Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/11/2024, 17:32

General

  • Target

    205feb6ab1861fbdb86082873030eee43c5e33ee1a26ae019b64a7bb65525de5.exe

  • Size

    642KB

  • MD5

    af64c50c9c73be74df98fe4976c1c741

  • SHA1

    cf257608547ea17a542652c6802ed9196d4074b9

  • SHA256

    205feb6ab1861fbdb86082873030eee43c5e33ee1a26ae019b64a7bb65525de5

  • SHA512

    3ab382f7f36df4673b53c2b08319b493e931fad3c5c666be184236207bf40f439406d2168a5b2289817aef692338710ea77fb2c5978026544011ec65e1569948

  • SSDEEP

    12288:7MrDy90aejHb50AekJUXx7fQ/k0gVz+oL18SXG:EytM7/ekw8gVaTSW

Malware Config

Extracted

Family

amadey

Version

3.86

Botnet

88c8bb

C2

http://77.91.68.61

Attributes
  • install_dir

    925e7e99c5

  • install_file

    pdates.exe

  • strings_key

    ada76b8b0e1f6892ee93c20ab8946117

  • url_paths

    /rock/index.php

rc4.plain

Extracted

Family

redline

Botnet

gotad

C2

77.91.124.84:19071

Attributes
  • auth_value

    3fb7c1f3fcf68bc377eae3f6f493a684

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Smokeloader family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\205feb6ab1861fbdb86082873030eee43c5e33ee1a26ae019b64a7bb65525de5.exe
    "C:\Users\Admin\AppData\Local\Temp\205feb6ab1861fbdb86082873030eee43c5e33ee1a26ae019b64a7bb65525de5.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:864
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0026815.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0026815.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2220
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6372156.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6372156.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4460
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2929604.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2929604.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3108
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1376841.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1376841.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3468
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5953175.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5953175.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4684
            • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
              "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4532
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F
                7⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:2476
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4228
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:5048
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "pdates.exe" /P "Admin:N"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2836
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "pdates.exe" /P "Admin:R" /E
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3676
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:744
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\925e7e99c5" /P "Admin:N"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1176
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\925e7e99c5" /P "Admin:R" /E
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4520
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9303535.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9303535.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Checks SCSI registry key(s)
          PID:4136
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d5731048.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d5731048.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3192
  • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
    C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
    1⤵
    • Executes dropped EXE
    PID:4784
  • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
    C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
    1⤵
    • Executes dropped EXE
    PID:2932
  • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
    C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
    1⤵
    • Executes dropped EXE
    PID:4880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0026815.exe

    Filesize

    515KB

    MD5

    7367fa9c9e711728c58f39580a68c0a8

    SHA1

    55dd7357c7d67f6cd0ff42f67930c1ea9bfc006b

    SHA256

    2d1a9a7aba8b8a2821d73932fbc057870fb5e9f6c5ccd8ce8ee938a09661d042

    SHA512

    06912b1d664ac4d5da13d81d589938954b522c82576aacda7b81b9d5784e0b93335923b4910889fdcec934b450bb125cd77558f69c2cef15784707a7664819fe

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d5731048.exe

    Filesize

    172KB

    MD5

    2537c2dd8d629c8bad8fbf436113843e

    SHA1

    fce634b1a5706d79c2d0cd97810affc2d41b80d8

    SHA256

    e0523fe5eb702a4459711a84c5de9c6617a43099ee7b502ff484ff7d7b3f927d

    SHA512

    aac1c543f412d073b3bc86408c8c7f32e2d857811021848843d55b7aa74ef642e9214000f21b57c88d445594c3fdc0fc9fb4e2b577f00c444e6438948922a0b4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6372156.exe

    Filesize

    359KB

    MD5

    a24ef54e82b9a7a6f801695ac0e61486

    SHA1

    d82dff5dc26e1c8d5e4954c0e054ffe561099a54

    SHA256

    b81db36d28102594c24494052be2b63bc148e52d2589ae4597ff0c9bc21e1bde

    SHA512

    b86eca8b564bfd49ca76c221030d0b112f8a6d016beebb1864d1e677f201dce9079f1ec9c34269892055fbf5032ee95cf4fa59f43a023262fbd5b2965eb17a01

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9303535.exe

    Filesize

    36KB

    MD5

    bbf015e3d7e8f15857bafe4fd60f49f8

    SHA1

    e24198e66a994feab4a106edae6c5055ed217c85

    SHA256

    0b81618979dd9488c81f8102795ed2248a1981d805c1cd664f54e7314ed8857d

    SHA512

    042507f6f6f975dfafe69b7fc692a4f45fbcd5e28fde820ccac372d4fc3398205818453c069d103adec2c25f17f87a00d59848309f0c9ff7d8d1789ee2fe1a06

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2929604.exe

    Filesize

    234KB

    MD5

    eab7eb03ce60df1de29e416ceff52c00

    SHA1

    4b48504953fc3b5de68bd48ec88e8b2a1acc4bf4

    SHA256

    5f567da35efb4363380b4e6bbd0468ca26045aee0124f2cad001f46397b7d4aa

    SHA512

    12f878c6ff426bbeaf4cc2e5d0851a5d176bc3b47b5688675b99a995edbc14382c9a2e75ebba143111e68ce8fefd8163ad4f93e1bd4cebd02f1115a697f047de

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1376841.exe

    Filesize

    11KB

    MD5

    02190ecc301498fde7c82cfa27ce9a80

    SHA1

    175e9d0b30f85c710407a1bab8445f01bd50ed5b

    SHA256

    3c95028e3b8c3bee4014f7a88e71ff40a5d46574f740bfef16a67fe7c1ddafc6

    SHA512

    842bf8abd9c9d5c1644a3cfb1d81f7d2302277082da7dc8f00fd0c5c6408f325d81a71496c153c0e3b0e1cbb0a95778269149fe8b0f5daec211fabee25613832

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5953175.exe

    Filesize

    226KB

    MD5

    320d1ef732fe22d402a7d7b1ec470218

    SHA1

    ecfd1ed0f2624cf9b3a5ed855e4c262eca8347ee

    SHA256

    e2a43d146d029c8dd94d35f7ad0b2fa8d9b06e5ff89e7e5f932f993bace40592

    SHA512

    42dc60c44740b053c4de020682ea25f4c9e583c40e264a3647f628e678cb8dcd1b056ac5aae9b6717c7364e8b50c377ff7fc43111c8145b88cb1d7f4880b5af8

  • memory/3192-56-0x000000000AB30000-0x000000000AB42000-memory.dmp

    Filesize

    72KB

  • memory/3192-58-0x00000000050B0000-0x00000000050FC000-memory.dmp

    Filesize

    304KB

  • memory/3192-57-0x000000000AB90000-0x000000000ABCC000-memory.dmp

    Filesize

    240KB

  • memory/3192-52-0x0000000000D80000-0x0000000000DB0000-memory.dmp

    Filesize

    192KB

  • memory/3192-53-0x0000000007A30000-0x0000000007A36000-memory.dmp

    Filesize

    24KB

  • memory/3192-54-0x000000000B070000-0x000000000B688000-memory.dmp

    Filesize

    6.1MB

  • memory/3192-55-0x000000000ABF0000-0x000000000ACFA000-memory.dmp

    Filesize

    1.0MB

  • memory/3468-28-0x0000000000120000-0x000000000012A000-memory.dmp

    Filesize

    40KB

  • memory/4136-48-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4136-45-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB