Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/11/2024, 02:52
Static task
static1
Behavioral task
behavioral1
Sample
5a867014cfa52a36ffc8e49a22d0bb59ab81e3986203b0c5f8ba20260b8af073.exe
Resource
win10v2004-20241007-en
General
-
Target
5a867014cfa52a36ffc8e49a22d0bb59ab81e3986203b0c5f8ba20260b8af073.exe
-
Size
639KB
-
MD5
ff18e2586d26e4e48c80ecf6888b805f
-
SHA1
da2944ddaed5b0166a75696de55dc5b53628aa1f
-
SHA256
5a867014cfa52a36ffc8e49a22d0bb59ab81e3986203b0c5f8ba20260b8af073
-
SHA512
8de30aeb04b33e3ae357c4464ff919bb42fe96848d84a7c8160a759f816f309ce1cc588e99cec99e3b335851a13884a4368eccbd86af3d316f222e50ff65a629
-
SSDEEP
12288:uMrvy90u59xaonHb41UIMiYb1tCdBZWyWrVohOGJyQ6/nnV+rRcID0:ByB59AYHb41UIImdxNT6/nQrSZ
Malware Config
Extracted
amadey
3.86
88c8bb
http://77.91.68.61
-
install_dir
925e7e99c5
-
install_file
pdates.exe
-
strings_key
ada76b8b0e1f6892ee93c20ab8946117
-
url_paths
/rock/index.php
Extracted
redline
gotad
77.91.124.84:19071
-
auth_value
3fb7c1f3fcf68bc377eae3f6f493a684
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023ced-26.dat healer behavioral1/memory/464-28-0x0000000000AB0000-0x0000000000ABA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a1743738.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a1743738.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a1743738.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a1743738.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a1743738.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a1743738.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023ce7-49.dat family_redline behavioral1/memory/4876-51-0x0000000000720000-0x0000000000750000-memory.dmp family_redline -
Redline family
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation b2524272.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation pdates.exe -
Executes dropped EXE 10 IoCs
pid Process 2284 v6844106.exe 448 v3708824.exe 2668 v1892742.exe 464 a1743738.exe 3300 b2524272.exe 1904 pdates.exe 2016 c3653077.exe 4876 d4341658.exe 2388 pdates.exe 3408 pdates.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a1743738.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5a867014cfa52a36ffc8e49a22d0bb59ab81e3986203b0c5f8ba20260b8af073.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v6844106.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v3708824.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v1892742.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdates.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4341658.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2524272.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a867014cfa52a36ffc8e49a22d0bb59ab81e3986203b0c5f8ba20260b8af073.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6844106.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v3708824.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v1892742.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3653077.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c3653077.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c3653077.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c3653077.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2032 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 464 a1743738.exe 464 a1743738.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 464 a1743738.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3300 b2524272.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4272 wrote to memory of 2284 4272 5a867014cfa52a36ffc8e49a22d0bb59ab81e3986203b0c5f8ba20260b8af073.exe 85 PID 4272 wrote to memory of 2284 4272 5a867014cfa52a36ffc8e49a22d0bb59ab81e3986203b0c5f8ba20260b8af073.exe 85 PID 4272 wrote to memory of 2284 4272 5a867014cfa52a36ffc8e49a22d0bb59ab81e3986203b0c5f8ba20260b8af073.exe 85 PID 2284 wrote to memory of 448 2284 v6844106.exe 86 PID 2284 wrote to memory of 448 2284 v6844106.exe 86 PID 2284 wrote to memory of 448 2284 v6844106.exe 86 PID 448 wrote to memory of 2668 448 v3708824.exe 87 PID 448 wrote to memory of 2668 448 v3708824.exe 87 PID 448 wrote to memory of 2668 448 v3708824.exe 87 PID 2668 wrote to memory of 464 2668 v1892742.exe 89 PID 2668 wrote to memory of 464 2668 v1892742.exe 89 PID 2668 wrote to memory of 3300 2668 v1892742.exe 105 PID 2668 wrote to memory of 3300 2668 v1892742.exe 105 PID 2668 wrote to memory of 3300 2668 v1892742.exe 105 PID 3300 wrote to memory of 1904 3300 b2524272.exe 107 PID 3300 wrote to memory of 1904 3300 b2524272.exe 107 PID 3300 wrote to memory of 1904 3300 b2524272.exe 107 PID 448 wrote to memory of 2016 448 v3708824.exe 108 PID 448 wrote to memory of 2016 448 v3708824.exe 108 PID 448 wrote to memory of 2016 448 v3708824.exe 108 PID 2284 wrote to memory of 4876 2284 v6844106.exe 109 PID 2284 wrote to memory of 4876 2284 v6844106.exe 109 PID 2284 wrote to memory of 4876 2284 v6844106.exe 109 PID 1904 wrote to memory of 2032 1904 pdates.exe 110 PID 1904 wrote to memory of 2032 1904 pdates.exe 110 PID 1904 wrote to memory of 2032 1904 pdates.exe 110 PID 1904 wrote to memory of 4016 1904 pdates.exe 112 PID 1904 wrote to memory of 4016 1904 pdates.exe 112 PID 1904 wrote to memory of 4016 1904 pdates.exe 112 PID 4016 wrote to