Analysis

  • max time kernel
    148s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-05-2024 13:09

General

  • Target

    136b546d35913e21d69572f169ae203809c1521256619595aa6b15d763436c01.exe

  • Size

    514KB

  • MD5

    2ad41d644161496d089d17fdd8d829ed

  • SHA1

    5353f2219c0942b87a463658c7c57e4eb717e14c

  • SHA256

    136b546d35913e21d69572f169ae203809c1521256619595aa6b15d763436c01

  • SHA512

    ffba38e48ac854b9677aa86b54f40ae2e32854f441b7384eab914370c621fb2e25d30879adf86891c2ac9bf20caa3f17e777bda26d395cff2788f5dea8ff14d3

  • SSDEEP

    6144:KMy+bnr+pp0yN90QE3F0y6b9bDenEqXctZ2x1vdHsTdkuzy6lZOTbp84K/F+Gvln:8Mrxy905F0DBb8MsiqRu418yG6BGj0S

Malware Config

Extracted

Family

amadey

Version

3.86

C2

http://77.91.68.61

Attributes
  • install_dir

    925e7e99c5

  • install_file

    pdates.exe

  • strings_key

    ada76b8b0e1f6892ee93c20ab8946117

  • url_paths

    /rock/index.php

rc4.plain

Extracted

Family

redline

Botnet

krast

C2

77.91.68.68:19071

Attributes
  • auth_value

    9059ea331e4599de3746df73ccb24514

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\136b546d35913e21d69572f169ae203809c1521256619595aa6b15d763436c01.exe
    "C:\Users\Admin\AppData\Local\Temp\136b546d35913e21d69572f169ae203809c1521256619595aa6b15d763436c01.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3812
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7683048.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7683048.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2632
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2538163.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2538163.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1032
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8043257.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8043257.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4136
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8513497.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8513497.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1216
          • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
            "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2568
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:3024
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4512
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:1544
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "pdates.exe" /P "Admin:N"
                  7⤵
                    PID:3472
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "pdates.exe" /P "Admin:R" /E
                    7⤵
                      PID:3000
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:2604
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\925e7e99c5" /P "Admin:N"
                        7⤵
                          PID:3968
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\925e7e99c5" /P "Admin:R" /E
                          7⤵
                            PID:4928
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0003853.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0003853.exe
                    3⤵
                    • Executes dropped EXE
                    • Checks SCSI registry key(s)
                    PID:4672
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6120877.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6120877.exe
                  2⤵
                  • Executes dropped EXE
                  PID:936
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:3188
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:1076

              Network

              MITRE ATT&CK Matrix ATT&CK v13

              Execution

              Scheduled Task/Job

              1
              T1053

              Persistence

              Create or Modify System Process

              1
              T1543

              Windows Service

              1
              T1543.003

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Scheduled Task/Job

              1
              T1053

              Privilege Escalation

              Create or Modify System Process

              1
              T1543

              Windows Service

              1
              T1543.003

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Scheduled Task/Job

              1
              T1053

              Defense Evasion

              Modify Registry

              3
              T1112

              Impair Defenses

              2
              T1562

              Disable or Modify Tools

              2
              T1562.001

              Discovery

              Query Registry

              2
              T1012

              System Information Discovery

              3
              T1082

              Peripheral Device Discovery

              1
              T1120

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6120877.exe
                Filesize

                172KB

                MD5

                b4e645e86f9c734c67eae379df6f4a9a

                SHA1

                b83783629138441cd29e7e458ab4674a871171c3

                SHA256

                0fecb3e2d66bee2c7df80b58166684f3e1ca5a658bfc320d70e067199763086f

                SHA512

                e23193579d2cde966cc8dfd98d40f776c6b9c8684d5ce6d5e9d18e543e4bc217e185a541735364bf8571d39dd2641bfa3495d59ca0ddbb048c92d17ce9178184

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7683048.exe
                Filesize

