Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/11/2024, 17:32
Static task
static1
Behavioral task
behavioral1
Sample
205feb6ab1861fbdb86082873030eee43c5e33ee1a26ae019b64a7bb65525de5.exe
Resource
win10v2004-20241007-en
General
-
Target
205feb6ab1861fbdb86082873030eee43c5e33ee1a26ae019b64a7bb65525de5.exe
-
Size
642KB
-
MD5
af64c50c9c73be74df98fe4976c1c741
-
SHA1
cf257608547ea17a542652c6802ed9196d4074b9
-
SHA256
205feb6ab1861fbdb86082873030eee43c5e33ee1a26ae019b64a7bb65525de5
-
SHA512
3ab382f7f36df4673b53c2b08319b493e931fad3c5c666be184236207bf40f439406d2168a5b2289817aef692338710ea77fb2c5978026544011ec65e1569948
-
SSDEEP
12288:7MrDy90aejHb50AekJUXx7fQ/k0gVz+oL18SXG:EytM7/ekw8gVaTSW
Malware Config
Extracted
amadey
3.86
88c8bb
http://77.91.68.61
-
install_dir
925e7e99c5
-
install_file
pdates.exe
-
strings_key
ada76b8b0e1f6892ee93c20ab8946117
-
url_paths
/rock/index.php
Extracted
redline
gotad
77.91.124.84:19071
-
auth_value
3fb7c1f3fcf68bc377eae3f6f493a684
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000f000000023bae-26.dat healer behavioral1/memory/3468-28-0x0000000000120000-0x000000000012A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a1376841.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a1376841.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a1376841.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a1376841.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a1376841.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a1376841.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b9c-49.dat family_redline behavioral1/memory/3192-52-0x0000000000D80000-0x0000000000DB0000-memory.dmp family_redline -
Redline family
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation b5953175.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation pdates.exe -
Executes dropped EXE 11 IoCs
pid Process 2220 v0026815.exe 4460 v6372156.exe 3108 v2929604.exe 3468 a1376841.exe 4684 b5953175.exe 4532 pdates.exe 4136 c9303535.exe 4784 pdates.exe 3192 d5731048.exe 2932 pdates.exe 4880 pdates.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a1376841.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v0026815.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v6372156.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v2929604.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 205feb6ab1861fbdb86082873030eee43c5e33ee1a26ae019b64a7bb65525de5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b5953175.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c9303535.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v2929604.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdates.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 205feb6ab1861fbdb86082873030eee43c5e33ee1a26ae019b64a7bb65525de5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v0026815.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5731048.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6372156.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c9303535.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c9303535.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c9303535.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2476 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3468 a1376841.exe 3468 a1376841.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3468 a1376841.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 864 wrote to memory of 2220 864 205feb6ab1861fbdb86082873030eee43c5e33ee1a26ae019b64a7bb65525de5.exe 84 PID 864 wrote to memory of 2220 864 205feb6ab1861fbdb86082873030eee43c5e33ee1a26ae019b64a7bb65525de5.exe 84 PID 864 wrote to memory of 2220 864 205feb6ab1861fbdb86082873030eee43c5e33ee1a26ae019b64a7bb65525de5.exe 84 PID 2220 wrote to memory of 4460 2220 v0026815.exe 85 PID 2220 wrote to memory of 4460 2220 v0026815.exe 85 PID 2220 wrote to memory of 4460 2220 v0026815.exe 85 PID 4460 wrote to memory of 3108 4460 v6372156.exe 86 PID 4460 wrote to memory of 3108 4460 v6372156.exe 86 PID 4460 wrote to memory of 3108 4460 v6372156.exe 86 PID 3108 wrote to memory of 3468 3108 v2929604.exe 87 PID 3108 wrote to memory of 3468 3108 v2929604.exe 87 PID 3108 wrote to memory of 4684 3108 v2929604.exe 96 PID 3108 wrote to memory of 4684 3108 v2929604.exe 96 PID 3108 wrote to memory of 4684 3108 v2929604.exe 96 PID 4684 wrote to memory of 4532 4684 b5953175.exe 97 PID 4684 wrote to memory of 4532 4684 b5953175.exe 97 PID 4684 wrote to memory of 4532 4684 b5953175.exe 97 PID 4460 wrote to memory of 4136 4460 v6372156.exe 98 PID 4460 wrote to memory of 4136 4460 v6372156.exe 98 PID 4460 wrote to memory of 4136 4460 v6372156.exe 98 PID 4532 wrote to memory of 2476 4532 pdates.exe 99 PID 4532 wrote to memory of 2476 4532 pdates.exe 99 PID 4532 wrote to memory of 2476 4532 pdates.exe 99 PID 4532 wrote to memory of 4228 4532 pdates.exe 101 PID 4532 wrote to memory of 4228 4532 pdates.exe 101 PID 4532 wrote to memory of 4228 4532 pdates.exe 101 PID 4228 wrote to memory of 5048 4228 cmd.exe 103 PID 4228 wrote to memory of 5048 4228 cmd.exe 103 PID 4228 wrote to memory of 5048 4228 cmd.exe 103 PID 4228 wrote to memory of 2836 4228 cmd.exe 104 PID 4228 wrote to memory of 2836 4228 cmd.exe 