memory of 3160 4016 cmd.exe 114 PID 4016 wrote to memory of 3160 4016 cmd.exe 114 PID 4016 wrote to memory of 3160 4016 cmd.exe 114 PID 4016 wrote to memory of 2140 4016 cmd.exe 115 PID 4016 wrote to memory of 2140 4016 cmd.exe 115 PID 4016 wrote to memory of 2140 4016 cmd.exe 115 PID 4016 wrote to memory of 4480 4016 cmd.exe 116 PID 4016 wrote to memory of 4480 4016 cmd.exe 116 PID 4016 wrote to memory of 4480 4016 cmd.exe 116 PID 4016 wrote to memory of 2300 4016 cmd.exe 117 PID 4016 wrote to memory of 2300 4016 cmd.exe 117 PID 4016 wrote to memory of 2300 4016 cmd.exe 117 PID 4016 wrote to memory of 3516 4016 cmd.exe 118 PID 4016 wrote to memory of 3516 4016 cmd.exe 118 PID 4016 wrote to memory of 3516 4016 cmd.exe 118 PID 4016 wrote to memory of 3036 4016 cmd.exe 119 PID 4016 wrote to memory of 3036 4016 cmd.exe 119 PID 4016 wrote to memory of 3036 4016 cmd.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a867014cfa52a36ffc8e49a22d0bb59ab81e3986203b0c5f8ba20260b8af073.exe"C:\Users\Admin\AppData\Local\Temp\5a867014cfa52a36ffc8e49a22d0bb59ab81e3986203b0c5f8ba20260b8af073.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6844106.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6844106.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3708824.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3708824.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1892742.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1892742.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1743738.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1743738.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:464
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2524272.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2524272.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2032
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵
- System Location Discovery: System Language Discovery
PID:3160
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:N"8⤵
- System Location Discovery: System Language Discovery
PID:2140
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:R" /E8⤵
- System Location Discovery: System Language Discovery
PID:4480
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵
- System Location Discovery: System Language Discovery
PID:2300
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:N"8⤵
- System Location Discovery: System Language Discovery
PID:3516
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:R" /E8⤵
- System Location Discovery: System Language Discovery
PID:3036
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c3653077.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c3653077.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:2016
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d4341658.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d4341658.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4876
-
-
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:2388
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:3408
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
514KB
MD59a66aa6f74609254a840eea826d4e596
SHA15cfb1fd9082b0834e571c4d8caa55f2b686f7577
SHA25697f51f092aa0f56090472ee86ce27d75913026a121707078c4e7f5d12b6f2a0d
SHA5121a8824deb5b3b839afa7dd60cc8b19b3eddfbca907592b90f539eb989b7c9b09566d68bf875c5bd04a36e035d938d93e45b2d4229552052452cc92da6ad3e120
-
Filesize
172KB
MD5441685c57cbe31efb69d591740de361f
SHA1065b0af1c5888d93e0ed56603b9d8fd7a300d6c1
SHA256336f956e8ee72cef40534e6c5e5f7b940f634c1ead3a6d8dea127bcf7160805b
SHA512db26b0bb156222646a068082530c0cc080221f00d20e7745e97585ead005c288f74c233a0579aed11091619ef611ee3c62bc7a869f448fb94824db7e809d9531
-
Filesize
359KB
MD5bfcb2be2478f71d213b7071ee336e360
SHA1e12ee26189e34dd6a217090774a56ebbba9f4d53
SHA2564051dfd07069d33fb6dbd45d9cb768ff734cf354f30f4da2851f56276f995bdf
SHA512e09304057b7d294078bd796b9da40fb49ef2948a7b0aa272558154321cb18c749188fdee7125228adbbca5f50ddc875c37936c3292702cf901650f6578791cac
-
Filesize
36KB
MD5f7369debf1a3a9dbb4bacf7736766871
SHA1f55cc966fb7aadfea0716d74a4c9ab980c1e9b1a
SHA256f6c72ab441b323cbecf67c151e01f3a9145d0110730c47aec71fd5a7f9a6f0a7
SHA512a8d2ea9bf07fa338a12ee4cdb55bb2ae1cb95cfa1aaf46b53701fd777e6058b76fd19a7ef9ae588ab642d1ef6ae5de7eaf82f3a65c3eca5c726e14f109d8de04
-
Filesize
234KB
MD54098b2459ea58c53a4ca38cfd977d9a6
SHA19896ea232ddaf62925a312426c061e86417f2d9f
SHA2563950c6ef7153767dfa52f568d716f29aadabb55c377cdcaa3ab38df0e6130ef4
SHA51299d28b80c26f6b2b5a34a797e9e66fd23043bea8a01ec2e81fbcd09b0c2ba91c11bf550faf994ca147b3ad6e92907074620b863d2a1fa1a25f0a04d9a4f404be
-
Filesize
11KB
MD5b9d968fb46e822fbad3cb4deee59ed3f
SHA1c2858be56ad227aa2b13db3e4c3cb990fda31e71
SHA256b8262776aba3cb31a48941c9b6fe0e357e2c59a5d96a1ed953f9d58874cc052d
SHA512dd45a3bf79cc6e641481f29bb858fb15c31c963215b2124330f8f3b2f2a82b0b44385af6c5fde9adc8a822cafe7112652e15d9751e51b30ae355379b25279d2b
-
Filesize
226KB
MD538279a67a40dbea4e9037ff803bee0b5
SHA1a6e7ae1b540a10633abad8d3c669873b0659eea1
SHA2564e39f56629c0e497181301346de96bc440d6ea82b72eaa935060182c844c6a93
SHA51253018f1a102452997d060064872e39c5d77b3e20eecbedaa4ff379ea58ec20a64cea46b2182daf416d271c5c85dcfeb84b39373c4a7ea90db6c61ddf91cdac0d