Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-05-2024 12:33

General

  • Target

    b72cfb25178ac78d0dfae350873df231a1f4266a913f47acc5018b87cae84bdf.exe

  • Size

    514KB

  • MD5

    1a923777979bd128a48a6763dc11d9e9

  • SHA1

    49fedd0810c09f8ba69ec86fd6640b15d51b5e85

  • SHA256

    b72cfb25178ac78d0dfae350873df231a1f4266a913f47acc5018b87cae84bdf

  • SHA512

    590fdd6a3a9a3ca0acf772624b47eb40016390d484bf0a3e61eea2afb091b8387c29a24ec6e9113240281e4b4b380e060bec08a1d400ac7f92ad6c24f2927aa0

  • SSDEEP

    12288:pMrdy90UCukTJyxW8iKhhYuEzBuu2wgmF2bq:MyxFkTJy5zP9bbq

Malware Config

Extracted

Family

amadey

Version

3.86

C2

http://77.91.68.61

Attributes
  • install_dir

    925e7e99c5

  • install_file

    pdates.exe

  • strings_key

    ada76b8b0e1f6892ee93c20ab8946117

  • url_paths

    /rock/index.php

rc4.plain

Extracted

Family

redline

Botnet

lande

C2

77.91.124.84:19071

Attributes
  • auth_value

    9fa41701c47df37786234f3373f21208

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b72cfb25178ac78d0dfae350873df231a1f4266a913f47acc5018b87cae84bdf.exe
    "C:\Users\Admin\AppData\Local\Temp\b72cfb25178ac78d0dfae350873df231a1f4266a913f47acc5018b87cae84bdf.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1920
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6653264.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6653264.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3768
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2222652.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2222652.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1488
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7534464.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7534464.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2196
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3015164.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3015164.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1008
          • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
            "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1044
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:1036
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2764
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:2596
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "pdates.exe" /P "Admin:N"
                  7⤵
                    PID:4220
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "pdates.exe" /P "Admin:R" /E
                    7⤵
                      PID:528
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:3136
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\925e7e99c5" /P "Admin:N"
                        7⤵
                          PID:1972
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\925e7e99c5" /P "Admin:R" /E
                          7⤵
                            PID:2156
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c4556430.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c4556430.exe
                    3⤵
                    • Executes dropped EXE
                    • Checks SCSI registry key(s)
                    PID:4920
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1853109.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1853109.exe
                  2⤵
                  • Executes dropped EXE
                  PID:4736
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:852
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:3148
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe start wuauserv
                1⤵
                • Launches sc.exe
                PID:4436
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:2688

              Network

              MITRE ATT&CK Matrix ATT&CK v13

              Execution

              Scheduled Task/Job

              1
              T1053

              Persistence

              Create or Modify System Process

              1
              T1543

              Windows Service

              1
              T1543.003

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Scheduled Task/Job

              1
              T1053

              Privilege Escalation

              Create or Modify System Process

              1
              T1543

              Windows Service

              1
              T1543.003

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Scheduled Task/Job

              1
              T1053

              Defense Evasion

              Modify Registry

              3
              T1112

              Impair Defenses

              2
              T1562

              Disable or Modify Tools

              2
              T1562.001

              Discovery

              Query Registry

              2
              T1012

              System Information Discovery

              3
              T1082

              Peripheral Device Discovery

              1
              T1120

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1853109.exe
                Filesize

                175KB

                MD5

                257b3b2a8fd11a9c26682c5c34ff230f

                SHA1

                c19af2e2d29a96cbf73a54941f398a14c6ba8f14

                SHA256

                2a55756c92b3e9e68116c3617777d07720069a3e0fae13d59412a03f7f5f42c1

                SHA512

                35c8ff10783734d68ae3036845e28f2114f60623aeec5dda81f62adadcf26338fa53fbda810bfa94b1530f30cd44018ae608407de2951177357552d9bfdf4368

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6653264.exe
                Filesize

