Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 03:39
Static task
static1
Behavioral task
behavioral1
Sample
bc5482265b7da565437936707bec0c5b01ceb42a7e6bc33cf329a084baa3289d.exe
Resource
win10v2004-20241007-en
General
-
Target
bc5482265b7da565437936707bec0c5b01ceb42a7e6bc33cf329a084baa3289d.exe
-
Size
642KB
-
MD5
21ed48667c9013f6fa20c34da6f870f6
-
SHA1
a351cbc865bbeb7101835be4502d57948e526b8e
-
SHA256
bc5482265b7da565437936707bec0c5b01ceb42a7e6bc33cf329a084baa3289d
-
SHA512
f82e864b3bb166933f44f756908ba351d88228a5399668f2229628f72a9ae117ad193abf2911b84bdd45387cbd73439f2c062eece87bf1dd470d08416a231918
-
SSDEEP
12288:gMrSy90vKaQrPYT0tYq8kJG7GK+wdc+cn6HwJnjoox04KJIj1ux2:iycKa4a0tYdtGhwdH92joO04iI5Y2
Malware Config
Extracted
amadey
3.86
88c8bb
http://77.91.68.61
-
install_dir
925e7e99c5
-
install_file
pdates.exe
-
strings_key
ada76b8b0e1f6892ee93c20ab8946117
-
url_paths
/rock/index.php
Extracted
redline
lodka
77.91.124.156:19071
-
auth_value
76f99d6cc9332c02bb9728c3ba80d3a9
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023ba3-26.dat healer behavioral1/memory/4280-28-0x0000000000CA0000-0x0000000000CAA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a9432420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a9432420.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a9432420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a9432420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a9432420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a9432420.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b9e-50.dat family_redline behavioral1/memory/1044-52-0x0000000000630000-0x0000000000660000-memory.dmp family_redline -
Redline family
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation b4175752.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation pdates.exe -
Executes dropped EXE 11 IoCs
pid Process 2944 v1605598.exe 2408 v8214628.exe 864 v8984562.exe 4280 a9432420.exe 4036 b4175752.exe 1472 pdates.exe 1656 c5718251.exe 4940 pdates.exe 1044 d1246627.exe 2420 pdates.exe 2772 pdates.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a9432420.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v8214628.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v8984562.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bc5482265b7da565437936707bec0c5b01ceb42a7e6bc33cf329a084baa3289d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1605598.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc5482265b7da565437936707bec0c5b01ceb42a7e6bc33cf329a084baa3289d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4175752.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c5718251.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1246627.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v1605598.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdates.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v8214628.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v8984562.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c5718251.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c5718251.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c5718251.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2888 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4280 a9432420.exe 4280 a9432420.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4280 a9432420.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4036 b4175752.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2944 2924 bc5482265b7da565437936707bec0c5b01ceb42a7e6bc33cf329a084baa3289d.exe 83 PID 2924 wrote to memory of 2944 2924 bc5482265b7da565437936707bec0c5b01ceb42a7e6bc33cf329a084baa3289d.exe 83 PID 2924 wrote to memory of 2944 2924 bc5482265b7da565437936707bec0c5b01ceb42a7e6bc33cf329a084baa3289d.exe 83 PID 2944 wrote to memory of 2408 2944 v1605598.exe 84 PID 2944 wrote to memory of 2408 2944 v1605598.exe 84 PID 2944 wrote to memory of 2408 2944 v1605598.exe 84 PID 2408 wrote to memory of 864 2408 v8214628.exe 85 PID 2408 wrote to memory of 864 2408 v8214628.exe 85 PID 2408 wrote to memory of 864 2408 v8214628.exe 85 PID 864 wrote to memory of 4280 864 v8984562.exe 87 PID 864 wrote to memory of 4280 864 v8984562.exe 87 PID 864 wrote to memory of 4036 864 v8984562.exe 97 PID 864 wrote to memory of 4036 864 v8984562.exe 97 PID 864 wrote to memory of 4036 864 v8984562.exe 97 PID 4036 wrote to memory of 1472 4036 b4175752.exe 98 PID 4036 wrote to memory of 1472 4036 b4175752.exe 98 PID 4036 wrote to memory of 1472 4036 b4175752.exe 98 PID 2408 wrote to memory of 1656 2408 v8214628.exe 99 PID 2408 wrote to memory of 1656 2408 v8214628.exe 99 PID 2408 wrote to memory of 1656 2408 v8214628.exe 99 PID 1472 wrote to memory of 2888 1472 pdates.exe 100 PID 1472 wrote to memory of 2888 1472 pdates.exe 100 PID 1472 wrote to memory of 2888 1472 pdates.exe 100 PID 1472 wrote to memory of 1536 1472 pdates.exe 102 PID 1472 wrote to memory of 1536 1472 pdates.exe 102 PID 1472 wrote to memory of 1536 1472 pdates.exe 102 PID 1536 wrote to memory of 676 1536 cmd.exe 104 PID 1536 wrote to