Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/11/2024, 05:45
Static task
static1
Behavioral task
behavioral1
Sample
99aba006f0b570e62e072dca26996e92b876227bc6f4b85117d39adec3cb4a96.exe
Resource
win10v2004-20241007-en
General
-
Target
99aba006f0b570e62e072dca26996e92b876227bc6f4b85117d39adec3cb4a96.exe
-
Size
642KB
-
MD5
53f933f011bc702fbc354f4392049d29
-
SHA1
2337f02d13c7078b38291eb169c371a507011fb5
-
SHA256
99aba006f0b570e62e072dca26996e92b876227bc6f4b85117d39adec3cb4a96
-
SHA512
ddb6a58654307dc76b03414b0a3ea8a72dae5aa4d50fa7c7ca298eb1908c0b4f0e17a65d73f5dec362cfeec1786597bed751eee00cb33cdb70cb469995386e94
-
SSDEEP
12288:9MrLy90A2Z/OzbtCrPeFotrt6midImA2wqK6n3/S+rkU67zVnMRDn:Cyt2szbgrmypidIX+rvgpnMRDn
Malware Config
Extracted
amadey
3.86
88c8bb
http://77.91.68.61
-
install_dir
925e7e99c5
-
install_file
pdates.exe
-
strings_key
ada76b8b0e1f6892ee93c20ab8946117
-
url_paths
/rock/index.php
Extracted
redline
gotad
77.91.124.84:19071
-
auth_value
3fb7c1f3fcf68bc377eae3f6f493a684
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023cab-26.dat healer behavioral1/memory/3652-28-0x0000000000240000-0x000000000024A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8988234.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8988234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a8988234.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8988234.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8988234.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8988234.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023ca6-50.dat family_redline behavioral1/memory/2288-52-0x0000000000C60000-0x0000000000C90000-memory.dmp family_redline -
Redline family
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation pdates.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation b4161694.exe -
Executes dropped EXE 11 IoCs
pid Process 1032 v9020170.exe 3044 v7783843.exe 4952 v0697886.exe 3652 a8988234.exe 4080 b4161694.exe 4112 pdates.exe 1424 c8916518.exe 2984 pdates.exe 2288 d8927775.exe 760 pdates.exe 3284 pdates.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a8988234.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 99aba006f0b570e62e072dca26996e92b876227bc6f4b85117d39adec3cb4a96.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v9020170.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v7783843.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v0697886.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4161694.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8916518.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 99aba006f0b570e62e072dca26996e92b876227bc6f4b85117d39adec3cb4a96.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v7783843.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v9020170.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d8927775.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdates.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v0697886.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c8916518.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c8916518.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c8916518.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3288 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3652 a8988234.exe 3652 a8988234.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3652 a8988234.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4080 b4161694.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3112 wrote to memory of 1032 3112 99aba006f0b570e62e072dca26996e92b876227bc6f4b85117d39adec3cb4a96.exe 84 PID 3112 wrote to memory of 1032 3112 99aba006f0b570e62e072dca26996e92b876227bc6f4b85117d39adec3cb4a96.exe 84 PID 3112 wrote to memory of 1032 3112 99aba006f0b570e62e072dca26996e92b876227bc6f4b85117d39adec3cb4a96.exe 84 PID 1032 wrote to memory of 3044 1032 v9020170.exe 85 PID 1032 wrote to memory of 3044 1032 v9020170.exe 85 PID 1032 wrote to memory of 3044 1032 v9020170.exe 85 PID 3044 wrote to memory of 4952 3044 v7783843.exe 86 PID 3044 wrote to memory of 4952 3044 v7783843.exe 86 PID 3044 wrote to memory of 4952 3044 v7783843.exe 86 PID 4952 wrote to memory of 3652 4952 v0697886.exe 87 PID 4952 wrote to memory of 3652 4952 v0697886.exe 87 PID 4952 wrote to memory of 4080 4952 v0697886.exe 96 PID 4952 wrote to memory of 4080 4952 v0697886.exe 96 PID 4952 wrote to memory of 4080 4952 v0697886.exe 96 PID 4080 wrote to memory of 4112 4080 b4161694.exe 97 PID 4080 wrote to memory of 4112 4080 b4161694.exe 97 PID 4080 wrote to memory of 4112 4080 b4161694.exe 97 PID 3044 wrote to memory of 1424 3044 v7783843.exe 98 PID 3044 wrote to memory of 1424 3044 v7783843.exe 98 PID 3044 wrote to memory of 1424 3044 v7783843.exe 98 PID 4112 wrote to memory of 3288 4112 pdates.exe 99 PID 4112 wrote to memory of 3288 4112 pdates.exe 99 PID 4112 wrote to memory of 3288 4112 pdates.exe 99 PID 4112 wrote to memory of 3272 4112 pdates.exe 101 PID 4112 wrote to memory of 3272 4112 pdates.exe 101 PID 4112 wrote to memory of 3272 4112 pdates.exe 101 PID 3272 wrote to memory of 4004 3272 cmd.exe 103 PID 3272 wrote to memory of 4004 3272 cmd.exe 103 PID 3272 wrote to memory of 4004 3272 cmd.exe 103 PID 3272 wrote to memory of 2616 3272 cmd.exe 104 PID 3272 wrote to memory of 2616 3272 cmd.exe 104 PID 3272 wrote to memory of 2616 3272 cmd.exe 104 PID 3272 wrote to memory of 1960 3272 cmd.exe 105 PID 3272 wrote to memory of 1960 3272 cmd.exe 105 PID 3272 wrote to memory of 1960 3272 cmd.exe 105 PID 3272 wrote to memory of 1768 3272 cmd.exe 106 PID 3272 wrote to memory of 1768 3272 cmd.exe 106 PID 3272 wrote to memory of 1768 3272 cmd.exe 106 PID 3272 wrote to memory of 2064 3272 cmd.exe 107 PID 3272 wrote to memory of 2064 3272 cmd.exe 107 PID 3272 wrote to memory of 2064 3272 cmd.exe 107 PID 3272 wrote to memory of 4388 3272 cmd.exe 108 PID 3272 wrote to memory of 4388 3272 cmd.exe 108 PID 3272 wrote to memory of 4388 3272 cmd.exe 108 PID 1032 wrote to memory of 2288 1032 v9020170.exe 116 PID 1032 wrote to memory of 2288 1032 v9020170.exe 116 PID 1032 wrote to memory of 2288 1032 v9020170.