Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/11/2024, 14:26
Static task
static1
Behavioral task
behavioral1
Sample
1823689cb5b5f03c880cbf2655c7319681f9ce505d110cc96c5c1c7e92cdc120.exe
Resource
win10v2004-20241007-en
General
-
Target
1823689cb5b5f03c880cbf2655c7319681f9ce505d110cc96c5c1c7e92cdc120.exe
-
Size
515KB
-
MD5
8c6440a9a75209f3da85480374878822
-
SHA1
2cc396352a7555299163da4221bee9814ed96efc
-
SHA256
1823689cb5b5f03c880cbf2655c7319681f9ce505d110cc96c5c1c7e92cdc120
-
SHA512
28cffcdb9e699370dcaddc3870f9a701682d4ffb0747db454dd66efb6b24479e86787bc879b10fc0518b5c205f6d7b0db54519e2524af77437ad31dbd743dbbf
-
SSDEEP
12288:LMrhy90cTXOc996gsV781xh7LWqpWJIojDI:ayzTd9c677StVU
Malware Config
Extracted
amadey
3.86
88c8bb
http://77.91.68.61
-
install_dir
925e7e99c5
-
install_file
pdates.exe
-
strings_key
ada76b8b0e1f6892ee93c20ab8946117
-
url_paths
/rock/index.php
Extracted
redline
lande
77.91.124.84:19071
-
auth_value
9fa41701c47df37786234f3373f21208
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b97-19.dat healer behavioral1/memory/5024-22-0x0000000000D70000-0x0000000000D7A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a6765803.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a6765803.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a6765803.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a6765803.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a6765803.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a6765803.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b92-43.dat family_redline behavioral1/memory/4564-45-0x0000000000880000-0x00000000008B0000-memory.dmp family_redline -
Redline family
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation b1298103.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation pdates.exe -
Executes dropped EXE 9 IoCs
pid Process 4844 v9893878.exe 3660 v2785730.exe 5024 a6765803.exe 1400 b1298103.exe 2780 pdates.exe 2356 c7750813.exe 4564 d4424731.exe 4876 pdates.exe 1540 pdates.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a6765803.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1823689cb5b5f03c880cbf2655c7319681f9ce505d110cc96c5c1c7e92cdc120.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v9893878.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v2785730.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v2785730.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdates.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v9893878.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1298103.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1823689cb5b5f03c880cbf2655c7319681f9ce505d110cc96c5c1c7e92cdc120.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4424731.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7750813.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c7750813.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c7750813.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c7750813.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4132 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5024 a6765803.exe 5024 a6765803.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5024 a6765803.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 4496 wrote to memory of 4844 4496 1823689cb5b5f03c880cbf2655c7319681f9ce505d110cc96c5c1c7e92cdc120.exe 84 PID 4496 wrote to memory of 4844 4496 1823689cb5b5f03c880cbf2655c7319681f9ce505d110cc96c5c1c7e92cdc120.exe 84 PID 4496 wrote to memory of 4844 4496 1823689cb5b5f03c880cbf2655c7319681f9ce505d110cc96c5c1c7e92cdc120.exe 84 PID 4844 wrote to memory of 3660 4844 v9893878.exe 85 PID 4844 wrote to memory of 3660 4844 v9893878.exe 85 PID 4844 wrote to memory of 3660 4844 v9893878.exe 85 PID 3660 wrote to memory of 5024 3660 v2785730.exe 86 PID 3660 wrote to memory of 5024 3660 v2785730.exe 86 PID 3660 wrote to memory of 1400 3660 v2785730.exe 97 PID 3660 wrote to memory of 1400 3660 v2785730.exe 97 PID 3660 wrote to memory of 1400 3660 v2785730.exe 97 PID 1400 wrote to memory of 2780 1400 b1298103.exe 98 PID 1400 wrote to memory of 2780 1400 b1298103.exe 98 PID 1400 wrote to memory of 2780 1400 b1298103.exe 98 PID 4844 wrote to memory of 2356 4844 v9893878.exe 99 PID 4844 wrote to memory of 2356 4844 v9893878.exe 99 PID 4844 wrote to memory of 2356 4844 v9893878.exe 99 PID 2780 wrote to memory of 4132 2780 pdates.exe 100 PID 2780 wrote to memory of 4132 2780 pdates.exe 100 PID 2780 wrote to memory of 4132 2780 pdates.exe 100 PID 2780 wrote to memory of 1676 2780 pdates.exe 102 PID 2780 wrote to memory of 1676 2780 pdates.exe 102 PID 2780 wrote to memory of 1676 2780 pdates.exe 102 PID 1676 wrote to memory of 3596 1676 cmd.exe 104 PID 1676 wrote to memory of 3596 1676 cmd.exe 104 PID 1676 wrote to memory of 3596 1676 cmd.exe 104 PID 1676 wrote to memory of 1780 1676 cmd.exe 105 PID 1676 wrote to memory of 1780 1676 cmd.exe 105 PID 