Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/11/2024, 14:23

General

  • Target

    01a59b7875735f9a943002c914f2a6267981a23394e494521a07594781e75591.exe

  • Size

    642KB

  • MD5

    833db12814eaacc1a389c2330c05b27b

  • SHA1

    952fdcd869dce476646eec6c90cb4f54d0cfd818

  • SHA256

    01a59b7875735f9a943002c914f2a6267981a23394e494521a07594781e75591

  • SHA512

    bcd0b41dc41fcf4c0cd7c8fb24c0015eddc3a6a83211ae9711a7046ed8a888be585a37cdd4d76e270e013851a49fdbec14809dfabf77e042c7547052244a149a

  • SSDEEP

    12288:MMrxy90ev9zsdvOAI1TxIcIlqgVBoEc/+OghpadHdRvNCW+C7I8:VytVzEC2dltVjc/TgOV9GwI8

Malware Config

Extracted

Family

amadey

Version

3.86

Botnet

88c8bb

C2

http://77.91.68.61

Attributes
  • install_dir

    925e7e99c5

  • install_file

    pdates.exe

  • strings_key

    ada76b8b0e1f6892ee93c20ab8946117

  • url_paths

    /rock/index.php

rc4.plain

Extracted

Family

redline

Botnet

gotad

C2

77.91.124.84:19071

Attributes
  • auth_value

    3fb7c1f3fcf68bc377eae3f6f493a684

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Smokeloader family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01a59b7875735f9a943002c914f2a6267981a23394e494521a07594781e75591.exe
    "C:\Users\Admin\AppData\Local\Temp\01a59b7875735f9a943002c914f2a6267981a23394e494521a07594781e75591.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1875061.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1875061.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2652
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8302996.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8302996.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4596
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5716797.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5716797.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1384
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5348924.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5348924.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1672
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b9542856.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b9542856.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:452
            • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
              "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4644
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F
                7⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:3600
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:840
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4412
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "pdates.exe" /P "Admin:N"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4672
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "pdates.exe" /P "Admin:R" /E
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4772
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3892
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\925e7e99c5" /P "Admin:N"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4112
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\925e7e99c5" /P "Admin:R" /E
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2656
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c4838218.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c4838218.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Checks SCSI registry key(s)
          PID:2784
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d4589920.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d4589920.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1924
  • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
    C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
    1⤵
    • Executes dropped EXE
    PID:2808
  • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
    C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
    1⤵
    • Executes dropped EXE
    PID:2860
  • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
    C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
    1⤵
    • Executes dropped EXE
    PID:1068
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:1772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1875061.exe

    Filesize

    514KB

    MD5

    f397ca1a1d941bac7dafdeb05d4c1c2f

    SHA1

    5449f64df20c474bd055547ea745255b5d8b55a4

    SHA256

    76b7ecfe021d18f53868224c41629e288c1beac567b6e69d65f66338c8f40ecc

    SHA512

    2e10dc63684e4e5f0625a10efb6625fa36ce8724cd273bb5fed9d6eb477b6afa042925f808c4806c99dc2b790a5e665e86f480f4a552da53bd6487361adce933

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d4589920.exe

    Filesize

    172KB

    MD5

    ebfea32e178bc8444c7defac6ab60966

    SHA1

    7a406ec6ed39f9dedf5ad3623cb0437c149bc7a8

    SHA256

    c367dd140380fad67974fc2417ac9e442a8b658262be0f1c00f1c92fd150743f

    SHA512

    e2ce53ebb9f66e3476df3eff9560e7df436002f79b7b65e7cd042724d912b68db5bdd990ad207b78113752716859ea9f5103d0ae51ee854b36789bef3dc2a912

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8302996.exe

    Filesize

    359KB

    MD5

    e5106656b006b5097f73dbcb9c7c54fd

    SHA1

    9449075973b9fa32c1c81cb0f007992fd8996257

    SHA256

    ad9eff4a7976eec5df3fba1898bacca0f3d9f79f0412258223d0a9efa578947b

    SHA512

    55dbf566e767d8416addcb4eb800923c09ec90da5f927b63db84602e0afe334494936179abd6d986e6364d571ac3d272cf7960dbf68b2ab8088748eed3e6fea3

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c4838218.exe

    Filesize

    36KB

    MD5

    20f76e41f948d4c9c71236aed81431db

    SHA1

    eccc95910a14e5365f95ddcb16f5513b6a986979

    SHA256

    1866743e3e6c7b756c0fe0f02478f94fc1a93534fd3149450b13bcf7705550cf

    SHA512

    48d7c4ca304bb19a707cbdaa6973c4ec4de0c6574cda6e1850cb43b9978b26b48a5d1d2d90a055c15537c33fac7f9cd69b71efc4dcc6a6dc3cd078de4cb1f97b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5716797.exe

    Filesize

    234KB

    MD5

    82d470e84d52d81015ac6f4d0649c654

    SHA1

    451f43aba2f9f4da2daef625f402b255ebd8995e

    SHA256

    37c3bf6eb736ab6f195e5eabeabdf214bc5556e818c35fe74266f7a59841326d

    SHA512

    bafafd2546946d5fd0980cb89ece99d86ea57dc2ff063ebdd3cf65d7ca842a7d0f8fcbdf8a2991fdf67d2f0eb655e0996fcafce20715f0d2c92cd5fd21a89672

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5348924.exe

    Filesize

    11KB

    MD5

    2b1b67b9bdf8a8a4baf3b544c7016566

    SHA1

    0a63c3af077b24f53a521e1002dd6e022de18291

    SHA256

    a5098da46b4ff46cc863d328db85d4207ded2fa8527c9119964c403ad6c71041

    SHA512

    860ff227f9bf5655ff96dae23d9a1262c25044df47a70f39aa8218c2f52f90f89ccaf6886f60b1445395bae097d847a430a3f20f8f23173579c4dc9822926d99

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b9542856.exe

    Filesize

    226KB

    MD5

    8d31c2d8868c9fce404865baa4cecdc1

    SHA1

    2cd6f30b3077d8a2a9b2e635df2c0a6e8c3f5e61

    SHA256

    abee072ef8bcf91cb6417532ecd46352d4cbf16a8376b721dde4f9a1a3a2305f

    SHA512

    0c4b7d395d1af5f5323a23ac620b0bd6cb0d1b591b21071c570e9adc047e9dfe47e70d27e23721774ebfd231298962b29c10f18dc7670068f834e8258c37be7e

  • memory/1672-28-0x0000000000380000-0x000000000038A000-memory.dmp

    Filesize

    40KB

  • memory/1924-54-0x000000000A520000-0x000000000AB38000-memory.dmp

    Filesize

    6.1MB

  • memory/1924-52-0x00000000000D0000-0x0000000000100000-memory.dmp

    Filesize

    192KB

  • memory/1924-53-0x0000000002310000-0x0000000002316000-memory.dmp

    Filesize

    24KB

  • memory/1924-55-0x000000000A080000-0x000000000A18A000-memory.dmp

    Filesize

    1.0MB

  • memory/1924-56-0x0000000009FC0000-0x0000000009FD2000-memory.dmp

    Filesize

    72KB

  • memory/1924-57-0x000000000A020000-0x000000000A05C000-memory.dmp

    Filesize

    240KB

  • memory/1924-58-0x0000000002290000-0x00000000022DC000-memory.dmp

    Filesize

    304KB

  • memory/2784-48-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2784-45-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB