Analysis
-
max time kernel
130s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 10:56
Static task
static1
Behavioral task
behavioral1
Sample
v6240371.exe
Resource
win10v2004-20241007-en
General
-
Target
v6240371.exe
-
Size
359KB
-
MD5
fdb89ee30e5f00c8a2dc170e819a4ddf
-
SHA1
7ddfd3aabd1dcd7624846f883978f78e460466dc
-
SHA256
3456b77611c137ccede6291ae88dca2b535ae5593c8842db3cee8c9742f3660b
-
SHA512
13ac85d2103ca8bb5c95565a1ec6fa7781fc88370e0a718b89bc1171fd3d97e381d5a901eac258a8a362215f0a8fc0227d32bb50e1d1d58586c7d59faa3808c8
-
SSDEEP
6144:KPy+bnr+6p0yN90QEBFGjRBpQR7FiVm4deHw7qyP5cBP6tmFV7oyGWmM:hMr6y90jF2VmFsUQeyP+QwV7oyBj
Malware Config
Extracted
amadey
3.86
88c8bb
http://77.91.68.61
-
install_dir
925e7e99c5
-
install_file
pdates.exe
-
strings_key
ada76b8b0e1f6892ee93c20ab8946117
-
url_paths
/rock/index.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0032000000023b77-12.dat healer behavioral1/memory/3584-15-0x0000000000F90000-0x0000000000F9A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" a4326138.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a4326138.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4326138.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4326138.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4326138.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4326138.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4326138.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a4326138.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications a4326138.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" a4326138.exe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation b2142649.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation pdates.exe -
Executes dropped EXE 7 IoCs
pid Process 2168 v7144898.exe 3584 a4326138.exe 4420 b2142649.exe 372 pdates.exe 3836 c3938692.exe 968 pdates.exe 4220 pdates.exe -
Windows security modification 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a4326138.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" v6240371.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7144898.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6240371.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v7144898.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2142649.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdates.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3938692.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c3938692.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c3938692.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c3938692.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4568 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3584 a4326138.exe 3584 a4326138.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3584 a4326138.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4420 b2142649.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 4744 wrote to memory of 2168 4744 v6240371.exe 85 PID 4744 wrote to memory of 2168 4744 v6240371.exe 85 PID 4744 wrote to memory of 2168 4744 v6240371.exe 85 PID 2168 wrote to memory of 3584 2168 v7144898.exe 86 PID 2168 wrote to memory of 3584 2168 v7144898.exe 86 PID 2168 wrote to memory of 4420 2168 v7144898.exe 87 PID 2168 wrote to memory of 4420 2168 v7144898.exe 87 PID 2168 wrote to memory of 4420 2168 v7144898.exe 87 PID 4420 wrote to memory of 372 4420 b2142649.exe 88 PID 4420 wrote to memory of 372 4420 b2142649.exe 88 PID 4420 wrote to memory of 372 4420 b2142649.exe 88 PID 4744 wrote to memory of 3836 4744 v6240371.exe 89 PID 4744 wrote to memory of 3836 4744 v6240371.exe 89 PID 4744 wrote to memory of 3836 4744 v6240371.exe 89 PID 372 wrote to memory of 4568 372 pdates.exe 90 PID 372 wrote to memory of 4568 372 pdates.exe 90 PID 372 wrote to memory of 4568 372 pdates.exe 90 PID 372 wrote to memory of 3960 372 pdates.exe 92 PID 372 wrote to memory of 3960 372 pdates.exe 92 PID 372 wrote to memory of 3960 372 pdates.exe 92 PID 3960 wrote to memory of 4600 3960 cmd.exe 94 PID 3960 wrote to memory of 4600 3960 cmd.exe 94 PID 3960 wrote to memory of 4600 3960 cmd.exe 94 PID 3960 wrote to memory of 3636 3960 cmd.exe 95 PID 3960 wrote to memory of 3636 3960 cmd.exe 95 PID 3960 wrote to memory of 3636 3960 cmd.exe 95 PID 3960 wrote to memory of 3832 3960 cmd.exe 96 PID 3960 wrote to memory of 3832 3960 cmd.exe 96 PID 3960 wrote to memory of 3832 3960 cmd.exe 96 PID 3960 wrote to memory of 380 3960 cmd.exe 97 PID 3960 wrote to memory of 380 3960 cmd.exe 97 PID 3960 wrote to memory of 380 3960 cmd.exe 97 PID 3960 wrote to memory of 4052 3960 cmd.exe 98 PID 3960 wrote to memory of 4052 3960 cmd.exe 98 PID 3960 wrote to memory of 4052 3960 cmd.exe 98 PID 3960 wrote to memory of 4436 3960 cmd.exe 99 PID 3960 wrote to memory of 4436 3960 cmd.exe 99 PID 3960 wrote to memory of 4436 3960 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\v6240371.exe"C:\Users\Admin\AppData\Local\Temp\v6240371.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7144898.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7144898.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4326138.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4326138.exe3⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3584
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b2142649.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b2142649.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4568
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
- System Location Discovery: System Language Discovery
PID:4600
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:N"6⤵
- System Location Discovery: System Language Discovery
PID:3636
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:R" /E6⤵
- System Location Discovery: System Language Discovery
PID:3832
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
- System Location Discovery: System Language Discovery
PID:380
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:N"6⤵
- System Location Discovery: System Language Discovery
PID:4052
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:R" /E6⤵
- System Location Discovery: System Language Discovery
PID:4436
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c3938692.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c3938692.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:3836
-
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:968
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:4220
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD56bf266050d554a65c61d85cf98558032
SHA134a234bb3bd5a75fc708a95f1c1c5a61ea4687a7
SHA25661a2330ee11441fcf0e633aab6b0a0979f8cd3d62bfa894069478d5cc6b30798
SHA512047862d2c904a20c0d88f1697dcc466349493b5e25e9884729c387c6df4ae8ee45c0a9479a0a7cf4abbb034b64acc524847ba30dbd81453ad70281475d1b1857
-
Filesize
234KB
MD556584930533091ccb7453a21ef2ac0ad
SHA1dcaa8c6b270bd9685642ebb7ad1ec9747e259446
SHA2560e0372526bfe3a43d8dc3cb8af10f60914ccacd20597189b54f7c38e317e0bdb
SHA512fe89c28131efdf309c518340d59890f8568a28c7c7b3deec30c5972917e38a7b65ee678e0bc933e002d7496906b35e75206f5e497174bcb2ee475c0057e04bc8
-
Filesize
11KB
MD552be802c6b06a586dc2e8a4fccc6d075
SHA176904ad8f17c83d0cc1233407540b6b331ba0284
SHA2560fcb74c81aba859b155329895f2e8485ead4404ac9ccc8e182da55d8702abe02
SHA512152413ee88e7f0cce9b7f1b163bfd9ceb78b3c14041a3cea1a5fac9e9408f17cc3b9f1e49b6b817b24b91faa3626ee4a03fd35ee8bbef55d79599fc191098959
-
Filesize
224KB
MD595c08c6bdade25e84a4536396760af3a
SHA12135bdd1c6de0e38e5c5814f8aed95d26e7534a3
SHA25697756a3aba636c16c10852a994291250619678bc677fadbe358487d95309ecaa
SHA512bef843c0b30a149ba1fb702cd680fb3a4839429b44343124363324153ffa011ea27e512703e16456f3291932911a4d5dab58b76d0446cc502b6666caafe80ca7