Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2025 17:36
Static task
static1
Behavioral task
behavioral1
Sample
tvMvqaTxQ3VVhww4U2r5p1b5.exe
Resource
win10v2004-20241007-en
General
-
Target
tvMvqaTxQ3VVhww4U2r5p1b5.exe
-
Size
514KB
-
MD5
61c9381b6c813cbb6cefa076bed31d8a
-
SHA1
341dd0c0375dff8d5d255b419218bc8969edc4f3
-
SHA256
004d58bf34da683aacf652abc4bf89317d4f0333b0aa0f134b257c4cc95fbcfa
-
SHA512
d1366ebdc9253e7fcc2fceba3c3ed5eceb9e223c0089b2cea2ff00a000f1e1dd750a6758d3addad6ed698b935de2aa8073631cb6019dbbe0599349a051240673
-
SSDEEP
12288:oMrry90IsqzgHkl/vq+19VsBUUiNyiTQ+E7ovoRHpA:Tynscli+rWSNPTQ+EUMHpA
Malware Config
Extracted
amadey
3.86
88c8bb
http://77.91.68.61
-
install_dir
925e7e99c5
-
install_file
pdates.exe
-
strings_key
ada76b8b0e1f6892ee93c20ab8946117
-
url_paths
/rock/index.php
Extracted
redline
krast
77.91.68.68:19071
-
auth_value
9059ea331e4599de3746df73ccb24514
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023cb6-19.dat healer behavioral1/memory/4120-22-0x0000000000470000-0x000000000047A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" a4326138.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4326138.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a4326138.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4326138.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4326138.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4326138.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4326138.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a4326138.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" a4326138.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications a4326138.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023cb0-43.dat family_redline behavioral1/memory/4232-45-0x0000000000D10000-0x0000000000D40000-memory.dmp family_redline -
Redline family
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation b2142649.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation pdates.exe -
Executes dropped EXE 9 IoCs
pid Process 4900 v6240371.exe 2024 v7144898.exe 4120 a4326138.exe 4020 b2142649.exe 3676 pdates.exe 808 c3938692.exe 4232 d3273119.exe 1416 pdates.exe 1432 pdates.exe -
Windows security modification 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a4326138.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" tvMvqaTxQ3VVhww4U2r5p1b5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v6240371.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v7144898.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6240371.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3273119.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tvMvqaTxQ3VVhww4U2r5p1b5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v7144898.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2142649.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdates.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3938692.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c3938692.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c3938692.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c3938692.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1228 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4120 a4326138.exe 4120 a4326138.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4120 a4326138.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4020 b2142649.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 3288 wrote to memory of 4900 3288 tvMvqaTxQ3VVhww4U2r5p1b5.exe 82 PID 3288 wrote to memory of 4900 3288 tvMvqaTxQ3VVhww4U2r5p1b5.exe 82 PID 3288 wrote to memory of 4900 3288 tvMvqaTxQ3VVhww4U2r5p1b5.exe 82 PID 4900 wrote to memory of 2024 4900 v6240371.exe 83 PID 4900 wrote to memory of 2024 4900 v6240371.exe 83 PID 4900 wrote to memory of 2024 4900 v6240371.exe 83 PID 2024 wrote to memory of 4120 2024 v7144898.exe 84 PID 2024 wrote to memory of 4120 2024 v7144898.exe 84 PID 2024 wrote to memory of 4020 2024 v7144898.exe 87 PID 2024 wrote to memory of 4020 2024 v7144898.exe 87 PID 2024 wrote to memory of 4020 2024 v7144898.exe 87 PID 4020 wrote to memory of 3676 4020 b2142649.exe 88 PID 4020 wrote to memory of 3676 4020 b2142649.exe 88 PID 4020 wrote to memory of 3676 4020 b2142649.exe 88 PID 4900 wrote to memory of 808 4900 v6240371.exe 89 PID 4900 wrote to memory of 808 4900 v6240371.exe 89 PID 4900 wrote to memory of 808 4900 v6240371.exe 89 PID 3676 wrote to memory of 1228 3676 pdates.exe 90 PID 3676 wrote to memory of 1228 3676 pdates.exe 90 PID 3676 wrote to memory of 1228 3676 pdates.exe 90 PID 3676 wrote to memory of 2608 3676 pdates.exe 92 PID 3676 wrote to memory of 2608 3676 pdates.exe 92 PID 3676 wrote to memory of 2608 3676 pdates.exe 92 PID 2608 wrote to memory of 1828 2608 cmd.exe 94 PID 2608 wrote to memory of 1828 2608 cmd.exe 94 PID 