Analysis
-
max time kernel
110s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 13:23
Static task
static1
General
-
Target
f158a32eca081b0a3668ac6f18ea8a5aa68fd424530fe5c370c971a82f822191N.exe
-
Size
999KB
-
MD5
6e3bca978c0386e4347d76fe9137ef00
-
SHA1
dc313d7955e71fa3ee00b59c6e6990e7845608b7
-
SHA256
f158a32eca081b0a3668ac6f18ea8a5aa68fd424530fe5c370c971a82f822191
-
SHA512
6699e506fbd97b533563854111bca723993ed2091fa1a92d9bccba5299c3b8c6c15536676eba721c285f69f4f2fc92f34604ae0c29354076c3c0815c9e8ee6c4
-
SSDEEP
24576:JyTcfGseu430vKB7d1beDvbaMHSsMHxe:8To1eu4kM7rbeyMysE
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
amadey
3.70
47f88f
http://193.201.9.43
-
install_dir
595f021478
-
install_file
oneetx.exe
-
strings_key
4971eddfd380996ae21bea987102e417
-
url_paths
/plays/chapter/index.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x0008000000023c9e-19.dat healer behavioral1/memory/1256-22-0x0000000000C40000-0x0000000000C4A000-memory.dmp healer behavioral1/memory/3152-28-0x00000000022A0000-0x00000000022BA000-memory.dmp healer behavioral1/memory/3152-30-0x0000000002560000-0x0000000002578000-memory.dmp healer behavioral1/memory/3152-31-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/3152-40-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/3152-58-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/3152-56-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/3152-54-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/3152-52-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/3152-50-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/3152-48-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/3152-46-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/3152-44-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/3152-42-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/3152-38-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/3152-36-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/3152-34-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/3152-32-0x0000000002560000-0x0000000002572000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection az679507.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" az679507.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" az679507.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" az679507.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bu822614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bu822614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" az679507.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" az679507.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection bu822614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bu822614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bu822614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bu822614.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/memory/1776-2210-0x0000000005400000-0x0000000005432000-memory.dmp family_redline behavioral1/files/0x0011000000023b52-2215.dat family_redline behavioral1/memory/1684-2223-0x0000000000ED0000-0x0000000000EFE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation co568609.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation dSB06t84.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 1908 ki894455.exe 4484 ki402657.exe 1256 az679507.exe 3152 bu822614.exe 1776 co568609.exe 1684 1.exe 2556 dSB06t84.exe 4728 oneetx.exe 5256 oneetx.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" az679507.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features bu822614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" bu822614.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f158a32eca081b0a3668ac6f18ea8a5aa68fd424530fe5c370c971a82f822191N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ki894455.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ki402657.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 432 3152 WerFault.exe 93 5616 1776 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f158a32eca081b0a3668ac6f18ea8a5aa68fd424530fe5c370c971a82f822191N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language co568609.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dSB06t84.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ki894455.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ki402657.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bu822614.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2916 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1256 az679507.exe 1256 az679507.exe 3152 bu822614.exe 3152 bu822614.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1256 az679507.exe Token: SeDebugPrivilege 3152 bu822614.exe Token: SeDebugPrivilege 1776 co568609.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2556 dSB06t84.