Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 10:29
Static task
static1
Behavioral task
behavioral1
Sample
f7d3686efacf69adda24ec0f03a74c0df316559f424aa266525fdb48948c990a.exe
Resource
win10v2004-20241007-en
General
-
Target
f7d3686efacf69adda24ec0f03a74c0df316559f424aa266525fdb48948c990a.exe
-
Size
641KB
-
MD5
fca90e9ef7eeb6d32f8191d9e01c6d46
-
SHA1
70964808f0990d0b54f65b3e25672069d5f885ca
-
SHA256
f7d3686efacf69adda24ec0f03a74c0df316559f424aa266525fdb48948c990a
-
SHA512
02569acbff68c71896d648ef383f7501fdd9752277167187d78838dd94b8f1328f5fa740aa143f181bf9782fcdbba9e81e71a213479552f2f598d65d163d8e33
-
SSDEEP
12288:oMrdy90r0tTjITWm6zYJ8v2z+Hm7Rf93rIQComdEUn7N:lyFv2hlf9bvCoIR7N
Malware Config
Extracted
amadey
3.86
88c8bb
http://77.91.68.61
-
install_dir
925e7e99c5
-
install_file
pdates.exe
-
strings_key
ada76b8b0e1f6892ee93c20ab8946117
-
url_paths
/rock/index.php
Extracted
redline
gotad
77.91.124.84:19071
-
auth_value
3fb7c1f3fcf68bc377eae3f6f493a684
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule behavioral1/files/0x0032000000023b86-26.dat healer behavioral1/memory/512-28-0x0000000000BB0000-0x0000000000BBA000-memory.dmp healer -
Healer family
-
Processes:
a9514684.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a9514684.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a9514684.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a9514684.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a9514684.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a9514684.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a9514684.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/files/0x000a000000023b80-49.dat family_redline behavioral1/memory/440-51-0x00000000009A0000-0x00000000009D0000-memory.dmp family_redline -
Redline family
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
b4283338.exepdates.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation b4283338.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation pdates.exe -
Executes dropped EXE 10 IoCs
Processes:
v8338597.exev4994155.exev0822912.exea9514684.exeb4283338.exepdates.exec3197320.exed1439210.exepdates.exepdates.exepid Process 4716 v8338597.exe 5108 v4994155.exe 2224 v0822912.exe 512 a9514684.exe 116 b4283338.exe 1912 pdates.exe 4892 c3197320.exe 440 d1439210.exe 2364 pdates.exe 1916 pdates.exe -
Processes:
a9514684.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a9514684.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
f7d3686efacf69adda24ec0f03a74c0df316559f424aa266525fdb48948c990a.exev8338597.exev4994155.exev0822912.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f7d3686efacf69adda24ec0f03a74c0df316559f424aa266525fdb48948c990a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v8338597.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4994155.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v0822912.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pdates.exed1439210.exec3197320.execmd.execacls.execacls.execacls.exev8338597.exev0822912.exeb4283338.execmd.exef7d3686efacf69adda24ec0f03a74c0df316559f424aa266525fdb48948c990a.exev4994155.execmd.exeschtasks.execacls.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdates.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1439210.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3197320.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v8338597.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v0822912.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4283338.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7d3686efacf69adda24ec0f03a74c0df316559f424aa266525fdb48948c990a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v4994155.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
