Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-05-2024 08:13

General

  • Target

    68c37c83076969c58d0363958646c7804b3b22fd50f04aa720bc28b07793816a.exe

  • Size

    514KB

  • MD5

    805f458c4e4cafdc121c09022e7065a1

  • SHA1

    a7876edbb4b0df6770d9de1b3eec3d10b9341f0b

  • SHA256

    68c37c83076969c58d0363958646c7804b3b22fd50f04aa720bc28b07793816a

  • SHA512

    49ae31bcc03ce37884dea632ae0e2f2b46a145d2fbf081f83ab9854aef849a6988a3bc614676f50c9ea2fa209fad269cec271fffaa08fdca610494aea4ecc840

  • SSDEEP

    12288:6Mr+y90vfhcrO1YnhEibozGpgA5UcjKy+:8ykfOrcYloyaKKD

Malware Config

Extracted

Family

amadey

Version

3.85

C2

http://77.91.68.3

Attributes
  • install_dir

    3ec1f323b5

  • install_file

    danke.exe

  • strings_key

    827021be90f1e85ab27949ea7e9347e8

  • url_paths

    /home/love/index.php

rc4.plain

Extracted

Family

redline

Botnet

grom

C2

77.91.68.68:19071

Attributes
  • auth_value

    9ec3129bff410b89097d656d7abc33dc

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\68c37c83076969c58d0363958646c7804b3b22fd50f04aa720bc28b07793816a.exe
    "C:\Users\Admin\AppData\Local\Temp\68c37c83076969c58d0363958646c7804b3b22fd50f04aa720bc28b07793816a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4456
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3918201.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3918201.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3304
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8728502.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8728502.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2876
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1520981.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1520981.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1936
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7964864.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7964864.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1200
          • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
            "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4320
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:3432
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2168
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:4432
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "danke.exe" /P "Admin:N"
                  7⤵
                    PID:1248
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "danke.exe" /P "Admin:R" /E
                    7⤵
                      PID:4908
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:3428
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\3ec1f323b5" /P "Admin:N"
                        7⤵
                          PID:4800
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\3ec1f323b5" /P "Admin:R" /E
                          7⤵
                            PID:4060
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5132843.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5132843.exe
                    3⤵
                    • Executes dropped EXE
                    • Checks SCSI registry key(s)
                    PID:952
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8390114.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8390114.exe
                  2⤵
                  • Executes dropped EXE
                  PID:1432
              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                1⤵
                • Executes dropped EXE
                PID:4532
              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                1⤵
                • Executes dropped EXE
                PID:1200
              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                1⤵
                • Executes dropped EXE
                PID:2468

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8390114.exe
                Filesize

                173KB

                MD5

                8057a194266577b4c40a403b7132883d

                SHA1

                48e608a3d8318d958ff39e6d86c92300f25697b9

                SHA256

                97ffdc0bcd30df2761422c722ec2b0cbd18671e1e76aa4fc3e4074869c6cd644

                SHA512

                b49ec55343454f6e1ca92c7b5617ab73465d9953750757b51d78f40468d3aa1314e4f2ff567a348331bbf3111e3d7f9a642a7935b0d7e1d91fc35bcda1694ea6

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3918201.exe
                Filesize

                359KB

                MD5

                6e73bdbfa5d08ebf1d73023e9ee727dc

                SHA1

                b9ee6a750155a8c2642b5bf3437fda9007678507

                SHA256

                609302e9708f446dc5473b29cacf3c8e4187ad07ea6c88850f242573287ab897

                SHA512

                1277e15f9c2e89d70209034f19533481c9576603e00dedb10867197b1ace4fdf99104b950d8b464010dd3e564cbfdc41fed20f5b06cab637156852ecd05f9d7e

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5132843.exe
                Filesize

                33KB

                MD5

                e4310852aa5e6ffcec01b7a96a99f8d3

                SHA1

                9061a6968a4c1d86c6c566306067507bbb9a3e5c

                SHA256

                242c37b2da275f6caf39aee903155e18501a605549ee169cb0a9086f23fa6250

                SHA512

                ec96f4c0008a67bed43278dd18e28c599e52ff75645377afa7292c4223329ed543f303160ac565d32e155a6df1ed084352d78c786d44c00d23a7dadade9bd614

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8728502.exe
                Filesize

                235KB

                MD5

                7e1c0acf0982e20ee5997894b1883c97

                SHA1

                85725fed96c43bdf60406f80227d08694c86a72b

                SHA256

                e0977088957e4b9c31b6b71eb74f47c24b020d3ab8378b8fedf317a4aa03e2fa

                SHA512

                c0385b7b09d6f892a22485bcde9a5779182e34b4ada86e89387556a0631e35f89e816c49537a0acee712e8da896b98a1f229dcfbbfaaa0395508bbd7e7130040

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1520981.exe
                Filesize

                11KB

                MD5

                1064c8e873b8ef7b683a5228cbc88b8b

                SHA1

                18fd3ab0f542ae640f158b5ac20615c4b1940699

                SHA256

                cad5902d256fd6e9f3a64166925193a0ffbe66db4ec317b38bb76050f3367787

                SHA512

                db04baf087525ab2c23221a977d970ea6c280975c94895d007f676af4ed66b9787c0ab23cf2282046504ef40cf7e936dbd6b57a777f4039ebaf6de17f0fd327d

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7964864.exe
                Filesize

                228KB

                MD5

                e520652f2d0117c0399e40ecdd867ef2

                SHA1

                efdc1c767bb298ecad98b0c88e4e0e960559e23c

                SHA256

                72b1c2d3c1dc93b72614111d2a82ac0573112f98c20dd78ccb292860c1ccb8e0

                SHA512

                060d151bfc6576b6c87def2260c34a90c17d9d3b3384cba446fad221c6994e0989f61ae25b00450384f24813b3014027f391b6d4e829baeb0ab1af891a41bbc6

              • memory/952-40-0x0000000000400000-0x0000000000409000-memory.dmp
                Filesize

                36KB

              • memory/952-41-0x0000000000400000-0x0000000000409000-memory.dmp
                Filesize

                36KB

              • memory/1432-47-0x00000000056B0000-0x0000000005CC8000-memory.dmp
                Filesize

                6.1MB

              • memory/1432-45-0x0000000000630000-0x0000000000660000-memory.dmp
                Filesize

                192KB

              • memory/1432-46-0x0000000004F50000-0x0000000004F56000-memory.dmp
                Filesize

                24KB

              • memory/1432-48-0x00000000051C0000-0x00000000052CA000-memory.dmp
                Filesize

                1.0MB

              • memory/1432-49-0x0000000005100000-0x0000000005112000-memory.dmp
                Filesize

                72KB

              • memory/1432-50-0x0000000005160000-0x000000000519C000-memory.dmp
                Filesize

                240KB

              • memory/1432-51-0x00000000052D0000-0x000000000531C000-memory.dmp
                Filesize

                304KB

              • memory/1936-21-0x00007FFA96AA3000-0x00007FFA96AA5000-memory.dmp
                Filesize

                8KB

              • memory/1936-22-0x0000000000040000-0x000000000004A000-memory.dmp
                Filesize

                40KB