Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/11/2024, 14:23
Static task
static1
Behavioral task
behavioral1
Sample
01a59b7875735f9a943002c914f2a6267981a23394e494521a07594781e75591.exe
Resource
win10v2004-20241007-en
General
-
Target
01a59b7875735f9a943002c914f2a6267981a23394e494521a07594781e75591.exe
-
Size
642KB
-
MD5
833db12814eaacc1a389c2330c05b27b
-
SHA1
952fdcd869dce476646eec6c90cb4f54d0cfd818
-
SHA256
01a59b7875735f9a943002c914f2a6267981a23394e494521a07594781e75591
-
SHA512
bcd0b41dc41fcf4c0cd7c8fb24c0015eddc3a6a83211ae9711a7046ed8a888be585a37cdd4d76e270e013851a49fdbec14809dfabf77e042c7547052244a149a
-
SSDEEP
12288:MMrxy90ev9zsdvOAI1TxIcIlqgVBoEc/+OghpadHdRvNCW+C7I8:VytVzEC2dltVjc/TgOV9GwI8
Malware Config
Extracted
amadey
3.86
88c8bb
http://77.91.68.61
-
install_dir
925e7e99c5
-
install_file
pdates.exe
-
strings_key
ada76b8b0e1f6892ee93c20ab8946117
-
url_paths
/rock/index.php
Extracted
redline
gotad
77.91.124.84:19071
-
auth_value
3fb7c1f3fcf68bc377eae3f6f493a684
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b80-26.dat healer behavioral1/memory/1672-28-0x0000000000380000-0x000000000038A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a5348924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5348924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5348924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5348924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5348924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5348924.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b7b-50.dat family_redline behavioral1/memory/1924-52-0x00000000000D0000-0x0000000000100000-memory.dmp family_redline -
Redline family
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation b9542856.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation pdates.exe -
Executes dropped EXE 11 IoCs
pid Process 2652 v1875061.exe 4596 v8302996.exe 1384 v5716797.exe 1672 a5348924.exe 452 b9542856.exe 4644 pdates.exe 2784 c4838218.exe 2808 pdates.exe 1924 d4589920.exe 2860 pdates.exe 1068 pdates.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a5348924.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v5716797.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 01a59b7875735f9a943002c914f2a6267981a23394e494521a07594781e75591.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1875061.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v8302996.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1772 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v8302996.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdates.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01a59b7875735f9a943002c914f2a6267981a23394e494521a07594781e75591.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4589920.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v1875061.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9542856.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v5716797.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c4838218.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c4838218.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c4838218.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c4838218.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3600 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1672 a5348924.exe 1672 a5348924.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1672 a5348924.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 452 b9542856.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2652 2388 01a59b7875735f9a943002c914f2a6267981a23394e494521a07594781e75591.exe 84 PID 2388 wrote to memory of 2652 2388 01a59b7875735f9a943002c914f2a6267981a23394e494521a07594781e75591.exe 84 PID 2388 wrote to memory of 2652 2388 01a59b7875735f9a943002c914f2a6267981a23394e494521a07594781e75591.exe 84 PID 2652 wrote to memory of 4596 2652 v1875061.exe 85 PID 2652 wrote to memory of 4596 2652 v1875061.exe 85 PID 2652 wrote to memory of 4596 2652 v1875061.exe 85 PID 4596 wrote to memory of 1384 4596 v8302996.exe 87 PID 4596 wrote to memory of 1384 4596 v8302996.exe 87 PID 4596 wrote to memory of 1384 4596 v8302996.exe 87 PID 1384 wrote to memory of 1672 1384 v5716797.exe 88 PID 1384 wrote to memory of 1672 1384 v5716797.exe 88 PID 1384 wrote to memory of 452 1384 v5716797.exe 98 PID 1384 wrote to memory of 452 1384 v5716797.exe 98 PID 1384 wrote to memory of 452 1384 v5716797.exe 98 PID 452 wrote to memory of 4644 452 b9542856.exe 99 PID 452 wrote to memory of 4644 452 b9542856.exe 99 PID 452 wrote to memory of 4644 452 b9542856.exe 99 PID 4596 wrote to memory of 2784 4596 v8302996.exe 100 PID 4596 wrote to memory of 2784 4596 v8302996.exe 100 PID 4596 wrote to memory of 2784 4596 v8302996.exe 100 PID 4644 wrote to memory of 3600 4644 pdates.exe 101 PID 4644 wrote to memory of 3600 4644 pdates.exe 101 PID 4644 wrote to memory of 3600 4644 pdates.exe 101 PID 4644 wrote to memory of 840 4644 pdates.exe 103 PID 4644 wrote to memory of 840 4644 pdates.exe 103 PID 4644 wrote to memory of 840 4644 pdates.exe 103 PID 840 wrote to memory of 4412 840 cmd.exe 105 PID 840 wrote to memory of 4412 840 cmd.exe 105 PID 840 wrote to memory of 4412 840 cmd.exe 105 PID 840 wrote to memory of 4672 840 