Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/11/2024, 05:45

General

  • Target

    99aba006f0b570e62e072dca26996e92b876227bc6f4b85117d39adec3cb4a96.exe

  • Size

    642KB

  • MD5

    53f933f011bc702fbc354f4392049d29

  • SHA1

    2337f02d13c7078b38291eb169c371a507011fb5

  • SHA256

    99aba006f0b570e62e072dca26996e92b876227bc6f4b85117d39adec3cb4a96

  • SHA512

    ddb6a58654307dc76b03414b0a3ea8a72dae5aa4d50fa7c7ca298eb1908c0b4f0e17a65d73f5dec362cfeec1786597bed751eee00cb33cdb70cb469995386e94

  • SSDEEP

    12288:9MrLy90A2Z/OzbtCrPeFotrt6midImA2wqK6n3/S+rkU67zVnMRDn:Cyt2szbgrmypidIX+rvgpnMRDn

Malware Config

Extracted

Family

amadey

Version

3.86

Botnet

88c8bb

C2

http://77.91.68.61

Attributes
  • install_dir

    925e7e99c5

  • install_file

    pdates.exe

  • strings_key

    ada76b8b0e1f6892ee93c20ab8946117

  • url_paths

    /rock/index.php

rc4.plain

Extracted

Family

redline

Botnet

gotad

C2

77.91.124.84:19071

Attributes
  • auth_value

    3fb7c1f3fcf68bc377eae3f6f493a684

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Smokeloader family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\99aba006f0b570e62e072dca26996e92b876227bc6f4b85117d39adec3cb4a96.exe
    "C:\Users\Admin\AppData\Local\Temp\99aba006f0b570e62e072dca26996e92b876227bc6f4b85117d39adec3cb4a96.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3112
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9020170.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9020170.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1032
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7783843.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7783843.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3044
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0697886.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0697886.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4952
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8988234.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8988234.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3652
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4161694.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4161694.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:4080
            • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
              "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4112
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F
                7⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:3288
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3272
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4004
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "pdates.exe" /P "Admin:N"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2616
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "pdates.exe" /P "Admin:R" /E
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1960
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1768
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\925e7e99c5" /P "Admin:N"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2064
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\925e7e99c5" /P "Admin:R" /E
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4388
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8916518.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8916518.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Checks SCSI registry key(s)
          PID:1424
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d8927775.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d8927775.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2288
  • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
    C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
    1⤵
    • Executes dropped EXE
    PID:2984
  • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
    C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
    1⤵
    • Executes dropped EXE
    PID:760
  • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
    C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
    1⤵
    • Executes dropped EXE
    PID:3284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

    Filesize

    37KB

    MD5

    3d1d1b1990f8510f48f5bd2da58d2578

    SHA1

    3a661c086ce2cbdb65e5de4e2a34f4d43dba3bc0

    SHA256

    47696b2953720685a486317ba3044db02e2905c53a57e8a8eb0387f87364a7b0

    SHA512

    d6d9d6892db154fb12ae406f3871d4bd23dbb317d5cefb2d5b512bfaddb69806a7dfd3aa784fc76e737b0b66d07cf2c924640fc217268401a09c682ec5052240

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9020170.exe

    Filesize

    514KB

    MD5

    2401a7894da407c10621b27aca607015

    SHA1

    0c1635864a540b446b6987e29c60f4dc49dbe220

    SHA256

    937f75c777cfe050d79afe845b1bd29bdb9f09e838d399030953023600084498

    SHA512

    8444bd84cccb41ce6007e7215cf6ab03ce0afc4a55a0514058fd83190470a7670deffe96293034027225f253d37b3b0aeca0141348198fc596850c96882c6ced

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d8927775.exe

    Filesize

    172KB

    MD5

    c5b5af18d113a5a984a8f19b5d5bd8b1

    SHA1

    4fa7e09268cdc71b7eddcdd36cf6f127346d9f2e

    SHA256

    540b945d993881f5d913957141606360daf4c361c757bca367e11ebaf4008520

    SHA512

    81b286daef859481f38e7952c8fe77893f8c9d04b1e875d8efaa5ff2975d44e911685b726b9ef4999cf1b293e5ce8cb77d0cba6e3b43f296934ee2b25da9cb7d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7783843.exe