                359KB

                MD5

                e7fa26de9c820baea690459babf2fbe2

                SHA1

                2ef86403777796d2dc2751f4abb0b42e483a9a90

                SHA256

                630b3bd990cf3a7b799c0a8757ec0da95eb2bc811a803790cd5dd59b96a6ae12

                SHA512

                eaa136102af8ce5e1c93a08854c3ca6b768a546bde6b9ba123b0f7f23509155daebbcf221f299c1a44cac81a9690796d317baef311c7fd96c8403d1d6b1f441b

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c4556430.exe
                Filesize

                36KB

                MD5

                99e4fbaf61eda1a131a0fb9d2db25f6e

                SHA1

                dfbba00b8a56e4405fa1911cf4d1f3466fcdf0e9

                SHA256

                51e82b55c6b0908e8c31d12c5d8160a29addde641ea77b11ab4e229d67d89df3

                SHA512

                bf0d17b89b745982ecd8c0773c63fa68e86e3893f3ee4829e50cf7ea647f54b236fb1c4a16811d2e91b5f2b32bd119968eb905e34bb59ba17badbe4c5a043ff5

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2222652.exe
                Filesize

                234KB

                MD5

                ef013b3a532e703d4d2c2b5cd426bc90

                SHA1

                74f878cbd5dcd5ebdabf43c262f95ae0c1a697ae

                SHA256

                a264decd1d4218a6f799938cf789727b2fd2fc2a2f5d29abdbbb3a582213a875

                SHA512

                d92fc62a03d6ab3fd5b676c2c5eb6da3dad100a6d5753a364ab1196742b20b66f993c649ef7bf9b96b233935bc2a8698c1ae3af2cf86d6a133f44eb85dc69233

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7534464.exe
                Filesize

                13KB

                MD5

                64fef4cf6fc7cd982c1e3967385b6dc8

                SHA1

                30f307ad0ff6a2bf5c90743f09fb2b53705e9660

                SHA256

                f7ce92d9f78ff144184570d99e5951f58f6f3b8bcab899f785cea40643e43243

                SHA512

                b4875804448ce8d04f4b4138cf4228f25986f6e84bd0523706a4283def46be864ba07584019afbb7e52cb0b2dc997de0288f7062962c11a8515d12f1c1f0119c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3015164.exe
                Filesize

                225KB

                MD5

                9ecc4e0e5e82fc7bc093b19a6f4de2eb

                SHA1

                1f6e4556dee5c075dfb06bbd4f9bbfbffc926347

                SHA256

                eb6991a258a7ae91ffb2d4d170508562eff82c059cf2c58e6500730183cc34bc

                SHA512

                9c93be0e7e18c7a5f27a68da43ca5a926c71b14468d8e66b3fff51458996f7ed9d3a9c0a9e12ef947ea130ad53787606afe50f307e0efdabda52755ed8323bd7

              • memory/2196-21-0x00000000006B0000-0x00000000006BA000-memory.dmp
                Filesize

                40KB

              • memory/2196-22-0x00007FFE62AC3000-0x00007FFE62AC5000-memory.dmp
                Filesize

                8KB

              • memory/4736-45-0x0000000000740000-0x0000000000770000-memory.dmp
                Filesize

                192KB

              • memory/4736-46-0x0000000004F60000-0x0000000004F66000-memory.dmp
                Filesize

                24KB

              • memory/4736-47-0x000000000AB70000-0x000000000B188000-memory.dmp
                Filesize

                6.1MB

              • memory/4736-48-0x000000000A6F0000-0x000000000A7FA000-memory.dmp
                Filesize

                1.0MB

              • memory/4736-49-0x000000000A630000-0x000000000A642000-memory.dmp
                Filesize

                72KB

              • memory/4736-50-0x000000000A690000-0x000000000A6CC000-memory.dmp
                Filesize

                240KB

              • memory/4736-51-0x00000000028D0000-0x000000000291C000-memory.dmp
                Filesize

                304KB

              • memory/4920-40-0x0000000000400000-0x0000000000409000-memory.dmp
                Filesize

                36KB