Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/11/2024, 18:42
Static task
static1
Behavioral task
behavioral1
Sample
495151363b2f054498bfebbd3c2ab98bc556b5a39feeb8c1f4236e079cb326c4.exe
Resource
win10v2004-20241007-en
General
-
Target
495151363b2f054498bfebbd3c2ab98bc556b5a39feeb8c1f4236e079cb326c4.exe
-
Size
514KB
-
MD5
50cee47138ffb917cf9642830f96a487
-
SHA1
c3580673135a4043b2c43cdcfe30689a4ff68407
-
SHA256
495151363b2f054498bfebbd3c2ab98bc556b5a39feeb8c1f4236e079cb326c4
-
SHA512
704b79c94eb58bd3afe70354c50983728cac0feb5f118c90c851e0aa80e509fef127d7f42e160ec3fd2619de50e348db5dd3ce5a1dd33264d936ac19bfba84b2
-
SSDEEP
12288:fMrty90qTT5cwT36ulgSA+MYQd5QAclNqr3ej+h:aypXv36uFMY3Y3f
Malware Config
Extracted
amadey
3.86
88c8bb
http://77.91.68.61
-
install_dir
925e7e99c5
-
install_file
pdates.exe
-
strings_key
ada76b8b0e1f6892ee93c20ab8946117
-
url_paths
/rock/index.php
Extracted
redline
news
77.91.68.68:19071
-
auth_value
99ba2ffe8d72ebe9fdc7e758c94db148
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0009000000023bdc-19.dat healer behavioral1/memory/2660-22-0x0000000000570000-0x000000000057A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a0002569.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a0002569.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a0002569.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a0002569.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a0002569.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a0002569.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0009000000023bd1-43.dat family_redline behavioral1/memory/400-45-0x0000000000AB0000-0x0000000000AE0000-memory.dmp family_redline -
Redline family
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation b4320630.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation pdates.exe -
Executes dropped EXE 9 IoCs
pid Process 4724 v5676487.exe 548 v5016111.exe 2660 a0002569.exe 2344 b4320630.exe 2144 pdates.exe 4160 c9884633.exe 400 d6143066.exe 3124 pdates.exe 404 pdates.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a0002569.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v5676487.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v5016111.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 495151363b2f054498bfebbd3c2ab98bc556b5a39feeb8c1f4236e079cb326c4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4320630.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c9884633.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdates.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v5016111.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 495151363b2f054498bfebbd3c2ab98bc556b5a39feeb8c1f4236e079cb326c4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v5676487.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6143066.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c9884633.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c9884633.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c9884633.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2312 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2660 a0002569.exe 2660 a0002569.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2660 a0002569.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 4584 wrote to memory of 4724 4584 495151363b2f054498bfebbd3c2ab98bc556b5a39feeb8c1f4236e079cb326c4.exe 84 PID 4584 wrote to memory of 4724 4584 495151363b2f054498bfebbd3c2ab98bc556b5a39feeb8c1f4236e079cb326c4.exe 84 PID 4584 wrote to memory of 4724 4584 495151363b2f054498bfebbd3c2ab98bc556b5a39feeb8c1f4236e079cb326c4.exe 84 PID 4724 wrote to memory of 548 4724 v5676487.exe 85 PID 4724 wrote to memory of 548 4724 v5676487.exe 85 PID 4724 wrote to memory of 548 4724 v5676487.exe 85 PID 548 wrote to memory of 2660 548 v5016111.exe 86 PID 548 wrote to memory of 2660 548 v5016111.exe 86 PID 548 wrote to memory of 2344 548 v5016111.exe 96 PID 548 wrote to memory of 2344 548 v5016111.exe 96 PID 548 wrote to memory of 2344 548 v5016111.exe 96 PID 2344 wrote to memory of 2144 2344 b4320630.exe 97 PID 2344 wrote to memory of 2144 2344 b4320630.exe 97 PID 2344 wrote to memory of 2144 2344 b4320630.exe 97 PID 4724 wrote to memory of 4160 4724 v5676487.exe 98 PID 4724 wrote to memory of 4160 4724 v5676487.exe 98 PID 4724 wrote to memory of 4160 4724 v5676487.exe 98 PID 2144 wrote to memory of 2312 2144 pdates.exe 99 PID 2144 wrote to memory of 2312 2144 pdates.exe 99 PID 2144 wrote to memory of 2312 2144 pdates.exe 99 PID 2144 wrote to memory of 5072 2144 pdates.exe 101 PID 2144 wrote to memory of 5072 2144 pdates.exe 101 PID 2144 wrote to memory of 5072 2144 pdates.exe 101 PID 5072 wrote to memory of 2524 5072 cmd.exe 103 PID 5072 wrote to memory of 2524 5072 cmd.exe 103 PID 5072 wrote to memory of 2524 5072 cmd.exe 103 PID 5072 wrote to memory of 4676 5072 cmd.exe 104 PID 5072 