Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 03:30
Static task
static1
Behavioral task
behavioral1
Sample
d1af52bb30dcf7d7654a29439ccf3c349bf40b1987485bb914f1de7eebd15305.exe
Resource
win10v2004-20241007-en
General
-
Target
d1af52bb30dcf7d7654a29439ccf3c349bf40b1987485bb914f1de7eebd15305.exe
-
Size
642KB
-
MD5
5abe86873dc4ebc6bb41db7915e0de05
-
SHA1
232f972ffcc0a11be1d23129cba195c774147dd7
-
SHA256
d1af52bb30dcf7d7654a29439ccf3c349bf40b1987485bb914f1de7eebd15305
-
SHA512
2e553b66d6b708e73b4de27a5e459a3847397db42f94ef62d7a6884ceb9df0a9f0bd381bff6811fcdd9a0b0d4b9c2e2102a9ad2e0ef029915faf477f62b99e72
-
SSDEEP
12288:6Mr7y90bkgLZCFUGzREhidbXeK5Wtrs2wHoeJZ+7+VlJEDCN+:Ry8LBGzcidbXX5WCxHJrV/EDCM
Malware Config
Extracted
amadey
3.86
88c8bb
http://77.91.68.61
-
install_dir
925e7e99c5
-
install_file
pdates.exe
-
strings_key
ada76b8b0e1f6892ee93c20ab8946117
-
url_paths
/rock/index.php
Extracted
redline
lodka
77.91.124.156:19071
-
auth_value
76f99d6cc9332c02bb9728c3ba80d3a9
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule behavioral1/files/0x0009000000023bfb-26.dat healer behavioral1/memory/4360-28-0x0000000000FD0000-0x0000000000FDA000-memory.dmp healer -
Healer family
-
Processes:
a4717171.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4717171.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4717171.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4717171.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a4717171.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4717171.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4717171.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/files/0x0008000000023bc6-48.dat family_redline behavioral1/memory/1316-50-0x0000000000100000-0x0000000000130000-memory.dmp family_redline -
Redline family
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
b7362321.exepdates.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation b7362321.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation pdates.exe -
Executes dropped EXE 10 IoCs
Processes:
v4518261.exev2688527.exev1621275.exea4717171.exeb7362321.exepdates.exec9358843.exed3764537.exepdates.exepdates.exepid Process 3868 v4518261.exe 2040 v2688527.exe 3016 v1621275.exe 4360 a4717171.exe 2612 b7362321.exe 3624 pdates.exe 4864 c9358843.exe 1316 d3764537.exe 4876 pdates.exe 3656 pdates.exe -
Processes:
a4717171.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a4717171.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
d1af52bb30dcf7d7654a29439ccf3c349bf40b1987485bb914f1de7eebd15305.exev4518261.exev2688527.exev1621275.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d1af52bb30dcf7d7654a29439ccf3c349bf40b1987485bb914f1de7eebd15305.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v4518261.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v2688527.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v1621275.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid Process 5088 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
b7362321.execacls.execacls.execacls.exev2688527.exeschtasks.execmd.exec9358843.execacls.execmd.exev4518261.exev1621275.exepdates.exed1af52bb30dcf7d7654a29439ccf3c349bf40b1987485bb914f1de7eebd15305.execmd.exed3764537.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7362321.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v2688527.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c9358843.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v4518261.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v1621275.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdates.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1af52bb30dcf7d7654a29439ccf3c349bf40b1987485bb914f1de7eebd15305.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3764537.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
c9358843.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c9358843.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c9358843.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c9358843.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
a4717171.exepid Process 4360 a4717171.exe 4360 a4717171.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a4717171.exedescription pid Process Token: SeDebugPrivilege 4360 a4717171.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
b7362321.exepid Process 2612 b7362321.exe -
Suspicious use of WriteProcessMemory 47 IoCs
Processes:
d1af52bb30dcf7d7654a29439ccf3c349bf40b1987485bb914f1de7eebd15305.exev4518261.exev2688527.exev1621275.exeb7362321.exepdates.execmd.exedescription pid Process procid_target PID 3400 wrote to memory of 3868 3400 d1af52bb30dcf7d7654a29439ccf3c349bf40b1987485bb914f1de7eebd15305.exe 83 PID 3400 wrote to memory of 3868 3400 d1af52bb30dcf7d7654a29439ccf3c349bf40b1987485bb914f1de7eebd15305.exe 83 PID 3400 wrote to memory of 3868 3400 d1af52bb30dcf7d7654a29439ccf3c349bf40b1987485bb914f1de7eebd15305.exe 83 PID 3868 wrote to memory of 2040 3868 v4518261.exe 85 PID 3868 wrote to memory of 2040 3868 v4518261.exe 85 PID 3868 wrote to memory of 2040 3868 v4518261.exe 85 PID 2040 wrote to memory of 3016 2040 v2688527.exe 86 PID 2040 wrote to memory of 3016 2040 v2688527.exe 86 PID 2040 wrote to memory of 3016 2040 v2688527.exe 86 PID 3016 wrote to memory of 4360 3016 v1621275.exe 87 PID 3016 wrote to memory of 4360 3016 v1621275.exe 87 PID 3016 wrote to memory of 2612 3016 v1621275.exe 97 PID 3016 wrote to memory of 2612 3016 v1621275.exe 97 PID 3016 wrote to memory of 2612 3016 v1621275.exe 97 PID 2612 wrote to memory of 3624 2612 b7362321.exe 98 PID 2612 wrote to memory of 3624 2612 b7362321.exe 98 PID 2612 wrote to memory of 3624 2612 b7362321.exe 98 PID 2040 wrote to memory of 4864 2040 v2688527.exe 99 PID 2040 wrote to memory of 4864 2040 v2688527.exe 99 PID 2040 wrote to memory of 4864 2040 v2688527.exe 99 PID 3624 wrote to memory of 4988 3624 pdates.exe 100 PID 3624 wrote to memory of 4988 3624 pdates.exe 100 PID 3624 wrote to memory of 4988 3624 pdates.exe 100 PID 3624 wrote to memory of 948 3624 pdates.exe 102 PID 3624 wrote to memory of 948 3624 pdates.exe 102 PID 3624 wrote to memory of 948 3624 pdates.exe 102 PID 948 wrote to memory of 1032 948 cmd.exe 104 PID 948 wrote to memory of 1032 948 cmd.exe 104 PID 948 wrote to memory of 1032 948 cmd.exe 104 PID 948 wrote to memory of 1340 948 cmd.exe 105 PID 948 wrote to memory of 1340 948 cmd.exe 105 PID 948 wrote to memory of 1340 948 cmd.exe 105 PID 948 wrote to memory of 1628 948 cmd.exe 106 PID 948 wrote to memory of 1628 948 cmd.exe 106 PID 948 wrote to memory of 1628 948 cmd.exe 106 PID 948 wrote to memory of 5088 948 cmd.exe 107 PID 948 wrote to memory of 5088 948 cmd.exe 107 PID 948 wrote to memory of 5088 948 cmd.exe 107 PID 948 wrote to memory of 1556 948 cmd.exe 108 PID 948 wrote to memory of 1556 948 cmd.exe 108 PID 948 wrote to memory of 1556 948 cmd.exe 108 PID 948 wrote to memory of 5060 948 cmd.exe 109 PID 948 wrote to memory of 5060 948 cmd.exe 109 PID 948 wrote to memory of 5060 948 cmd.exe 109 PID 3868 wrote to memory of 1316 3868 v4518261.exe 120 PID 3868 wrote to memory of 1316 3868 v4518261.exe 120 PID 3868 wrote to memory of 1316 3868 v4518261.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1af52bb30dcf7d7654a29439ccf3c349bf40b1987485bb914f1de7eebd15305.exe"C:\Users\Admin\AppData\Local\Temp\d1af52bb30dcf7d7654a29439ccf3c349bf40b1987485bb914f1de7eebd15305.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4518261.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4518261.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2688527.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2688527.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1621275.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1621275.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a4717171.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a4717171.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4360
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b7362321.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b7362321.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4988
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵
- System Location Discovery: System Language Discovery
PID:1032
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:N"8⤵
- System Location Discovery: System Language Discovery
PID:1340
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:R" /E8⤵
- System Location Discovery: System Language Discovery
PID:1628
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵
- System Location Discovery: System Language Discovery
PID:5088
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:N"8⤵
- System Location Discovery: System Language Discovery
PID:1556
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:R" /E8⤵
- System Location Discovery: System Language Discovery
PID:5060
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9358843.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9358843.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:4864
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d3764537.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d3764537.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1316
-
-
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:4876
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:3656
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5088
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
514KB
MD5e9acf4e7f65fcefc9b241f517471e99d
SHA18edcc4a9662f09b4dc55661418a184e87ed2fe7f
SHA25673ef7469585e66723d1211dc4800088e0e93d2d218fce89b6ff026ddd89eaaca
SHA512031ffbdf0c0ba076251e1102a21621983f4c2be183488d1a7d924ba9cca3a6990a0855b9c9b16eccda6e7c0b3f9930376489e5358ef524854589f5d658b9d0b9
-
Filesize
173KB
MD5852358bd73791e0684e03eeaeeffac3c
SHA14093508eaaf5b6677ecae7747ec964a8ae1cc593
SHA25660070f5ef329c1925924cd37d00ba94274a0d8ad24920b9310e2e9e5d83bbe47
SHA512dcfb6c95fddc8027071d25b9a32d73fdd343f04357eb23b7cd8f12be147d8a94308200fd54376ad7eeba691a6e6ab54ae268de70d812084d64cd41911a8632e2
-
Filesize
359KB
MD53a7448b02e899a528ff5633baa3a6bdd
SHA1873262df0c248206b6fdbc92b02f7551a66e0e1d
SHA256b849ccaf5cf5bf779d6bcf2bb6efa0d8b726c9d2e601699b0056b48f7d96a7fe
SHA512f56438d181afb6910914800c8bad6116c5f54d4cd13ca6052bf2ffd9e6fc76d77f4bbb8cfd85c3a712f23cd1f45055acabb6704887f9e9e965579db90cc73383
-
Filesize
38KB
MD5427aa69ff8d80790480a120eec07155e
SHA17fab14f66fd9c1e4452d745a9493cf23a2f65709
SHA256d06e2c633ed67b4b7e2e94f442a6a7c5a7c3a25d9390f3d275a1caee91b378ca
SHA512f31dbabe3b0e7348b7e1c6f39d101cbffb045c2654dee029c0b0c9a851d583559329675c2ed8fb9b719f8a4830e49e70726a7a504b94d02d083cfa7095ca971b
-
Filesize
234KB
MD5a6ba0f56364d34116c06129fa2583c2d
SHA11bd31ea9ee4eb747801dac610b520924a10ee0ab
SHA256f8bb6f577654d7dd8b0ec5dbd9ee2401990ca235f09d9b80a369557344f5c7a7
SHA512fe41756792aac51276b3fb4d64044e6661d2a1423d340d82df00adde8f5f5fe509d58527eabbc0987940ca016a56a308b69806ceaec37b5a0fd28473bbcc7f5d
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
229KB
MD5a9ebd9c53cf5d6dbf9f378836d88a31a
SHA1ca9c0d85264e67b6cdb7e5dad2f0a62a9afbac17
SHA2561879cc826c6ca6a6f4f2c9bcbf5f4c147c33ae2bb28447251a6ad4df4ce0250c
SHA5127391e654b9c2e066db861fced50a598541e57791499dcd4af244892566e39ceda38f20029fbd8df534a51472df6f996edce215533b5d56a0c4e3434618131843