c3197320.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c3197320.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c3197320.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c3197320.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
a9514684.exepid Process 512 a9514684.exe 512 a9514684.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a9514684.exedescription pid Process Token: SeDebugPrivilege 512 a9514684.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
b4283338.exepid Process 116 b4283338.exe -
Suspicious use of WriteProcessMemory 47 IoCs
Processes:
f7d3686efacf69adda24ec0f03a74c0df316559f424aa266525fdb48948c990a.exev8338597.exev4994155.exev0822912.exeb4283338.exepdates.execmd.exedescription pid Process procid_target PID 372 wrote to memory of 4716 372 f7d3686efacf69adda24ec0f03a74c0df316559f424aa266525fdb48948c990a.exe 83 PID 372 wrote to memory of 4716 372 f7d3686efacf69adda24ec0f03a74c0df316559f424aa266525fdb48948c990a.exe 83 PID 372 wrote to memory of 4716 372 f7d3686efacf69adda24ec0f03a74c0df316559f424aa266525fdb48948c990a.exe 83 PID 4716 wrote to memory of 5108 4716 v8338597.exe 85 PID 4716 wrote to memory of 5108 4716 v8338597.exe 85 PID 4716 wrote to memory of 5108 4716 v8338597.exe 85 PID 5108 wrote to memory of 2224 5108 v4994155.exe 86 PID 5108 wrote to memory of 2224 5108 v4994155.exe 86 PID 5108 wrote to memory of 2224 5108 v4994155.exe 86 PID 2224 wrote to memory of 512 2224 v0822912.exe 87 PID 2224 wrote to memory of 512 2224 v0822912.exe 87 PID 2224 wrote to memory of 116 2224 v0822912.exe 94 PID 2224 wrote to memory of 116 2224 v0822912.exe 94 PID 2224 wrote to memory of 116 2224 v0822912.exe 94 PID 116 wrote to memory of 1912 116 b4283338.exe 95 PID 116 wrote to memory of 1912 116 b4283338.exe 95 PID 116 wrote to memory of 1912 116 b4283338.exe 95 PID 5108 wrote to memory of 4892 5108 v4994155.exe 96 PID 5108 wrote to memory of 4892 5108 v4994155.exe 96 PID 5108 wrote to memory of 4892 5108 v4994155.exe 96 PID 1912 wrote to memory of 536 1912 pdates.exe 97 PID 1912 wrote to memory of 536 1912 pdates.exe 97 PID 1912 wrote to memory of 536 1912 pdates.exe 97 PID 1912 wrote to memory of 1624 1912 pdates.exe 99 PID 1912 wrote to memory of 1624 1912 pdates.exe 99 PID 1912 wrote to memory of 1624 1912 pdates.exe 99 PID 1624 wrote to memory of 1484 1624 cmd.exe 101 PID 1624 wrote to memory of 1484 1624 cmd.exe 101 PID 1624 wrote to memory of 1484 1624 cmd.exe 101 PID 1624 wrote to memory of 2976 1624 cmd.exe 102 PID 1624 wrote to memory of 2976 1624 cmd.exe 102 PID 1624 wrote to memory of 2976 1624 cmd.exe 102 PID 1624 wrote to memory of 1016 1624 cmd.exe 103 PID 1624 wrote to memory of 1016 1624 cmd.exe 103 PID 1624 wrote to memory of 1016 1624 cmd.exe 103 PID 1624 wrote to memory of 2180 1624 cmd.exe 104 PID 1624 wrote to memory of 2180 1624 cmd.exe 104 PID 1624 wrote to memory of 2180 1624 cmd.exe 104 PID 1624 wrote to memory of 3148 1624 cmd.exe 105 PID 1624 wrote to memory of 3148 1624 cmd.exe 105 PID 1624 wrote to memory of 3148 1624 cmd.exe 105 PID 1624 wrote to memory of 1444 1624 cmd.exe 106 PID 1624 wrote to memory of 1444 1624 cmd.exe 106 PID 1624 wrote to memory of 1444 1624 cmd.exe 106 PID 4716 wrote to memory of 440 4716 v8338597.exe 117 PID 4716 wrote to memory of 440 4716 v8338597.exe 117 PID 4716 wrote to memory of 440 4716 v8338597.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7d3686efacf69adda24ec0f03a74c0df316559f424aa266525fdb48948c990a.exe"C:\Users\Admin\AppData\Local\Temp\f7d3686efacf69adda24ec0f03a74c0df316559f424aa266525fdb48948c990a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8338597.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8338597.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4994155.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4994155.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0822912.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0822912.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a9514684.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a9514684.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:512