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1588 wrote to memory of 1908 1588 f158a32eca081b0a3668ac6f18ea8a5aa68fd424530fe5c370c971a82f822191N.exe 83 PID 1588 wrote to memory of 1908 1588 f158a32eca081b0a3668ac6f18ea8a5aa68fd424530fe5c370c971a82f822191N.exe 83 PID 1588 wrote to memory of 1908 1588 f158a32eca081b0a3668ac6f18ea8a5aa68fd424530fe5c370c971a82f822191N.exe 83 PID 1908 wrote to memory of 4484 1908 ki894455.exe 85 PID 1908 wrote to memory of 4484 1908 ki894455.exe 85 PID 1908 wrote to memory of 4484 1908 ki894455.exe 85 PID 4484 wrote to memory of 1256 4484 ki402657.exe 87 PID 4484 wrote to memory of 1256 4484 ki402657.exe 87 PID 4484 wrote to memory of 3152 4484 ki402657.exe 93 PID 4484 wrote to memory of 3152 4484 ki402657.exe 93 PID 4484 wrote to memory of 3152 4484 ki402657.exe 93 PID 1908 wrote to memory of 1776 1908 ki894455.exe 97 PID 1908 wrote to memory of 1776 1908 ki894455.exe 97 PID 1908 wrote to memory of 1776 1908 ki894455.exe 97 PID 1776 wrote to memory of 1684 1776 co568609.exe 98 PID 1776 wrote to memory of 1684 1776 co568609.exe 98 PID 1776 wrote to memory of 1684 1776 co568609.exe 98 PID 1588 wrote to memory of 2556 1588 f158a32eca081b0a3668ac6f18ea8a5aa68fd424530fe5c370c971a82f822191N.exe 103 PID 1588 wrote to memory of 2556 1588 f158a32eca081b0a3668ac6f18ea8a5aa68fd424530fe5c370c971a82f822191N.exe 103 PID 1588 wrote to memory of 2556 1588 f158a32eca081b0a3668ac6f18ea8a5aa68fd424530fe5c370c971a82f822191N.exe 103 PID 2556 wrote to memory of 4728 2556 dSB06t84.exe 104 PID 2556 wrote to memory of 4728 2556 dSB06t84.exe 104 PID 2556 wrote to memory of 4728 2556 dSB06t84.exe 104 PID 4728 wrote to memory of 2916 4728 oneetx.exe 105 PID 4728 wrote to memory of 2916 4728 oneetx.exe 105 PID 4728 wrote to memory of 2916 4728 oneetx.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\f158a32eca081b0a3668ac6f18ea8a5aa68fd424530fe5c370c971a82f822191N.exe"C:\Users\Admin\AppData\Local\Temp\f158a32eca081b0a3668ac6f18ea8a5aa68fd424530fe5c370c971a82f822191N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki894455.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki894455.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki402657.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki402657.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\az679507.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\az679507.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1256
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bu822614.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bu822614.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 10845⤵
- Program crash
PID:432
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\co568609.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\co568609.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 13844⤵
- Program crash
PID:5616
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dSB06t84.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dSB06t84.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2916
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3152 -ip 31521⤵PID:3616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1776 -ip 17761⤵PID:5356
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:5256
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD5ee1f5f0e1168ce5938997c932b4dcd27
SHA1b8c0928da3a41d579c19f44b9e1fef6014d06452
SHA256dea01b17d6e06c3bdf6f5387faa77a788ce9726a3110db90294b2e207b3d51ed
SHA512bacc2d22b71bc5bc73c0699aaf4e2271effa4fe47c3ac63f3ee3ae3385d963eb6f93db082a9530d75d5c6f13884f30b0375d41badfe540f31ef747003a36c0a8
-
Filesize
816KB
MD5d67dca662be4a3727422e04dea52202a
SHA1410422ba46c5d7767043076b9f1b3156c2589866
SHA256ea4bf31c13d65c71128478cd3ff4c6563e05978ac3dfb9cde76d6b854a9a9d41
SHA512948c1aa681153749454da3361e821cd7425539b916ea366f24965925572e61bdc504257a7a7de56adc1eba3117c282ccb4677359e0a194a7e1f56292f2fa39e2
-
Filesize
501KB
MD585f025ed396c04753061cf06d5b9fb83
SHA169591f64cb4961ddddebcd17832fdd672a1ef24b
SHA256f9d5142f56be45e2668804a9fc248f0c6a620563bc567933ea4f9a30dc72d2df
SHA512b1a725bfe750d76caa7e88d2a1efb3c97bdf4d0ad064ff103aaf78e293656d365845c248f9a8d00455d8fab5a0e8d9e8d39dbacaeb3bb3d2d97d9e51b8b832a0
-
Filesize
342KB
MD5d2ca04fa94a0b6ce715dbdd01e49ca71
SHA180fa61e24fd3cd586f5bc65851e500f55712ca62
SHA2561dd3f8ccdbafec4d280d9244eaafca7b71e7e7be1ebb810f85885621b0af0b17
SHA5129754848becf4874f8a039023adfe6c73c4556573dcccb56b3725327aec4dfd438f5aa91879aa091cd5bf365e715520dd625b82da7d4b8c0562bce23c4cc4cdeb
-
Filesize
11KB
MD51bb791a755ed493a8d2577660250dc15
SHA16c78bc8e99b532a15547ddbaa23294e0dd35698e
SHA25670163b0b334cbf66be8967e077bfa11ecc743bd3ad1a0f52995c93606979ce58
SHA512e538f51727938feeee6e28d99a9952195f26b2d03095364d7a171eb157ddfc74eaff411a84e3ad010214572ffea0320673f5992c92a8e939f2620a2fa7d35047
-
Filesize
317KB
MD55ff1647d9d3369b0be2f02bac2be0f5c
SHA1b5d2f379d830e63834f4e3ef53af072b2207e001
SHA2566964a5f8cc360d9c2eee95ec33b7a5363e3d3aa7e5fbcede42a91e9a291703e8
SHA5124bdcca691e8a6aa532f2ee193d70c2dbd29c2e4e27c0c7bad4f8be6a8d9bb991ea05104042fc609384ae2a3cf153cf6d8384bf379105357ae1b828a414e2be01
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1