1676 wrote to memory of 1780 1676 cmd.exe 105 PID 1676 wrote to memory of 2040 1676 cmd.exe 106 PID 1676 wrote to memory of 2040 1676 cmd.exe 106 PID 1676 wrote to memory of 2040 1676 cmd.exe 106 PID 1676 wrote to memory of 1052 1676 cmd.exe 107 PID 1676 wrote to memory of 1052 1676 cmd.exe 107 PID 1676 wrote to memory of 1052 1676 cmd.exe 107 PID 1676 wrote to memory of 4812 1676 cmd.exe 108 PID 1676 wrote to memory of 4812 1676 cmd.exe 108 PID 1676 wrote to memory of 4812 1676 cmd.exe 108 PID 1676 wrote to memory of 1492 1676 cmd.exe 109 PID 1676 wrote to memory of 1492 1676 cmd.exe 109 PID 1676 wrote to memory of 1492 1676 cmd.exe 109 PID 4496 wrote to memory of 4564 4496 1823689cb5b5f03c880cbf2655c7319681f9ce505d110cc96c5c1c7e92cdc120.exe 119 PID 4496 wrote to memory of 4564 4496 1823689cb5b5f03c880cbf2655c7319681f9ce505d110cc96c5c1c7e92cdc120.exe 119 PID 4496 wrote to memory of 4564 4496 1823689cb5b5f03c880cbf2655c7319681f9ce505d110cc96c5c1c7e92cdc120.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\1823689cb5b5f03c880cbf2655c7319681f9ce505d110cc96c5c1c7e92cdc120.exe"C:\Users\Admin\AppData\Local\Temp\1823689cb5b5f03c880cbf2655c7319681f9ce505d110cc96c5c1c7e92cdc120.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9893878.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9893878.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2785730.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2785730.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6765803.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6765803.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5024
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1298103.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1298103.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4132
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵
- System Location Discovery: System Language Discovery
PID:3596
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:N"7⤵
- System Location Discovery: System Language Discovery
PID:1780
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:R" /E7⤵
- System Location Discovery: System Language Discovery
PID:2040
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵
- System Location Discovery: System Language Discovery
PID:1052
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:N"7⤵
- System Location Discovery: System Language Discovery
PID:4812
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:R" /E7⤵
- System Location Discovery: System Language Discovery
PID:1492
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7750813.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7750813.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:2356
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d4424731.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d4424731.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4564
-
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:4876
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:1540
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
174KB
MD5ddf008433e511674009b3d7501936cd3
SHA1580ccbc59627cfc8fd0633a1ea619f4b6c2f9d97
SHA25644fc73aadee9793ba3f60328aabd120ae3b97e8c8b632d6afef38f585b30a76a
SHA51220c9a6404a4f1995a5fbb48b0ebeb050a01c57d136cae305de89b60427a842905b65dbe74d517eeb8a356ac92e050b26c4a34e0080178bde8c8eff1e96a4adec
-
Filesize
359KB
MD5c34863ce83facc6116a0e964759aa9ad
SHA1201aa536454a186b54357a5dc76ff968788c9ad2
SHA2568ce374c5e844ff3b5f099ff2d49ce489d71c647d86d092dfbcf9a8c0149f7abd
SHA512439687f52fd55d8d5d4b51dc6140fba12ea1fcf5a3bc8014e528731d5f9215c209bda547ac97c882de00f0ee9bf9f571f38a325b51ec2dcda1624c2c9ae44dfa
-
Filesize
36KB
MD5bac01433d6cc78b67156714749845380
SHA1b542f73ee9e3a49d1e662d6093c7620b5f8a5586
SHA25659631b50a39a03eb2df731abed519056cf5b91bea9113cb2d03bd2e33c5a063d
SHA512c47ec98df0b1a0d118a4d6d3ea222d5b66c52c9dfe008b5b4234123a0319b2250873f81e99d3c290e27f8e9b1db8c1cc34ac40b7f78e995ba5d6dff8eceb888b
-
Filesize
234KB
MD5147725f7c7572241c8c99c4168f975b3
SHA1612f9e1f063ca3e0646a10502925f17307c21776
SHA256d4e5922153070eb43488ed6be71d701aae6ac466bccb643722349e062d4444f6
SHA512e542a8629cc905afc2e50371ec41a91c3dbf3b96bfbc0d67615dca1feb02aedb3327098d218e4427fb73842f4a0dde05c23fb1a6ae209e6076ce71a0b88ccb99
-
Filesize
13KB
MD5984021f542dc10f3d72009dc6a15711c
SHA1c1f6fef10938138f1c4a378058b5acebfe8baceb
SHA256f078c8f334ac36711faec74167a3422558f4e0abb2d5fd42639d500e9494c680
SHA51288d943224775f922aec1ef5ac9e6c3a44b97f796d7791dd739cf4219365f738514074eb187d7ff60a2549334a73404a0ba28aa3d7c63faceebfb008f2ddd6446
-
Filesize
225KB
MD5b5ee9eedcae6bfc036759997e6326b39
SHA1fb904515635b81a94a3160a27b31c993852b2f0f
SHA25697d7c30e0a1287b2c462a5471e7576a80fc74acb4ced62201fd2852c1843a0d8
SHA5127aa6c95e9f802d4dc2c34eedba266ef967faff54868b28c213ffbd15e03661f9007fbcde8a27a62351b11b36796799f17916e2fdfb398f45b87fb6fec7abffdb