cmd.exe 106 PID 840 wrote to memory of 4672 840 cmd.exe 106 PID 840 wrote to memory of 4672 840 cmd.exe 106 PID 840 wrote to memory of 4772 840 cmd.exe 107 PID 840 wrote to memory of 4772 840 cmd.exe 107 PID 840 wrote to memory of 4772 840 cmd.exe 107 PID 840 wrote to memory of 3892 840 cmd.exe 108 PID 840 wrote to memory of 3892 840 cmd.exe 108 PID 840 wrote to memory of 3892 840 cmd.exe 108 PID 840 wrote to memory of 4112 840 cmd.exe 109 PID 840 wrote to memory of 4112 840 cmd.exe 109 PID 840 wrote to memory of 4112 840 cmd.exe 109 PID 840 wrote to memory of 2656 840 cmd.exe 110 PID 840 wrote to memory of 2656 840 cmd.exe 110 PID 840 wrote to memory of 2656 840 cmd.exe 110 PID 2652 wrote to memory of 1924 2652 v1875061.exe 122 PID 2652 wrote to memory of 1924 2652 v1875061.exe 122 PID 2652 wrote to memory of 1924 2652 v1875061.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\01a59b7875735f9a943002c914f2a6267981a23394e494521a07594781e75591.exe"C:\Users\Admin\AppData\Local\Temp\01a59b7875735f9a943002c914f2a6267981a23394e494521a07594781e75591.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1875061.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1875061.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8302996.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8302996.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5716797.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5716797.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5348924.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5348924.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b9542856.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b9542856.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3600
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵
- System Location Discovery: System Language Discovery
PID:4412
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:N"8⤵
- System Location Discovery: System Language Discovery
PID:4672
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:R" /E8⤵
- System Location Discovery: System Language Discovery
PID:4772
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵
- System Location Discovery: System Language Discovery
PID:3892
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:N"8⤵
- System Location Discovery: System Language Discovery
PID:4112
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:R" /E8⤵
- System Location Discovery: System Language Discovery
PID:2656
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c4838218.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c4838218.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:2784
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d4589920.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d4589920.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1924
-
-
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:2808
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:2860
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:1068
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1772
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
514KB
MD5f397ca1a1d941bac7dafdeb05d4c1c2f
SHA15449f64df20c474bd055547ea745255b5d8b55a4
SHA25676b7ecfe021d18f53868224c41629e288c1beac567b6e69d65f66338c8f40ecc
SHA5122e10dc63684e4e5f0625a10efb6625fa36ce8724cd273bb5fed9d6eb477b6afa042925f808c4806c99dc2b790a5e665e86f480f4a552da53bd6487361adce933
-
Filesize
172KB
MD5ebfea32e178bc8444c7defac6ab60966
SHA17a406ec6ed39f9dedf5ad3623cb0437c149bc7a8
SHA256c367dd140380fad67974fc2417ac9e442a8b658262be0f1c00f1c92fd150743f
SHA512e2ce53ebb9f66e3476df3eff9560e7df436002f79b7b65e7cd042724d912b68db5bdd990ad207b78113752716859ea9f5103d0ae51ee854b36789bef3dc2a912
-
Filesize
359KB
MD5e5106656b006b5097f73dbcb9c7c54fd
SHA19449075973b9fa32c1c81cb0f007992fd8996257
SHA256ad9eff4a7976eec5df3fba1898bacca0f3d9f79f0412258223d0a9efa578947b
SHA51255dbf566e767d8416addcb4eb800923c09ec90da5f927b63db84602e0afe334494936179abd6d986e6364d571ac3d272cf7960dbf68b2ab8088748eed3e6fea3
-
Filesize
36KB
MD520f76e41f948d4c9c71236aed81431db
SHA1eccc95910a14e5365f95ddcb16f5513b6a986979
SHA2561866743e3e6c7b756c0fe0f02478f94fc1a93534fd3149450b13bcf7705550cf
SHA51248d7c4ca304bb19a707cbdaa6973c4ec4de0c6574cda6e1850cb43b9978b26b48a5d1d2d90a055c15537c33fac7f9cd69b71efc4dcc6a6dc3cd078de4cb1f97b
-
Filesize
234KB
MD582d470e84d52d81015ac6f4d0649c654
SHA1451f43aba2f9f4da2daef625f402b255ebd8995e
SHA25637c3bf6eb736ab6f195e5eabeabdf214bc5556e818c35fe74266f7a59841326d
SHA512bafafd2546946d5fd0980cb89ece99d86ea57dc2ff063ebdd3cf65d7ca842a7d0f8fcbdf8a2991fdf67d2f0eb655e0996fcafce20715f0d2c92cd5fd21a89672
-
Filesize
11KB
MD52b1b67b9bdf8a8a4baf3b544c7016566
SHA10a63c3af077b24f53a521e1002dd6e022de18291
SHA256a5098da46b4ff46cc863d328db85d4207ded2fa8527c9119964c403ad6c71041
SHA512860ff227f9bf5655ff96dae23d9a1262c25044df47a70f39aa8218c2f52f90f89ccaf6886f60b1445395bae097d847a430a3f20f8f23173579c4dc9822926d99
-
Filesize
226KB
MD58d31c2d8868c9fce404865baa4cecdc1
SHA12cd6f30b3077d8a2a9b2e635df2c0a6e8c3f5e61
SHA256abee072ef8bcf91cb6417532ecd46352d4cbf16a8376b721dde4f9a1a3a2305f
SHA5120c4b7d395d1af5f5323a23ac620b0bd6cb0d1b591b21071c570e9adc047e9dfe47e70d27e23721774ebfd231298962b29c10f18dc7670068f834e8258c37be7e