Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-11-2024 02:59

General

  • Target

    5e7b55acfa2be7e181f3f9631f12dee3c597b1704e2436d0c9d36dd9377b0eae.exe

  • Size

    641KB

  • MD5

    192d4f7a910fd33590bc0065cf5457c5

  • SHA1

    684b468b12604ffd59b949cbf000b7c09d8b9d3d

  • SHA256

    5e7b55acfa2be7e181f3f9631f12dee3c597b1704e2436d0c9d36dd9377b0eae

  • SHA512

    aa7eb694c125f8dc82fb2019c902b5acf3f0197d8fd19a279ae9c70a79e1a66fd709fc111518aeb4c2f1dd00ef4344f6e58b78baed351359d65a36774c375d2d

  • SSDEEP

    12288:vMrzy90dlZz2wBRKig2uKMBPUD/4uYq/6sQY7T8J0kK2Cz93ibUXk:0yI32wKiJu9FuYq6sZ7YJ0kKjsY0

Malware Config

Extracted

Family

amadey

Version

3.86

Botnet

88c8bb

C2

http://77.91.68.61

Attributes
  • install_dir

    925e7e99c5

  • install_file

    pdates.exe

  • strings_key

    ada76b8b0e1f6892ee93c20ab8946117

  • url_paths

    /rock/index.php

rc4.plain

Extracted

Family

redline

Botnet

gotad

C2

77.91.124.84:19071

Attributes
  • auth_value

    3fb7c1f3fcf68bc377eae3f6f493a684

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Smokeloader family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e7b55acfa2be7e181f3f9631f12dee3c597b1704e2436d0c9d36dd9377b0eae.exe
    "C:\Users\Admin\AppData\Local\Temp\5e7b55acfa2be7e181f3f9631f12dee3c597b1704e2436d0c9d36dd9377b0eae.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4464
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2819636.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2819636.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2644
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0939079.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0939079.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3388
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9047923.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9047923.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2572
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5620671.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5620671.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4632
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2209121.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2209121.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:5048
            • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
              "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3828
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F
                7⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:1052
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3628
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1420
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "pdates.exe" /P "Admin:N"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1904
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "pdates.exe" /P "Admin:R" /E
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3312
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2704
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\925e7e99c5" /P "Admin:N"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:5076
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\925e7e99c5" /P "Admin:R" /E
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3520
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c4839685.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c4839685.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Checks SCSI registry key(s)
          PID:4768
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d9732757.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d9732757.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:452
  • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
    C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
    1⤵
    • Executes dropped EXE
    PID:3620
  • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
    C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
    1⤵
    • Executes dropped EXE
    PID:1940
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:4656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2819636.exe

    Filesize

    514KB

    MD5

    805bbeb493d68eb0d8c96ada18436495

    SHA1

    06a0b492bcdd4c501b505fbba27fea7c852eb38d

    SHA256

    46ea2cc369df576514beb6bf09452e67fee1bced313d5eddd2c11653d890de1e

    SHA512

    8eb0093632dba04f16c1c1d27070b53ce124278abde9190c14435f57cd1277df8f45082c2e1bec4c10c36c03e89ea26c8c69f1fc37e0069432fd0576149dbb2f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d9732757.exe

    Filesize

    172KB

    MD5

    46ac7f5b523ecda1feb2db0083fb91c2

    SHA1

    2841c7937b49cda4755a549d3caa980e22d2a7a6

    SHA256

    1b54430bd1b13a7bac6745c7672bc9c22365e629049344afc8de06a6412264a5

    SHA512

    06d837d7be09af65896e94201998a03767fe88475fcdc6eb283b11872704e19b9ddbc567681c3f5a20adfdf63fc6b0ec9a5b486571ac1ee721aa404014cd0230

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0939079.exe

    Filesize

    359KB

    MD5

    fff0aa714cc676ea8f85ebe5ff766203

    SHA1

    95f9892e04204160577e92eb88591f8687f98719

    SHA256

    0ef86460dc030442db608ad8ba95facc4633a1e4532fc5924c67535bdc0db23d

    SHA512

    eae99af9fcf6c0f6c7c04694b12b265b2ef8b5aa031ec1e4fd38fbd59daec9fab251420ee6dfc5258d388a06af79e8829f4054e6840800779b87e39e075e8c33

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c4839685.exe

    Filesize

    36KB

    MD5

    fdd150f95b9aff884c7dbb16967d1e30

    SHA1

    620a482aa3898a59c626456f1da9edda5a934f19

    SHA256

    5c902d0f0618d020b89c916d03ae3b2b808bbd525b9dd71ed30a38b5939adfca

    SHA512

    f2b9596de88c8fd38e7b2a9b1b98890d1081f47be5abc91037c31ea9094cf4f352b7734399f3fc5017f9a05d4f357460138c12001dad4707db0799dd5b131dab

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9047923.exe

    Filesize

    234KB

    MD5

    fac56d71de771d9f3de24e6b28cdfbde

    SHA1

    c7b8515c2a6af40fcbff85476cdbcad8e90296f0

    SHA256

    b4668bb8363fdcf00dbee515f56355ef3702e192d095aec6273a83315e84b413

    SHA512

    d4a1ff7d619cf29646aba265fb727d2b07d7baa5fb5c3932aaa25c7078219a8a7cb1de7a103ba55ea33970b90fded350fb989d06b8a6310fc33933eadbc1db98

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5620671.exe

    Filesize

    11KB

    MD5

    c1c020c59cdf379c115377423ebcd969

    SHA1

    156ff2c61339f776ce26be8f4489fbb5966ec1f7

    SHA256

    2990ab23d14cb70a564db14a77dd09a8afff17f1f344d4163042860879ed430d

    SHA512

    994e5cd7be3d64988c5d795afef7f8b92fb3c335291fefc9b2b4f8a99e037f3c42fe2728bc31453ddd2bee3a6d41325f1b1743cf813780eb9fa91212b9c71ad5

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2209121.exe

    Filesize

    226KB

    MD5

    d8db53d1e3132bbf82fa5810a7935688

    SHA1

    e5151d1b32368b4882781d01099f521504bbcf94

    SHA256

    72878be618bbc5b488dee462f50f39b08253a55dc7cd9d1c10763fc316b0e018

    SHA512

    007986a1bdf5e0fd36df1be5e1136bb477852891b344e0a314f16389f0bc8d0b3f50de82df57d61f64171579d10542e03e99e02cb3f15bfc85c94720b92b0d16

  • memory/452-53-0x000000000A450000-0x000000000A55A000-memory.dmp

    Filesize

    1.0MB

  • memory/452-50-0x00000000004A0000-0x00000000004D0000-memory.dmp

    Filesize

    192KB

  • memory/452-51-0x0000000004C80000-0x0000000004C86000-memory.dmp

    Filesize

    24KB

  • memory/452-52-0x000000000A8E0000-0x000000000AEF8000-memory.dmp

    Filesize

    6.1MB

  • memory/452-54-0x000000000A390000-0x000000000A3A2000-memory.dmp

    Filesize

    72KB

  • memory/452-55-0x000000000A3F0000-0x000000000A42C000-memory.dmp

    Filesize

    240KB

  • memory/452-56-0x0000000002770000-0x00000000027BC000-memory.dmp

    Filesize

    304KB

  • memory/4632-28-0x0000000000030000-0x000000000003A000-memory.dmp

    Filesize

    40KB

  • memory/4768-46-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB