Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
31-01-2025 10:18
Static task
static1
Behavioral task
behavioral1
Sample
00fa85d1b7df666624e986fae4bb65de8602d49d09f37e7a8a04bb52470febb3.exe
Resource
win10v2004-20250129-en
General
-
Target
00fa85d1b7df666624e986fae4bb65de8602d49d09f37e7a8a04bb52470febb3.exe
-
Size
705KB
-
MD5
f67aac6e64021331802841e1ab6a1284
-
SHA1
0e5443344edfba236e919e9f7633051a7dfa1fa4
-
SHA256
00fa85d1b7df666624e986fae4bb65de8602d49d09f37e7a8a04bb52470febb3
-
SHA512
d592a740b682e0927479c75e0299de623ebce19ab3e837f5f4aedbc863ec469c98878dca9b5f55c8a0e3c5701d74469be0236edc9a3fe35696d78f506428998c
-
SSDEEP
12288:UMrVy90bD0VCvCdg5EBeTy0PdSZc1wxcLPYPVpyddt5i8RUu8684l:Ry6o+0ePBp1wiLPOAtm4l
Malware Config
Extracted
amadey
3.87
59b440
http://77.91.68.18
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
-
url_paths
/nice/index.php
Extracted
redline
stas
77.91.124.82:19071
-
auth_value
db6d96c4eade05afc28c31d9ad73a73c
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b9d-26.dat healer behavioral1/memory/2728-28-0x00000000005B0000-0x00000000005BA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" g4922914.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g4922914.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g4922914.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g4922914.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection g4922914.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g4922914.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g4922914.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g4922914.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications g4922914.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" g4922914.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b9b-43.dat family_redline behavioral1/memory/1800-45-0x0000000000990000-0x00000000009C0000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation h1483029.exe Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation saves.exe -
Executes dropped EXE 10 IoCs
pid Process 3292 x3960684.exe 4668 x7600373.exe 3612 x3983882.exe 2728 g4922914.exe 1696 h1483029.exe 4012 saves.exe 1800 i4983280.exe 5076 saves.exe 3380 saves.exe 4968 saves.exe -
Windows security modification 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g4922914.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 00fa85d1b7df666624e986fae4bb65de8602d49d09f37e7a8a04bb52470febb3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3960684.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x7600373.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x3983882.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language h1483029.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00fa85d1b7df666624e986fae4bb65de8602d49d09f37e7a8a04bb52470febb3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x7600373.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x3983882.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language saves.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x3960684.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i4983280.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2500 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2728 g4922914.exe 2728 g4922914.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2728 g4922914.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 3636 wrote to memory of 3292 3636 00fa85d1b7df666624e986fae4bb65de8602d49d09f37e7a8a04bb52470febb3.exe 85 PID 3636 wrote to memory of 3292 3636 00fa85d1b7df666624e986fae4bb65de8602d49d09f37e7a8a04bb52470febb3.exe 85 PID 3636 wrote to memory of 3292 3636 00fa85d1b7df666624e986fae4bb65de8602d49d09f37e7a8a04bb52470febb3.exe 85 PID 3292 wrote to memory of 4668 3292 x3960684.exe 86 PID 3292 wrote to memory of 4668 3292 x3960684.exe 86 PID 3292 wrote to memory of 4668 3292 x3960684.exe 86 PID 4668 wrote to memory of 3612 4668 x7600373.exe 88 PID 4668 wrote to memory of 3612 4668 x7600373.exe 88 PID 4668 wrote to memory of 3612 4668 x7600373.exe 88 PID 3612 wrote to memory of 2728 3612 x3983882.exe 89 PID 3612 wrote to memory of 2728 3612 x3983882.exe 89 PID 3612 wrote to memory of 1696 3612 x3983882.exe 91 PID 3612 wrote to memory of 1696 3612 x3983882.exe 91 PID 3612 wrote