957d83ad9dc3265902fa85403b4ae77bc09d5064a99fab1
SHA51267f482c18f95dbff9b198296979a2309be145caa9ff81302e60da19b1b9e4b2d1ece489409fb3a842501c451b3768317f371f9e11d778920d1e00e3aef94470a