    Filesize

    359KB

    MD5

    7bc1b939384a34d898c82212597c1dc7

    SHA1

    1e7cdb9e0a16fcc5e9b08af652ca6a364f11a589

    SHA256

    05a839160e8f6b1a74932115b15af78b3b479daa38e406b66e962202095bd36c

    SHA512

    31e94f930d808fe817684bcf502058f3cbeed7581d6e6b0092cddf2b9f701a346f8010ae419e465fd6ce2d9d3a21d7e8fc45c3f472ef76f8b50b987a28927920

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8916518.exe

    Filesize

    36KB

    MD5

    6f17a927c6ea770f5d46013d5ba661b6

    SHA1

    3de9ab8df424b8c23a77e23e689b2fc8d74f8661

    SHA256

    d17435a174d929022acceaad37c68c571f777da799fad7b3077f171b4aeabbfa

    SHA512

    e7dac9f29913154b1ecffcf9925b0897e468b51a9f164e0f423d7ed7d0ecc86881b9a699bddf8dd2fdfb8c1b85add906d3922e325eb45adbf2ca8106505c5363

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0697886.exe

    Filesize

    234KB

    MD5

    9d5a03598094ebd5b4f1c945c907ade5

    SHA1

    4e52ab215cb53fc56d78d2c3350a66b7de72a4e6

    SHA256

    957ba127a9700bf2bec31ee122c3a4e7d6ae82efa1003e69e566f3ec3d2952d5

    SHA512

    5cc1c3d1ae4b4c46524f9d63db728a9e778f033ddbed8f2e6e6e20ebb244570a5105f1c35a34825b6cdb13c6c31930c61ec08071c12ff24098d9425207ce6ba3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8988234.exe

    Filesize

    11KB

    MD5

    c0d906a1ffda7971fda2303da0cd76f9

    SHA1

    3fef2e6bcc3f8139771bcdfd2ea35fc1ae2bc1d2

    SHA256

    c643df1b9191347f705af74edcc094e276b349467045b37fa9abd33d574ce6fa

    SHA512

    349d16a5d0547d8917ebf7489fba4505abe607a53bc548a8e1e3feb2c26bd46f5e5d903c6cf4dae557ab5b8dd8d599640e350366531b0029463f36a5a17026e0

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4161694.exe

    Filesize

    226KB

    MD5

    0f31cdbe6442c6a02d439e7186edddf7

    SHA1

    8ae4e43951d09161af8477f837163d15ffbfa619

    SHA256

    a435cd4001ba83da6915b642581d348f43b7e8d8f9f62d97290d98e5c3b0bb3c

    SHA512

    7c4aeee6b8cf94cf1d434fe07359d6bc73a1c4a20e7a696b699f1b31b90434b6b24ab95f345000b50571696d86e1a6e8bb45eabc079db32ddb6a5c9c1e401fbd

  • memory/1424-45-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1424-48-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2288-54-0x000000000B0E0000-0x000000000B6F8000-memory.dmp

    Filesize

    6.1MB

  • memory/2288-53-0x0000000001560000-0x0000000001566000-memory.dmp

    Filesize

    24KB

  • memory/2288-52-0x0000000000C60000-0x0000000000C90000-memory.dmp

    Filesize

    192KB

  • memory/2288-55-0x000000000AC10000-0x000000000AD1A000-memory.dmp

    Filesize

    1.0MB

  • memory/2288-56-0x000000000AB50000-0x000000000AB62000-memory.dmp

    Filesize

    72KB

  • memory/2288-57-0x000000000ABB0000-0x000000000ABEC000-memory.dmp

    Filesize

    240KB

  • memory/2288-58-0x0000000002E50000-0x0000000002E9C000-memory.dmp

    Filesize

    304KB

  • memory/3652-28-0x0000000000240000-0x000000000024A000-memory.dmp

    Filesize

    40KB