memory of 676 1536 cmd.exe 104 PID 1536 wrote to memory of 676 1536 cmd.exe 104 PID 1536 wrote to memory of 3224 1536 cmd.exe 105 PID 1536 wrote to memory of 3224 1536 cmd.exe 105 PID 1536 wrote to memory of 3224 1536 cmd.exe 105 PID 1536 wrote to memory of 4960 1536 cmd.exe 106 PID 1536 wrote to memory of 4960 1536 cmd.exe 106 PID 1536 wrote to memory of 4960 1536 cmd.exe 106 PID 1536 wrote to memory of 3204 1536 cmd.exe 107 PID 1536 wrote to memory of 3204 1536 cmd.exe 107 PID 1536 wrote to memory of 3204 1536 cmd.exe 107 PID 1536 wrote to memory of 4956 1536 cmd.exe 108 PID 1536 wrote to memory of 4956 1536 cmd.exe 108 PID 1536 wrote to memory of 4956 1536 cmd.exe 108 PID 1536 wrote to memory of 4992 1536 cmd.exe 109 PID 1536 wrote to memory of 4992 1536 cmd.exe 109 PID 1536 wrote to memory of 4992 1536 cmd.exe 109 PID 2944 wrote to memory of 1044 2944 v1605598.exe 120 PID 2944 wrote to memory of 1044 2944 v1605598.exe 120 PID 2944 wrote to memory of 1044 2944 v1605598.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc5482265b7da565437936707bec0c5b01ceb42a7e6bc33cf329a084baa3289d.exe"C:\Users\Admin\AppData\Local\Temp\bc5482265b7da565437936707bec0c5b01ceb42a7e6bc33cf329a084baa3289d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1605598.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1605598.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8214628.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8214628.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8984562.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8984562.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a9432420.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a9432420.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4175752.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4175752.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2888
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵
- System Location Discovery: System Language Discovery
PID:676
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:N"8⤵
- System Location Discovery: System Language Discovery
PID:3224
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:R" /E8⤵
- System Location Discovery: System Language Discovery
PID:4960
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵
- System Location Discovery: System Language Discovery
PID:3204
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:N"8⤵
- System Location Discovery: System Language Discovery
PID:4956
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:R" /E8⤵
- System Location Discovery: System Language Discovery
PID:4992
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c5718251.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c5718251.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:1656
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d1246627.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d1246627.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1044
-
-
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:4940
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:2420
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:2772
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
514KB
MD56118d4ed0aca152b18d75551a2700088
SHA1cfafdd938d85f704a5cfdcf53579ca42b3b90e08
SHA2560803f8454f37527fce43fd1ccbd732e7916927e3b3354370aa59565c9de7f3df
SHA512a33902ff2b4068bb81ca77803f93f1c41f859ab1124f68dcb19c64eee498d274ca035d3adef5e3d3cef9766fd6518ebf0e3a42a24ed5212c86e9815010543677
-
Filesize
173KB
MD5c51868d7b01f8fa3619ab8692d328bca
SHA120b92b9f716ce3c4c9042078f782ff6dacb93dc5
SHA2567f15d33aea6280235671a7183b3eaf2f9c5420cf955be0ef2e4c937bacbb008b
SHA512e7c5bf39aa25e93de3473421aed99fd43b0445b30af81f3a26c13f531f9a6abe3d9644b3955ae51c79c165ce29f561d522f829a7be5c155d9d845706c029b732
-
Filesize
359KB
MD544fa92b3d07cbbbf5d56885b1351ba1e
SHA19c87df4542b67c4efbac0798d9316e3b89a5e35f
SHA2569179fca25da17095b9e708dc7f22fddae5306346f8493e723a8f0116cd5bb292
SHA5121345ad90b683a20966875cf50e37fdab50ea782e75b6e15f69e0f6a3a261f4df881148fafc862b4adf99d2303f8d3a355cda1f758891b64d0c627096a10efb34
-
Filesize
38KB
MD54d95642862342ed5610bf7bff42d1e35
SHA15817324f5771f30249aa708b8db1511acd374b79
SHA256fbc937e3fab6851ffc2ba531fe848a4954652c268993fd2de42d1c5e45c88a3d
SHA512bfafdd416bdc28bf94a0d443f6830f42cd1c6741587fdef058613a0cbf824bfd9c5b8b4cf48fdffdfb86bbb129014f67fd7cc55ebd5985f073025d13701817d2
-
Filesize
234KB
MD5b9dce1877df7378e8d63ac82fb291006
SHA134a662d66c9ba75f113147106db28d410fa079c4
SHA256d9c576d6682235c6d6dbc8558475d7d9a38230514e6f726e0d83007347098272
SHA512228377bc104a1df87bf21a576cdf3a423519a39d2f2f0d23f70fb19b21668709766b3919e795a149f976aed9b50b53b9a4450ded66541cc00d2a62d41466ebbb
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
229KB
MD55428483371b2915495c713c98d6b88a9
SHA174ed4f5d8d35646558273d3383da6c8195160273
SHA2563afaf44f301a052066cf9384cce47cffc0abb95bde74bac1e14db648513d9ca4
SHA512e1309217537c4a10f9f64b9bdfd4cfc538db4a4a14dd09a2beb8011ec5025d04fecdbeb1ab0f8adb0e9bf5626c4b64ecdced459e51992668ca8c295b3836e35c