Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-05-2024 12:29

General

  • Target

    b72cfb25178ac78d0dfae350873df231a1f4266a913f47acc5018b87cae84bdf.exe

  • Size

    514KB

  • MD5

    1a923777979bd128a48a6763dc11d9e9

  • SHA1

    49fedd0810c09f8ba69ec86fd6640b15d51b5e85

  • SHA256

    b72cfb25178ac78d0dfae350873df231a1f4266a913f47acc5018b87cae84bdf

  • SHA512

    590fdd6a3a9a3ca0acf772624b47eb40016390d484bf0a3e61eea2afb091b8387c29a24ec6e9113240281e4b4b380e060bec08a1d400ac7f92ad6c24f2927aa0

  • SSDEEP

    12288:pMrdy90UCukTJyxW8iKhhYuEzBuu2wgmF2bq:MyxFkTJy5zP9bbq

Malware Config

Extracted

Family

amadey

Version

3.86

C2

http://77.91.68.61

Attributes
  • install_dir

    925e7e99c5

  • install_file

    pdates.exe

  • strings_key

    ada76b8b0e1f6892ee93c20ab8946117

  • url_paths

    /rock/index.php

rc4.plain

Extracted

Family

redline

Botnet

lande

C2

77.91.124.84:19071

Attributes
  • auth_value

    9fa41701c47df37786234f3373f21208

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b72cfb25178ac78d0dfae350873df231a1f4266a913f47acc5018b87cae84bdf.exe
    "C:\Users\Admin\AppData\Local\Temp\b72cfb25178ac78d0dfae350873df231a1f4266a913f47acc5018b87cae84bdf.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6653264.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6653264.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:864
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2222652.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2222652.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4260
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7534464.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7534464.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3620
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3015164.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3015164.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3180
          • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
            "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1916
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:3840
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4500
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:1588
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "pdates.exe" /P "Admin:N"
                  7⤵
                    PID:2908
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "pdates.exe" /P "Admin:R" /E
                    7⤵
                      PID:3308
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:2504
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\925e7e99c5" /P "Admin:N"
                        7⤵
                          PID:3056
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\925e7e99c5" /P "Admin:R" /E
                          7⤵
                            PID:3816
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c4556430.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c4556430.exe
                    3⤵
                    • Executes dropped EXE
                    • Checks SCSI registry key(s)
                    PID:4180
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1853109.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1853109.exe
                  2⤵
                  • Executes dropped EXE
                  PID:2540
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:1000
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:4712
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:1484

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1853109.exe

                Filesize

                175KB

                MD5

                257b3b2a8fd11a9c26682c5c34ff230f

                SHA1

                c19af2e2d29a96cbf73a54941f398a14c6ba8f14

                SHA256

                2a55756c92b3e9e68116c3617777d07720069a3e0fae13d59412a03f7f5f42c1

                SHA512

                35c8ff10783734d68ae3036845e28f2114f60623aeec5dda81f62adadcf26338fa53fbda810bfa94b1530f30cd44018ae608407de2951177357552d9bfdf4368

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6653264.exe

                Filesize

                359KB

                MD5

                e7fa26de9c820baea690459babf2fbe2

                SHA1

                2ef86403777796d2dc2751f4abb0b42e483a9a90

                SHA256

                630b3bd990cf3a7b799c0a8757ec0da95eb2bc811a803790cd5dd59b96a6ae12

                SHA512

                eaa136102af8ce5e1c93a08854c3ca6b768a546bde6b9ba123b0f7f23509155daebbcf221f299c1a44cac81a9690796d317baef311c7fd96c8403d1d6b1f441b

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c4556430.exe

                Filesize

                36KB

                MD5

                99e4fbaf61eda1a131a0fb9d2db25f6e

                SHA1

                dfbba00b8a56e4405fa1911cf4d1f3466fcdf0e9

                SHA256

                51e82b55c6b0908e8c31d12c5d8160a29addde641ea77b11ab4e229d67d89df3

                SHA512

                bf0d17b89b745982ecd8c0773c63fa68e86e3893f3ee4829e50cf7ea647f54b236fb1c4a16811d2e91b5f2b32bd119968eb905e34bb59ba17badbe4c5a043ff5

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2222652.exe

                Filesize

                234KB

                MD5

                ef013b3a532e703d4d2c2b5cd426bc90

                SHA1

                74f878cbd5dcd5ebdabf43c262f95ae0c1a697ae

                SHA256

                a264decd1d4218a6f799938cf789727b2fd2fc2a2f5d29abdbbb3a582213a875

                SHA512

                d92fc62a03d6ab3fd5b676c2c5eb6da3dad100a6d5753a364ab1196742b20b66f993c649ef7bf9b96b233935bc2a8698c1ae3af2cf86d6a133f44eb85dc69233

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7534464.exe

                Filesize

                13KB

                MD5

                64fef4cf6fc7cd982c1e3967385b6dc8

                SHA1

                30f307ad0ff6a2bf5c90743f09fb2b53705e9660

                SHA256

                f7ce92d9f78ff144184570d99e5951f58f6f3b8bcab899f785cea40643e43243

                SHA512

                b4875804448ce8d04f4b4138cf4228f25986f6e84bd0523706a4283def46be864ba07584019afbb7e52cb0b2dc997de0288f7062962c11a8515d12f1c1f0119c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3015164.exe

                Filesize

                225KB

                MD5

                9ecc4e0e5e82fc7bc093b19a6f4de2eb

                SHA1

                1f6e4556dee5c075dfb06bbd4f9bbfbffc926347

                SHA256

                eb6991a258a7ae91ffb2d4d170508562eff82c059cf2c58e6500730183cc34bc

                SHA512

                9c93be0e7e18c7a5f27a68da43ca5a926c71b14468d8e66b3fff51458996f7ed9d3a9c0a9e12ef947ea130ad53787606afe50f307e0efdabda52755ed8323bd7

              • memory/2540-47-0x0000000004CE0000-0x0000000004DEA000-memory.dmp

                Filesize

                1.0MB

              • memory/2540-44-0x00000000000A0000-0x00000000000D0000-memory.dmp

                Filesize

                192KB

              • memory/2540-45-0x0000000002500000-0x0000000002506000-memory.dmp

                Filesize

                24KB

              • memory/2540-46-0x00000000051F0000-0x0000000005808000-memory.dmp

                Filesize

                6.1MB

              • memory/2540-48-0x0000000004B70000-0x0000000004B82000-memory.dmp

                Filesize

                72KB

              • memory/2540-49-0x0000000004C10000-0x0000000004C4C000-memory.dmp

                Filesize

                240KB

              • memory/2540-50-0x0000000004C50000-0x0000000004C9C000-memory.dmp

                Filesize

                304KB

              • memory/3620-22-0x00007FF9D6073000-0x00007FF9D6075000-memory.dmp

                Filesize

                8KB

              • memory/3620-21-0x00000000008F0000-0x00000000008FA000-memory.dmp

                Filesize

                40KB

              • memory/4180-40-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB