Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 04:10
Static task
static1
Behavioral task
behavioral1
Sample
f47ea16112acd56a8383eacd09d17308625940c1cd4565ca66c3dbcfbebb6cf5.exe
Resource
win10v2004-20241007-en
General
-
Target
f47ea16112acd56a8383eacd09d17308625940c1cd4565ca66c3dbcfbebb6cf5.exe
-
Size
642KB
-
MD5
42189c6cc7b27fbfb5b1b42a1c8deb68
-
SHA1
b56e22ba7a72d03fd2833c8afe7f1d029bd8baf9
-
SHA256
f47ea16112acd56a8383eacd09d17308625940c1cd4565ca66c3dbcfbebb6cf5
-
SHA512
384ec5068b50e6936fea20762cd75fb1b26582bf2d19d4f4635501669ad95ea55a7f254244136f6ec0f47ffb007f821a7a6232d60ad826e33d137cb933e07967
-
SSDEEP
12288:tMrty90CSAEyDvvVrZTQ93PIdF29a5x4xIPSjc6HreXf7ypG3VQEI8TioQ:oyj3T+/IT2ccKXjQEXioQ
Malware Config
Extracted
amadey
3.86
88c8bb
http://77.91.68.61
-
install_dir
925e7e99c5
-
install_file
pdates.exe
-
strings_key
ada76b8b0e1f6892ee93c20ab8946117
-
url_paths
/rock/index.php
Extracted
redline
lodka
77.91.124.156:19071
-
auth_value
76f99d6cc9332c02bb9728c3ba80d3a9
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule behavioral1/files/0x000b000000023b91-26.dat healer behavioral1/memory/2132-28-0x0000000000700000-0x000000000070A000-memory.dmp healer -
Healer family
-
Processes:
a7075929.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a7075929.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a7075929.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a7075929.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a7075929.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a7075929.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a7075929.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/files/0x000a000000023b8c-49.dat family_redline behavioral1/memory/4352-51-0x0000000000100000-0x0000000000130000-memory.dmp family_redline -
Redline family
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
b2356315.exepdates.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation b2356315.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation pdates.exe -
Executes dropped EXE 10 IoCs
Processes:
v4878810.exev6007114.exev3331876.exea7075929.exeb2356315.exepdates.exec5902691.exed7131787.exepdates.exepdates.exepid Process 3972 v4878810.exe 3608 v6007114.exe 1124 v3331876.exe 2132 a7075929.exe 1824 b2356315.exe 432 pdates.exe 3056 c5902691.exe 4352 d7131787.exe 768 pdates.exe 4564 pdates.exe -
Processes:
a7075929.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a7075929.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
f47ea16112acd56a8383eacd09d17308625940c1cd4565ca66c3dbcfbebb6cf5.exev4878810.exev6007114.exev3331876.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f47ea16112acd56a8383eacd09d17308625940c1cd4565ca66c3dbcfbebb6cf5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v4878810.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v6007114.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v3331876.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.execacls.exef47ea16112acd56a8383eacd09d17308625940c1cd4565ca66c3dbcfbebb6cf5.exev6007114.exeb2356315.exepdates.execacls.execacls.execmd.execacls.exev3331876.exec5902691.exed7131787.execmd.exev4878810.exeschtasks.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f47ea16112acd56a8383eacd09d17308625940c1cd4565ca66c3dbcfbebb6cf5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6007114.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2356315.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdates.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v3331876.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c5902691.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7131787.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v4878810.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
c5902691.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c5902691.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c5902691.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c5902691.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
a7075929.exepid Process 2132 a7075929.exe 2132 a7075929.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a7075929.exedescription pid Process Token: SeDebugPrivilege 2132 a7075929.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
b2356315.exepid Process 1824 b2356315.exe -
Suspicious use of WriteProcessMemory 47 IoCs
Processes:
f47ea16112acd56a8383eacd09d17308625940c1cd4565ca66c3dbcfbebb6cf5.exev4878810.exev6007114.exev3331876.exeb2356315.exepdates.execmd.exedescription pid Process procid_target PID 2088 wrote to memory of 3972 2088 f47ea16112acd56a8383eacd09d17308625940c1cd4565ca66c3dbcfbebb6cf5.exe 84 PID 2088 wrote to memory of 3972 2088 f47ea16112acd56a8383eacd09d17308625940c1cd4565ca66c3dbcfbebb6cf5.exe 84 PID 2088 wrote to memory of 3972 2088 f47ea16112acd56a8383eacd09d17308625940c1cd4565ca66c3dbcfbebb6cf5.exe 84 PID 3972 wrote to memory of 3608 3972 v4878810.exe 86 PID 3972 wrote to memory of 3608 3972 v4878810.exe 86 PID 3972 wrote to memory of 3608 3972 v4878810.exe 86 PID 3608 wrote to memory of 1124 3608 v6007114.exe 87 PID 3608 wrote to memory of 1124 3608 v6007114.exe 87 PID 3608 wrote to memory of 1124 3608 v6007114.exe 87 PID 1124 wrote to memory of 2132 1124 v3331876.exe 88 PID 1124 wrote to memory of 2132 1124 v3331876.exe 88 PID 1124 wrote to memory of 1824 1124 v3331876.exe 95 PID 1124 wrote to memory of 1824 1124 v3331876.exe 95 PID 1124 wrote to memory of 1824 1124 v3331876.exe 95 PID 1824 wrote to memory of 432 1824 b2356315.exe 96 PID 1824 wrote to memory of 432 1824 b2356315.exe 96 PID 1824 wrote to memory of 432 1824 b2356315.exe 96 PID 3608 wrote to memory of 3056 3608 v6007114.exe 97 PID 3608 wrote to memory of 3056 3608 v6007114.exe 97 PID 3608 wrote to memory of 3056 3608 v6007114.exe 97 PID 3972 wrote to memory of 4352 3972 v4878810.exe 98 PID 3972 wrote to memory of 4352 3972 v4878810.exe 98 PID 3972 wrote to memory of 4352 3972 v4878810.exe 98 PID 432 wrote to memory of 2020 432 pdates.exe 99 PID 432 wrote to memory of 2020 432 pdates.exe 99 PID 432 wrote to memory of 2020 432 pdates.exe 99 PID 432 wrote to memory of 1244 432 pdates.exe 101 PID 432 wrote to memory of 1244 432 pdates.exe 101 PID 432 wrote to memory of 1244 432 pdates.exe 101 PID 1244 wrote to memory of 3348 1244 cmd.exe 103 PID 1244 wrote to memory of 3348 1244 cmd.exe 103 PID 1244 wrote to memory of 3348 1244 cmd.exe 103 PID 1244 wrote to memory of 2876 1244 cmd.exe 104 PID 1244 wrote to memory of 2876 1244 cmd.exe 104 PID 1244 wrote to memory of 2876 1244 cmd.exe 104 PID 1244 wrote to memory of 4324 1244 cmd.exe 105 PID 1244 wrote to memory of 4324 1244 cmd.exe 105 PID 1244 wrote to memory of 4324 1244 cmd.exe 105 PID 1244 wrote to memory of 4540 1244 cmd.exe 106 PID 1244 wrote to memory of 4540 1244 cmd.exe 106 PID 1244 wrote to memory of 4540 1244 cmd.exe 106 PID 1244 wrote to memory of 4032 1244 cmd.exe 107 PID 1244 wrote to memory of 4032 1244 cmd.exe 107 PID 1244 wrote to memory of 4032 1244 cmd.exe 107 PID 1244 wrote to memory of 4868 1244 cmd.exe 108 PID 1244 wrote to memory of 4868 1244 cmd.exe 108 PID 1244 wrote to memory of 4868 1244 cmd.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\f47ea16112acd56a8383eacd09d17308625940c1cd4565ca66c3dbcfbebb6cf5.exe"C:\Users\Admin\AppData\Local\Temp\f47ea16112acd56a8383eacd09d17308625940c1cd4565ca66c3dbcfbebb6cf5.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4878810.