Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 02:59
Static task
static1
Behavioral task
behavioral1
Sample
5e7b55acfa2be7e181f3f9631f12dee3c597b1704e2436d0c9d36dd9377b0eae.exe
Resource
win10v2004-20241007-en
General
-
Target
5e7b55acfa2be7e181f3f9631f12dee3c597b1704e2436d0c9d36dd9377b0eae.exe
-
Size
641KB
-
MD5
192d4f7a910fd33590bc0065cf5457c5
-
SHA1
684b468b12604ffd59b949cbf000b7c09d8b9d3d
-
SHA256
5e7b55acfa2be7e181f3f9631f12dee3c597b1704e2436d0c9d36dd9377b0eae
-
SHA512
aa7eb694c125f8dc82fb2019c902b5acf3f0197d8fd19a279ae9c70a79e1a66fd709fc111518aeb4c2f1dd00ef4344f6e58b78baed351359d65a36774c375d2d
-
SSDEEP
12288:vMrzy90dlZz2wBRKig2uKMBPUD/4uYq/6sQY7T8J0kK2Cz93ibUXk:0yI32wKiJu9FuYq6sZ7YJ0kKjsY0
Malware Config
Extracted
amadey
3.86
88c8bb
http://77.91.68.61
-
install_dir
925e7e99c5
-
install_file
pdates.exe
-
strings_key
ada76b8b0e1f6892ee93c20ab8946117
-
url_paths
/rock/index.php
Extracted
redline
gotad
77.91.124.84:19071
-
auth_value
3fb7c1f3fcf68bc377eae3f6f493a684
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023ca3-26.dat healer behavioral1/memory/4632-28-0x0000000000030000-0x000000000003A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5620671.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a5620671.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5620671.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5620671.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5620671.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5620671.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023c9e-48.dat family_redline behavioral1/memory/452-50-0x00000000004A0000-0x00000000004D0000-memory.dmp family_redline -
Redline family
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation b2209121.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation pdates.exe -
Executes dropped EXE 10 IoCs
pid Process 2644 v2819636.exe 3388 v0939079.exe 2572 v9047923.exe 4632 a5620671.exe 5048 b2209121.exe 3828 pdates.exe 4768 c4839685.exe 452 d9732757.exe 3620 pdates.exe 1940 pdates.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a5620671.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2819636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v0939079.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v9047923.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5e7b55acfa2be7e181f3f9631f12dee3c597b1704e2436d0c9d36dd9377b0eae.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4656 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v9047923.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2209121.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdates.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c4839685.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5e7b55acfa2be7e181f3f9631f12dee3c597b1704e2436d0c9d36dd9377b0eae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v2819636.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v0939079.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9732757.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c4839685.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c4839685.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c4839685.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1052 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4632 a5620671.exe 4632 a5620671.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4632 a5620671.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5048 b2209121.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4464 wrote to memory of 2644 4464 5e7b55acfa2be7e181f3f9631f12dee3c597b1704e2436d0c9d36dd9377b0eae.exe 84 PID 4464 wrote to memory of 2644 4464 5e7b55acfa2be7e181f3f9631f12dee3c597b1704e2436d0c9d36dd9377b0eae.exe 84 PID 4464 wrote to memory of 2644 4464 5e7b55acfa2be7e181f3f9631f12dee3c597b1704e2436d0c9d36dd9377b0eae.exe 84 PID 2644 wrote to memory of 3388 2644 v2819636.exe 85 PID 2644 wrote to memory of 3388 2644 v2819636.exe 85 PID 2644 wrote to memory of 3388 2644 v2819636.exe 85 PID 3388 wrote to memory of 2572 3388 v0939079.exe 86 PID 3388 wrote to memory of 2572 3388 v0939079.exe 86 PID 3388 wrote to memory of 2572 3388 v0939079.exe 86 PID 2572 wrote to memory of 4632 2572 v9047923.exe 87 PID 2572 wrote to memory of 4632 2572 v9047923.exe 87 PID 2572 wrote to memory of 5048 2572 v9047923.exe 95 PID 2572 wrote to memory of 5048 2572 v9047923.exe 95 PID 2572 wrote to memory of 5048 2572 v9047923.exe 95 PID 5048 wrote to memory of 3828 5048 b2209121.exe 96 PID 5048 wrote to memory of 3828 5048 b2209121.exe 96 PID 5048 wrote to memory of 3828 5048 b2209121.exe 96 PID 3388 wrote to memory of 4768 3388 v0939079.exe 97 PID 3388 wrote to memory of 4768 3388 v0939079.exe 97 PID 3388 wrote to memory of 4768 3388 v0939079.exe 97 PID 3828 wrote to memory of 1052 3828 pdates.exe 98 PID 3828 wrote to memory of 1052 3828 pdates.exe 98 PID 3828 wrote to memory of 1052 3828 pdates.exe 98 PID 3828 wrote to memory of 3628 3828 pdates.exe 100 PID 3828 wrote to memory of 3628 3828 pdates.exe 100 PID 3828 wrote to memory of 3628 3828 pdates.exe 100 PID 3628 wrote to memory of 1420 3628 cmd.exe 102 PID 3628 wrote to memory of 1420 3628 cmd.exe 102 PID 3628 wrote to memory of 1420 3628 cmd.exe 102 PID 3628 