2608 wrote to memory of 1828 2608 cmd.exe 94 PID 2608 wrote to memory of 3744 2608 cmd.exe 95 PID 2608 wrote to memory of 3744 2608 cmd.exe 95 PID 2608 wrote to memory of 3744 2608 cmd.exe 95 PID 2608 wrote to memory of 1960 2608 cmd.exe 96 PID 2608 wrote to memory of 1960 2608 cmd.exe 96 PID 2608 wrote to memory of 1960 2608 cmd.exe 96 PID 2608 wrote to memory of 1320 2608 cmd.exe 97 PID 2608 wrote to memory of 1320 2608 cmd.exe 97 PID 2608 wrote to memory of 1320 2608 cmd.exe 97 PID 2608 wrote to memory of 3296 2608 cmd.exe 98 PID 2608 wrote to memory of 3296 2608 cmd.exe 98 PID 2608 wrote to memory of 3296 2608 cmd.exe 98 PID 2608 wrote to memory of 2144 2608 cmd.exe 99 PID 2608 wrote to memory of 2144 2608 cmd.exe 99 PID 2608 wrote to memory of 2144 2608 cmd.exe 99 PID 3288 wrote to memory of 4232 3288 tvMvqaTxQ3VVhww4U2r5p1b5.exe 101 PID 3288 wrote to memory of 4232 3288 tvMvqaTxQ3VVhww4U2r5p1b5.exe 101 PID 3288 wrote to memory of 4232 3288 tvMvqaTxQ3VVhww4U2r5p1b5.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\tvMvqaTxQ3VVhww4U2r5p1b5.exe"C:\Users\Admin\AppData\Local\Temp\tvMvqaTxQ3VVhww4U2r5p1b5.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6240371.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6240371.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7144898.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7144898.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4326138.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4326138.exe4⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4120
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2142649.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2142649.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1228
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵
- System Location Discovery: System Language Discovery
PID:1828
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:N"7⤵
- System Location Discovery: System Language Discovery
PID:3744
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:R" /E7⤵
- System Location Discovery: System Language Discovery
PID:1960
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵
- System Location Discovery: System Language Discovery
PID:1320
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:N"7⤵
- System Location Discovery: System Language Discovery
PID:3296
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:R" /E7⤵
- System Location Discovery: System Language Discovery
PID:2144
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3938692.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3938692.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:808
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3273119.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3273119.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4232
-
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:1416
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:1432
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173KB
MD555984930bdb53dfd857a1f5f341b6416
SHA184705ca441a0d675586eb209b928306532389669
SHA256392b75a020b74ef9642495817e3ceb3eb2efdf1c92f5da72bb6f3e592f8afcb3
SHA5123a14415e362d0309f4d2d00dea0ddb2b9ea45b7007bc266304d5b08916bb8294345534afaa99b6a48606b9b1bd838ca4e4d1a59c97fa88ea26a5381e207c1cff
-
Filesize
359KB
MD5fdb89ee30e5f00c8a2dc170e819a4ddf
SHA17ddfd3aabd1dcd7624846f883978f78e460466dc
SHA2563456b77611c137ccede6291ae88dca2b535ae5593c8842db3cee8c9742f3660b
SHA51213ac85d2103ca8bb5c95565a1ec6fa7781fc88370e0a718b89bc1171fd3d97e381d5a901eac258a8a362215f0a8fc0227d32bb50e1d1d58586c7d59faa3808c8
-
Filesize
35KB
MD56bf266050d554a65c61d85cf98558032
SHA134a234bb3bd5a75fc708a95f1c1c5a61ea4687a7
SHA25661a2330ee11441fcf0e633aab6b0a0979f8cd3d62bfa894069478d5cc6b30798
SHA512047862d2c904a20c0d88f1697dcc466349493b5e25e9884729c387c6df4ae8ee45c0a9479a0a7cf4abbb034b64acc524847ba30dbd81453ad70281475d1b1857
-
Filesize
234KB
MD556584930533091ccb7453a21ef2ac0ad
SHA1dcaa8c6b270bd9685642ebb7ad1ec9747e259446
SHA2560e0372526bfe3a43d8dc3cb8af10f60914ccacd20597189b54f7c38e317e0bdb
SHA512fe89c28131efdf309c518340d59890f8568a28c7c7b3deec30c5972917e38a7b65ee678e0bc933e002d7496906b35e75206f5e497174bcb2ee475c0057e04bc8
-
Filesize
11KB
MD552be802c6b06a586dc2e8a4fccc6d075
SHA176904ad8f17c83d0cc1233407540b6b331ba0284
SHA2560fcb74c81aba859b155329895f2e8485ead4404ac9ccc8e182da55d8702abe02
SHA512152413ee88e7f0cce9b7f1b163bfd9ceb78b3c14041a3cea1a5fac9e9408f17cc3b9f1e49b6b817b24b91faa3626ee4a03fd35ee8bbef55d79599fc191098959
-
Filesize
224KB
MD595c08c6bdade25e84a4536396760af3a
SHA12135bdd1c6de0e38e5c5814f8aed95d26e7534a3
SHA25697756a3aba636c16c10852a994291250619678bc677fadbe358487d95309ecaa
SHA512bef843c0b30a149ba1fb702cd680fb3a4839429b44343124363324153ffa011ea27e512703e16456f3291932911a4d5dab58b76d0446cc502b6666caafe80ca7