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\99aba006f0b570e62e072dca26996e92b876227bc6f4b85117d39adec3cb4a96.exe"C:\Users\Admin\AppData\Local\Temp\99aba006f0b570e62e072dca26996e92b876227bc6f4b85117d39adec3cb4a96.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9020170.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9020170.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7783843.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7783843.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0697886.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0697886.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8988234.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8988234.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3652
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4161694.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4161694.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3288
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵
- System Location Discovery: System Language Discovery
PID:4004
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:N"8⤵
- System Location Discovery: System Language Discovery
PID:2616
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:R" /E8⤵
- System Location Discovery: System Language Discovery
PID:1960
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵
- System Location Discovery: System Language Discovery
PID:1768
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:N"8⤵
- System Location Discovery: System Language Discovery
PID:2064
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:R" /E8⤵
- System Location Discovery: System Language Discovery
PID:4388
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8916518.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8916518.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:1424
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d8927775.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d8927775.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2288
-
-
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:2984
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:760
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:3284
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD53d1d1b1990f8510f48f5bd2da58d2578
SHA13a661c086ce2cbdb65e5de4e2a34f4d43dba3bc0
SHA25647696b2953720685a486317ba3044db02e2905c53a57e8a8eb0387f87364a7b0
SHA512d6d9d6892db154fb12ae406f3871d4bd23dbb317d5cefb2d5b512bfaddb69806a7dfd3aa784fc76e737b0b66d07cf2c924640fc217268401a09c682ec5052240
-
Filesize
514KB
MD52401a7894da407c10621b27aca607015
SHA10c1635864a540b446b6987e29c60f4dc49dbe220
SHA256937f75c777cfe050d79afe845b1bd29bdb9f09e838d399030953023600084498
SHA5128444bd84cccb41ce6007e7215cf6ab03ce0afc4a55a0514058fd83190470a7670deffe96293034027225f253d37b3b0aeca0141348198fc596850c96882c6ced
-
Filesize
172KB
MD5c5b5af18d113a5a984a8f19b5d5bd8b1
SHA14fa7e09268cdc71b7eddcdd36cf6f127346d9f2e
SHA256540b945d993881f5d913957141606360daf4c361c757bca367e11ebaf4008520
SHA51281b286daef859481f38e7952c8fe77893f8c9d04b1e875d8efaa5ff2975d44e911685b726b9ef4999cf1b293e5ce8cb77d0cba6e3b43f296934ee2b25da9cb7d
-
Filesize
359KB
MD57bc1b939384a34d898c82212597c1dc7
SHA11e7cdb9e0a16fcc5e9b08af652ca6a364f11a589
SHA25605a839160e8f6b1a74932115b15af78b3b479daa38e406b66e962202095bd36c
SHA51231e94f930d808fe817684bcf502058f3cbeed7581d6e6b0092cddf2b9f701a346f8010ae419e465fd6ce2d9d3a21d7e8fc45c3f472ef76f8b50b987a28927920
-
Filesize
36KB
MD56f17a927c6ea770f5d46013d5ba661b6
SHA13de9ab8df424b8c23a77e23e689b2fc8d74f8661
SHA256d17435a174d929022acceaad37c68c571f777da799fad7b3077f171b4aeabbfa
SHA512e7dac9f29913154b1ecffcf9925b0897e468b51a9f164e0f423d7ed7d0ecc86881b9a699bddf8dd2fdfb8c1b85add906d3922e325eb45adbf2ca8106505c5363
-
Filesize
234KB
MD59d5a03598094ebd5b4f1c945c907ade5
SHA14e52ab215cb53fc56d78d2c3350a66b7de72a4e6
SHA256957ba127a9700bf2bec31ee122c3a4e7d6ae82efa1003e69e566f3ec3d2952d5
SHA5125cc1c3d1ae4b4c46524f9d63db728a9e778f033ddbed8f2e6e6e20ebb244570a5105f1c35a34825b6cdb13c6c31930c61ec08071c12ff24098d9425207ce6ba3
-
Filesize
11KB
MD5c0d906a1ffda7971fda2303da0cd76f9
SHA13fef2e6bcc3f8139771bcdfd2ea35fc1ae2bc1d2
SHA256c643df1b9191347f705af74edcc094e276b349467045b37fa9abd33d574ce6fa
SHA512349d16a5d0547d8917ebf7489fba4505abe607a53bc548a8e1e3feb2c26bd46f5e5d903c6cf4dae557ab5b8dd8d599640e350366531b0029463f36a5a17026e0
-
Filesize
226KB
MD50f31cdbe6442c6a02d439e7186edddf7
SHA18ae4e43951d09161af8477f837163d15ffbfa619
SHA256a435cd4001ba83da6915b642581d348f43b7e8d8f9f62d97290d98e5c3b0bb3c
SHA5127c4aeee6b8cf94cf1d434fe07359d6bc73a1c4a20e7a696b699f1b31b90434b6b24ab95f345000b50571696d86e1a6e8bb45eabc079db32ddb6a5c9c1e401fbd