                359KB

                MD5

                17332abda5233f92b5d46c7129dad846

                SHA1

                c7d990591355e6988c5466640eb78e54dcc2e302

                SHA256

                ddfcd0b0522fe7f3a66080c2b6333eb5f7a503604fc76eaee438af682f2d07a4

                SHA512

                3d1c6678e467003576b981b3093df2b95d457bf46d74821ce51015268b7d61666f86710a893d4e8dda7a9583a6b987cd15897c4fcd618adf25962f17207bb3d7

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0003853.exe
                Filesize

                35KB

                MD5

                0d304db5e5b152bb08b93caba5a2d025

                SHA1

                305dd8884ed442f1e2b87ddc9d99598715a61c21

                SHA256

                4c5bc68a3e120a583b90f83f158d22dd67ef9b4bc0ce66b57b130877569dfc71

                SHA512

                1ae21e5d8b19ff67fc0e5d42052314d67d72639cfdbe7a04538578e16d5585587ec1704f830df05392c9e5e92185e0b2e6fd914c1ce7131c3789be8072722060

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2538163.exe
                Filesize

                234KB

                MD5

                8494092bb93d80ddf730b1119315a031

                SHA1

                014bb057cd19d4968e160c7a9c231b2932436152

                SHA256

                3d140eebec64936b8b093214a0e589f8ae995b0fe0b8635597c5378284298611

                SHA512

                e7114b1b3fcd6ac28b3088cce2d116b7252fd0431cdbcd785b847f30df87bca6f732e952301ed5a595ced88d4125d0996881a5deb321be3432eafaec4aae45f4

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8043257.exe
                Filesize

                11KB

                MD5

                011e97057df685ee7620914e53d80c08

                SHA1

                ac78a1ebffc0cce4e987c17d79c8c61db8d4323f

                SHA256

                a4941dfa59a520e9bcd49d313a2db0770789e7df586131061fe0d5960920941f

                SHA512

                8834c2e0977eec550529ca8d3a8956849df2834c8667e8623adc83ec665610a4b1e03f1d1e007d083c5d8e79dc5af84a79ceff3af5dcaca7f4b2c8579bc1e2bc

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8513497.exe
                Filesize

                223KB

                MD5

                eaf4f611e83549958aae0501949e6113

                SHA1

                5ccdba08aa690d238bea6aca39cc70fb5dc4929e

                SHA256

                9b9f97512cf3c162f6952a330b6dfbcf5c3237886fce33aa47a10278e1b460ff

                SHA512

                2ee132317513d0c353208abcae8a7703845bf956ed1be9cfdf96abfb1e80c7243dc394b2c274cccded98d42b2b2cf1031984ba7cb0530197598eb35ccf1ed79f

              • memory/936-47-0x000000000A360000-0x000000000A46A000-memory.dmp
                Filesize

                1.0MB

              • memory/936-44-0x00000000004F0000-0x0000000000520000-memory.dmp
                Filesize

                192KB

              • memory/936-45-0x0000000007160000-0x0000000007166000-memory.dmp
                Filesize

                24KB

              • memory/936-46-0x000000000A7E0000-0x000000000ADF8000-memory.dmp
                Filesize

                6.1MB

              • memory/936-48-0x000000000A2A0000-0x000000000A2B2000-memory.dmp
                Filesize

                72KB

              • memory/936-49-0x000000000A300000-0x000000000A33C000-memory.dmp
                Filesize

                240KB

              • memory/936-50-0x0000000002640000-0x000000000268C000-memory.dmp
                Filesize

                304KB

              • memory/4136-22-0x0000000000C40000-0x0000000000C4A000-memory.dmp
                Filesize

                40KB

              • memory/4136-21-0x00007FFB81C23000-0x00007FFB81C25000-memory.dmp
                Filesize

                8KB

              • memory/4672-40-0x0000000000400000-0x0000000000409000-memory.dmp
                Filesize

                36KB