wrote to memory of 1904 3628 cmd.exe 103 PID 3628 wrote to memory of 1904 3628 cmd.exe 103 PID 3628 wrote to memory of 1904 3628 cmd.exe 103 PID 3628 wrote to memory of 3312 3628 cmd.exe 104 PID 3628 wrote to memory of 3312 3628 cmd.exe 104 PID 3628 wrote to memory of 3312 3628 cmd.exe 104 PID 3628 wrote to memory of 2704 3628 cmd.exe 105 PID 3628 wrote to memory of 2704 3628 cmd.exe 105 PID 3628 wrote to memory of 2704 3628 cmd.exe 105 PID 3628 wrote to memory of 5076 3628 cmd.exe 106 PID 3628 wrote to memory of 5076 3628 cmd.exe 106 PID 3628 wrote to memory of 5076 3628 cmd.exe 106 PID 3628 wrote to memory of 3520 3628 cmd.exe 107 PID 3628 wrote to memory of 3520 3628 cmd.exe 107 PID 3628 wrote to memory of 3520 3628 cmd.exe 107 PID 2644 wrote to memory of 452 2644 v2819636.exe 113 PID 2644 wrote to memory of 452 2644 v2819636.exe 113 PID 2644 wrote to memory of 452 2644 v2819636.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e7b55acfa2be7e181f3f9631f12dee3c597b1704e2436d0c9d36dd9377b0eae.exe"C:\Users\Admin\AppData\Local\Temp\5e7b55acfa2be7e181f3f9631f12dee3c597b1704e2436d0c9d36dd9377b0eae.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2819636.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2819636.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0939079.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0939079.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9047923.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9047923.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5620671.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5620671.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2209121.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2209121.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1052
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵
- System Location Discovery: System Language Discovery
PID:1420
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:N"8⤵
- System Location Discovery: System Language Discovery
PID:1904
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:R" /E8⤵
- System Location Discovery: System Language Discovery
PID:3312
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵
- System Location Discovery: System Language Discovery
PID:2704
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:N"8⤵
- System Location Discovery: System Language Discovery
PID:5076
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:R" /E8⤵
- System Location Discovery: System Language Discovery
PID:3520
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c4839685.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c4839685.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:4768
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d9732757.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d9732757.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:452
-
-
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:3620
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:1940
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4656
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
514KB
MD5805bbeb493d68eb0d8c96ada18436495
SHA106a0b492bcdd4c501b505fbba27fea7c852eb38d
SHA25646ea2cc369df576514beb6bf09452e67fee1bced313d5eddd2c11653d890de1e
SHA5128eb0093632dba04f16c1c1d27070b53ce124278abde9190c14435f57cd1277df8f45082c2e1bec4c10c36c03e89ea26c8c69f1fc37e0069432fd0576149dbb2f
-
Filesize
172KB
MD546ac7f5b523ecda1feb2db0083fb91c2
SHA12841c7937b49cda4755a549d3caa980e22d2a7a6
SHA2561b54430bd1b13a7bac6745c7672bc9c22365e629049344afc8de06a6412264a5
SHA51206d837d7be09af65896e94201998a03767fe88475fcdc6eb283b11872704e19b9ddbc567681c3f5a20adfdf63fc6b0ec9a5b486571ac1ee721aa404014cd0230
-
Filesize
359KB
MD5fff0aa714cc676ea8f85ebe5ff766203
SHA195f9892e04204160577e92eb88591f8687f98719
SHA2560ef86460dc030442db608ad8ba95facc4633a1e4532fc5924c67535bdc0db23d
SHA512eae99af9fcf6c0f6c7c04694b12b265b2ef8b5aa031ec1e4fd38fbd59daec9fab251420ee6dfc5258d388a06af79e8829f4054e6840800779b87e39e075e8c33
-
Filesize
36KB
MD5fdd150f95b9aff884c7dbb16967d1e30
SHA1620a482aa3898a59c626456f1da9edda5a934f19
SHA2565c902d0f0618d020b89c916d03ae3b2b808bbd525b9dd71ed30a38b5939adfca
SHA512f2b9596de88c8fd38e7b2a9b1b98890d1081f47be5abc91037c31ea9094cf4f352b7734399f3fc5017f9a05d4f357460138c12001dad4707db0799dd5b131dab
-
Filesize
234KB
MD5fac56d71de771d9f3de24e6b28cdfbde
SHA1c7b8515c2a6af40fcbff85476cdbcad8e90296f0
SHA256b4668bb8363fdcf00dbee515f56355ef3702e192d095aec6273a83315e84b413
SHA512d4a1ff7d619cf29646aba265fb727d2b07d7baa5fb5c3932aaa25c7078219a8a7cb1de7a103ba55ea33970b90fded350fb989d06b8a6310fc33933eadbc1db98
-
Filesize
11KB
MD5c1c020c59cdf379c115377423ebcd969
SHA1156ff2c61339f776ce26be8f4489fbb5966ec1f7
SHA2562990ab23d14cb70a564db14a77dd09a8afff17f1f344d4163042860879ed430d
SHA512994e5cd7be3d64988c5d795afef7f8b92fb3c335291fefc9b2b4f8a99e037f3c42fe2728bc31453ddd2bee3a6d41325f1b1743cf813780eb9fa91212b9c71ad5
-
Filesize
226KB
MD5d8db53d1e3132bbf82fa5810a7935688
SHA1e5151d1b32368b4882781d01099f521504bbcf94
SHA25672878be618bbc5b488dee462f50f39b08253a55dc7cd9d1c10763fc316b0e018
SHA512007986a1bdf5e0fd36df1be5e1136bb477852891b344e0a314f16389f0bc8d0b3f50de82df57d61f64171579d10542e03e99e02cb3f15bfc85c94720b92b0d16