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4283338.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4283338.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:536
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵
- System Location Discovery: System Language Discovery
PID:1484
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:N"8⤵
- System Location Discovery: System Language Discovery
PID:2976
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:R" /E8⤵
- System Location Discovery: System Language Discovery
PID:1016
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵
- System Location Discovery: System Language Discovery
PID:2180
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:N"8⤵
- System Location Discovery: System Language Discovery
PID:3148
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:R" /E8⤵
- System Location Discovery: System Language Discovery
PID:1444
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c3197320.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c3197320.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:4892
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d1439210.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d1439210.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:440
-
-
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:2364
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:1916
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
514KB
MD5c298a4967328047f132dd5e3a2e073ce
SHA1cfdb13aee350f608248170cc8437768f3d956f88
SHA2564871f3398e86e331902320982400a476179fe8e2bb4ab986a9452c7fcfb990c3
SHA512b8115abc6fbc0cb6ad16bec1fefbe116555293c0285ef054216a98a7cb5f547062083228ae4cc7b70c8c8516aa30cbd4baf801a96a8d20c51a19570086084dec
-
Filesize
172KB
MD5b5aa329eeb7c6e2707f57896c8245c23
SHA174f5941c22f83fa70e3e215e7e7528bda36eb00b
SHA25652ab6bf1b7d5c124054023e8dd38dbed4fdc783216c883cf0fd926ae48cd2e68
SHA51269bfa3bbde6a1b4390319488d2f2be260334b61c8db6e922e01e61721a92df25f58afc7ece85245984079078b81ca19ca8214336f6fd30e018efc57d72ca29f1
-
Filesize
359KB
MD56d4954975883400b63ad6c813e54f43f
SHA130c0e529ef758a7f00585c64df30b87c1c236bec
SHA25684ccd4a2a7e410f6dddae2cf37dbd04a714691b8f9270d93a2caab2b35e066f0
SHA51263cc9acbc9113c730c052305e50f4427936d1669f300c85ea516c12590b68cd6972826ab8ef3731b0754c388ff92d401b303a64d9c3fbe317818ec1f5dffa0f9
-
Filesize
36KB
MD57d4b9779a72be43f1b7c22dfadebcd50
SHA17626ef5d43e1add68ee11370492d4e39718fd62c
SHA25682df02161c5cfc32c40513d6ffa8aa6dad877ab362628e09840388adfdbc4730
SHA512abd277cd4134fb2a401f0e77939fd198143427746221220864d68d9a51db91a3ce4b81a0d8d77a0eb4792905b4e4ddf872ac5858494e28011333ae8506455efb
-
Filesize
234KB
MD5d2d46495643f816114e97bf343588156
SHA1404726fe59bf0fbc98e76d66ca9123f4b6e518e8
SHA25636150971a9266744cf9a05fda39776103a12488f62e1823be0fcbda4e182d040
SHA5129b1d86dc225193ca8e1314849a619a17dad1ee950954b5a9c373c0bf880cf77a06989f6af8e0d479078b172240eae987374c5b6f1946286d1bf6549b7f2cde25
-
Filesize
11KB
MD5299231cb5aa7387acba039725b52f6af
SHA14d66492072929aa56df495a928f98ce8225e0901
SHA256300f44a09d74ac717bf5a12e59262a048638dabdf99c86c1c9908bdfa6e4c60b
SHA51271957e882d6f5459c24435341bd5e0247572419bb2c654d0e8fa08a0dfffa4706fd20089c1930ba6d5bf9b903679db443fb40ffc01a2562636d441fb6a3dff84
-
Filesize
226KB
MD54543c0c572986613fa9f66e61ca45624
SHA1a31a4cb7ddef9b4193b2fe5501def79876429acf
SHA256a632f26b5022a4b153d04eed5549e161a852a7eaac3e9f6eaec4b3841eacf24a
SHA5128d6860e21de782546f708d25b3ba7561cb068bd3aca575d932846ff9a8c66e6f79511c1c60a06f0b1aa38a9f1c03956b6e084611b4f8f60f78db34512e79e02b