wrote to memory of 4676 5072 cmd.exe 104 PID 5072 wrote to memory of 4676 5072 cmd.exe 104 PID 5072 wrote to memory of 3272 5072 cmd.exe 105 PID 5072 wrote to memory of 3272 5072 cmd.exe 105 PID 5072 wrote to memory of 3272 5072 cmd.exe 105 PID 5072 wrote to memory of 1064 5072 cmd.exe 106 PID 5072 wrote to memory of 1064 5072 cmd.exe 106 PID 5072 wrote to memory of 1064 5072 cmd.exe 106 PID 5072 wrote to memory of 896 5072 cmd.exe 107 PID 5072 wrote to memory of 896 5072 cmd.exe 107 PID 5072 wrote to memory of 896 5072 cmd.exe 107 PID 5072 wrote to memory of 2140 5072 cmd.exe 109 PID 5072 wrote to memory of 2140 5072 cmd.exe 109 PID 5072 wrote to memory of 2140 5072 cmd.exe 109 PID 4584 wrote to memory of 400 4584 495151363b2f054498bfebbd3c2ab98bc556b5a39feeb8c1f4236e079cb326c4.exe 114 PID 4584 wrote to memory of 400 4584 495151363b2f054498bfebbd3c2ab98bc556b5a39feeb8c1f4236e079cb326c4.exe 114 PID 4584 wrote to memory of 400 4584 495151363b2f054498bfebbd3c2ab98bc556b5a39feeb8c1f4236e079cb326c4.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\495151363b2f054498bfebbd3c2ab98bc556b5a39feeb8c1f4236e079cb326c4.exe"C:\Users\Admin\AppData\Local\Temp\495151363b2f054498bfebbd3c2ab98bc556b5a39feeb8c1f4236e079cb326c4.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5676487.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5676487.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5016111.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5016111.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0002569.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0002569.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4320630.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4320630.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2312
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵
- System Location Discovery: System Language Discovery
PID:2524
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:N"7⤵
- System Location Discovery: System Language Discovery
PID:4676
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:R" /E7⤵
- System Location Discovery: System Language Discovery
PID:3272
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵
- System Location Discovery: System Language Discovery
PID:1064
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:N"7⤵
- System Location Discovery: System Language Discovery
PID:896
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:R" /E7⤵
- System Location Discovery: System Language Discovery
PID:2140
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c9884633.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c9884633.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:4160
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6143066.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6143066.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:400
-
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:3124
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:404
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD51ec0cef25380752432f3fb3dbb229099
SHA1b05e6cc7a8f1d04e775ed1104c3deb1ee10d229d
SHA25646ebbcb3f745064c50a88bc91b7b41942ef3ccfe7cacafaf3a0484b29f1f31c3
SHA5121e1e94a6ad7138cdc0326f05cfe623a825e01150056f5c5b79bb313a1960e08a32f3aeb419de90540841e0afb38b20d4a95c896de0d39b74aa85ae90277af4db
-
Filesize
359KB
MD57e01d0777f323da38153036af307fd63
SHA1978d823dbe86d68958e4dd9a8a1cb284f68aa8a0
SHA25647dd4d47780e9031c081409e4d51c2777077f478b9363576b9434898d84aa729
SHA512140a517892a71c2f7d219d46ed6284a7bead67e69dbd44e530f46795112c7efa3d46acd26ac8a5ced4342808ebca31409bb82fdc0c181280b400c402d210061d
-
Filesize
35KB
MD58698a6a3915b1359237bad4f4a0f7e11
SHA12bd1eed9469587f0aa3f3060659e9eef3eef881b
SHA2563b32be8732dc6963309837fb6448d4c273350921cc1332e54a25f4004771ff53
SHA5129ed6a46f84d31f3bd3daaa3ac55d142c4887cec5ab15df977538e958d11ab4ade775292f53368d0d31bb3f515ba5a0e06581d265f617a2cacb073bcc137113a8
-
Filesize
234KB
MD59c571abbb7cc49b1e632495299acfaca
SHA19fab8001333a89ae394052d01666aba400859942
SHA256e666bed293d13334d41c4e4a13da4fbb3d08f213ff1cd6baff23a68356af8bd8
SHA512b25fa04bf54b916ab6ef44b1286a984b982227dfedf316a4d9febceba3cbe1736f2f8a2c554a20513afd6347cd396d76ff09780f33982c809dc8b770bd01fdad
-
Filesize
13KB
MD5765ed2f26c88474cd2fbaebad452990c
SHA1d6922cb3a5c92233e07d57b55fa748dce7e644c0
SHA256194a1e09f24014e3f48216fe698993f1126401412fdb6af625dae84c7028dcfc
SHA51295e8d3844112251e1f5010e8848c946a4db8633be7c55c3541adafee3188208c30bf02e4e777f0e4b1d26819a92d1b6cb6b1c1d5c78c387e2199bef1c8b6377b
-
Filesize
223KB
MD5305ecbabc0304bc3d2708d6d511e019a
SHA163aa542890fb0c5dd2eea5325a8736c77359f037
SHA2567731afb0d4949a79a0ce96055a2aa053f146a0c0420a6cab24b9cbd2067c0210
SHA512cfdd1018058d889034df2bd7289bbf0fbc170bf9893d74508cb012a7a1cf70b245232e99eed00e2d88bee39eaa1b27f715d794bfe9829948c0e7e38f49a5754a