104 PID 4228 wrote to memory of 2836 4228 cmd.exe 104 PID 4228 wrote to memory of 3676 4228 cmd.exe 105 PID 4228 wrote to memory of 3676 4228 cmd.exe 105 PID 4228 wrote to memory of 3676 4228 cmd.exe 105 PID 4228 wrote to memory of 744 4228 cmd.exe 106 PID 4228 wrote to memory of 744 4228 cmd.exe 106 PID 4228 wrote to memory of 744 4228 cmd.exe 106 PID 4228 wrote to memory of 1176 4228 cmd.exe 107 PID 4228 wrote to memory of 1176 4228 cmd.exe 107 PID 4228 wrote to memory of 1176 4228 cmd.exe 107 PID 4228 wrote to memory of 4520 4228 cmd.exe 108 PID 4228 wrote to memory of 4520 4228 cmd.exe 108 PID 4228 wrote to memory of 4520 4228 cmd.exe 108 PID 2220 wrote to memory of 3192 2220 v0026815.exe 116 PID 2220 wrote to memory of 3192 2220 v0026815.exe 116 PID 2220 wrote to memory of 3192 2220 v0026815.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\205feb6ab1861fbdb86082873030eee43c5e33ee1a26ae019b64a7bb65525de5.exe"C:\Users\Admin\AppData\Local\Temp\205feb6ab1861fbdb86082873030eee43c5e33ee1a26ae019b64a7bb65525de5.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0026815.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0026815.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6372156.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6372156.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2929604.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2929604.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1376841.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1376841.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3468
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5953175.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5953175.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2476
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵
- System Location Discovery: System Language Discovery
PID:5048
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:N"8⤵
- System Location Discovery: System Language Discovery
PID:2836
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:R" /E8⤵
- System Location Discovery: System Language Discovery
PID:3676
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵
- System Location Discovery: System Language Discovery
PID:744
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:N"8⤵
- System Location Discovery: System Language Discovery
PID:1176
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:R" /E8⤵
- System Location Discovery: System Language Discovery
PID:4520
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9303535.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9303535.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:4136
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d5731048.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d5731048.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3192
-
-
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:4784
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:2932
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:4880
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
515KB
MD57367fa9c9e711728c58f39580a68c0a8
SHA155dd7357c7d67f6cd0ff42f67930c1ea9bfc006b
SHA2562d1a9a7aba8b8a2821d73932fbc057870fb5e9f6c5ccd8ce8ee938a09661d042
SHA51206912b1d664ac4d5da13d81d589938954b522c82576aacda7b81b9d5784e0b93335923b4910889fdcec934b450bb125cd77558f69c2cef15784707a7664819fe
-
Filesize
172KB
MD52537c2dd8d629c8bad8fbf436113843e
SHA1fce634b1a5706d79c2d0cd97810affc2d41b80d8
SHA256e0523fe5eb702a4459711a84c5de9c6617a43099ee7b502ff484ff7d7b3f927d
SHA512aac1c543f412d073b3bc86408c8c7f32e2d857811021848843d55b7aa74ef642e9214000f21b57c88d445594c3fdc0fc9fb4e2b577f00c444e6438948922a0b4
-
Filesize
359KB
MD5a24ef54e82b9a7a6f801695ac0e61486
SHA1d82dff5dc26e1c8d5e4954c0e054ffe561099a54
SHA256b81db36d28102594c24494052be2b63bc148e52d2589ae4597ff0c9bc21e1bde
SHA512b86eca8b564bfd49ca76c221030d0b112f8a6d016beebb1864d1e677f201dce9079f1ec9c34269892055fbf5032ee95cf4fa59f43a023262fbd5b2965eb17a01
-
Filesize
36KB
MD5bbf015e3d7e8f15857bafe4fd60f49f8
SHA1e24198e66a994feab4a106edae6c5055ed217c85
SHA2560b81618979dd9488c81f8102795ed2248a1981d805c1cd664f54e7314ed8857d
SHA512042507f6f6f975dfafe69b7fc692a4f45fbcd5e28fde820ccac372d4fc3398205818453c069d103adec2c25f17f87a00d59848309f0c9ff7d8d1789ee2fe1a06
-
Filesize
234KB
MD5eab7eb03ce60df1de29e416ceff52c00
SHA14b48504953fc3b5de68bd48ec88e8b2a1acc4bf4
SHA2565f567da35efb4363380b4e6bbd0468ca26045aee0124f2cad001f46397b7d4aa
SHA51212f878c6ff426bbeaf4cc2e5d0851a5d176bc3b47b5688675b99a995edbc14382c9a2e75ebba143111e68ce8fefd8163ad4f93e1bd4cebd02f1115a697f047de
-
Filesize
11KB
MD502190ecc301498fde7c82cfa27ce9a80
SHA1175e9d0b30f85c710407a1bab8445f01bd50ed5b
SHA2563c95028e3b8c3bee4014f7a88e71ff40a5d46574f740bfef16a67fe7c1ddafc6
SHA512842bf8abd9c9d5c1644a3cfb1d81f7d2302277082da7dc8f00fd0c5c6408f325d81a71496c153c0e3b0e1cbb0a95778269149fe8b0f5daec211fabee25613832
-
Filesize
226KB
MD5320d1ef732fe22d402a7d7b1ec470218
SHA1ecfd1ed0f2624cf9b3a5ed855e4c262eca8347ee
SHA256e2a43d146d029c8dd94d35f7ad0b2fa8d9b06e5ff89e7e5f932f993bace40592
SHA51242dc60c44740b053c4de020682ea25f4c9e583c40e264a3647f628e678cb8dcd1b056ac5aae9b6717c7364e8b50c377ff7fc43111c8145b88cb1d7f4880b5af8