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4878810.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6007114.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6007114.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3331876.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3331876.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7075929.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7075929.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2356315.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2356315.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2020
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵
- System Location Discovery: System Language Discovery
PID:3348
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:N"8⤵
- System Location Discovery: System Language Discovery
PID:2876
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:R" /E8⤵
- System Location Discovery: System Language Discovery
PID:4324
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵
- System Location Discovery: System Language Discovery
PID:4540
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:N"8⤵
- System Location Discovery: System Language Discovery
PID:4032
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:R" /E8⤵
- System Location Discovery: System Language Discovery
PID:4868
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c5902691.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c5902691.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:3056
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d7131787.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d7131787.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4352
-
-
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:768
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:4564
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
515KB
MD50d69ba0e84316e22bc1f8bc9c7d11b2f
SHA10cba59aa1481c455dae4939e95cd5d5798e6e38b
SHA2561a98cefd9ebb9b765e6e3c7d6307efe4eb3f2a332387726334c4ecf5fd632256
SHA5120d712806424d330022c51c4c5249c2af33c9a1f0ed652ecb20c5ecdb79f3648069cd505b4b5b0f073d5a81fa7805b9bd0025a1de6b41c19977a6ccd7adc7ed6c
-
Filesize
173KB
MD5dffbfcfcc9fd946d7a8a5238fc667adc
SHA11c3f457a03b6a64ba4736b62accd2e96c14a4e38
SHA256ad96cb7463da9ed88e6d9c675d017937f3a7a4f7c261a1abc68386f7aee93a44
SHA512db85b179728464302bab85c61f202691ea78d42302817362762f77d02969d45c01892cb5ed100c60803b24b8eb0c3b840aac2c7a723bbb692c1d8f066ff2d527
-
Filesize
359KB
MD5edd62d67de2e0142a2c907482e9d187d
SHA174e6425594bcb55be64f762848fe6b2b06a372c1
SHA25624d33d418b80b90cef29955d4ffcc077d313df8460e9463638bee927f20d5fe5
SHA51203659d323a95bdad46c0ee29e9681caa09b2f99bcb1817ff1e46f2e536591424dac916214466f74425cb01d9f82bb2a0dcb7437b4c28ecfa8f365208bc32877f
-
Filesize
38KB
MD5e4b9619368bb4ba38abc708929835f12
SHA133ead284ef4cc8d808063c7398cbbe6cf6e68794
SHA2569119c44aa9413a1065ab9ad1d5e060a6d2a531fef1c95f34409b1697bc9538f5
SHA512f1be2c6a79b8aabc639cc7a7e38d7bb2fb9054d2107d0ab7359174ca06e949968d7ff3e7ca381f7a530ff9c462f900b0e6384dbf42909863df830e026f21ac83
-
Filesize
234KB
MD560089e9da320704932f5a0f79d1d30c9
SHA17208fc6d7a2fe04f05b306e15311413199425ec8
SHA256ea33d2c358ce0e1d660ba63a1ea20f5d985a2572b1c365a8c52a33a4fd036988
SHA5122e54d9262ebd851f9ca505ae3b809432ca5d2339d6b6ca5359d55b0ffc82e52262e4add57e0b18c075dad57516c7d5fcd5a5c42d252db75b7fed30c112f24c75
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
229KB
MD5a7cd35c1d647588f0135d947a2d478be
SHA11815d2a3c5ccb29691ba1dd375992be033373fbc
SHA25605bba6b7bef8f98326321cb8368f78670a993d747aac98ee12a9cc78c18ccc2f
SHA5127cb10997f0849c892e40b7605b26acb742f00749c990154d8f97d66e9a92781e447187bb9d6ffc475eaecb7643c0d8cb52ed29fc5b8a8522e4ed488fccbf1b88