to memory of 1696 3612 x3983882.exe 91 PID 1696 wrote to memory of 4012 1696 h1483029.exe 92 PID 1696 wrote to memory of 4012 1696 h1483029.exe 92 PID 1696 wrote to memory of 4012 1696 h1483029.exe 92 PID 4668 wrote to memory of 1800 4668 x7600373.exe 93 PID 4668 wrote to memory of 1800 4668 x7600373.exe 93 PID 4668 wrote to memory of 1800 4668 x7600373.exe 93 PID 4012 wrote to memory of 2500 4012 saves.exe 94 PID 4012 wrote to memory of 2500 4012 saves.exe 94 PID 4012 wrote to memory of 2500 4012 saves.exe 94 PID 4012 wrote to memory of 2476 4012 saves.exe 95 PID 4012 wrote to memory of 2476 4012 saves.exe 95 PID 4012 wrote to memory of 2476 4012 saves.exe 95 PID 2476 wrote to memory of 5004 2476 cmd.exe 98 PID 2476 wrote to memory of 5004 2476 cmd.exe 98 PID 2476 wrote to memory of 5004 2476 cmd.exe 98 PID 2476 wrote to memory of 4000 2476 cmd.exe 99 PID 2476 wrote to memory of 4000 2476 cmd.exe 99 PID 2476 wrote to memory of 4000 2476 cmd.exe 99 PID 2476 wrote to memory of 3684 2476 cmd.exe 100 PID 2476 wrote to memory of 3684 2476 cmd.exe 100 PID 2476 wrote to memory of 3684 2476 cmd.exe 100 PID 2476 wrote to memory of 1096 2476 cmd.exe 101 PID 2476 wrote to memory of 1096 2476 cmd.exe 101 PID 2476 wrote to memory of 1096 2476 cmd.exe 101 PID 2476 wrote to memory of 3184 2476 cmd.exe 102 PID 2476 wrote to memory of 3184 2476 cmd.exe 102 PID 2476 wrote to memory of 3184 2476 cmd.exe 102 PID 2476 wrote to memory of 4648 2476 cmd.exe 103 PID 2476 wrote to memory of 4648 2476 cmd.exe 103 PID 2476 wrote to memory of 4648 2476 cmd.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\00fa85d1b7df666624e986fae4bb65de8602d49d09f37e7a8a04bb52470febb3.exe"C:\Users\Admin\AppData\Local\Temp\00fa85d1b7df666624e986fae4bb65de8602d49d09f37e7a8a04bb52470febb3.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3960684.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3960684.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7600373.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7600373.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3983882.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3983882.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4922914.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4922914.exe5⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1483029.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1483029.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2500
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵
- System Location Discovery: System Language Discovery
PID:5004
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵
- System Location Discovery: System Language Discovery
PID:4000
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵
- System Location Discovery: System Language Discovery
PID:3684
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵
- System Location Discovery: System Language Discovery
PID:1096
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵
- System Location Discovery: System Language Discovery
PID:3184
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵
- System Location Discovery: System Language Discovery
PID:4648
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i4983280.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i4983280.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1800
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:5076
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:3380
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4968
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD5b857be03778edec380cbd25d82ded809
SHA1694f3b65229a1e527e175ce5d798c2ed334fce0a
SHA25655abb3f14f37a0f2355dcc4e00102c7bcc77b41322395490a84a3b5530a2dc8d
SHA51200c3a765b69ffc36355c28156e19d389a358ff39e3653cc6495e589be4a3b657bd3d2053af90b410c0e1613dd4819cd06df32245171a05ee1a5a3a550111f203
-
Filesize
433KB
MD56ef20132fa83bcf769079b96d9d71038
SHA174f57ee5b1dbbf413a8c4ff50b423d611d4a1107
SHA256b8a65ba5d1ca68779229d2261c0e2c8cd574d7efa83ac0fafc6d3cbd750346a4
SHA5129f548128c6536cd123e8bbebdae3350e960a9dd0ddfb68390b16870dffa69acdcac51f1710ff726a83d7315fa9185c3f4e79506499f39d0bb8c7754c5bf478b1
-
Filesize
174KB
MD5ac97ff2f572224bb29f733651d14c66b
SHA1da58348bfc3043d20e47b938a385ad69f05a05bb
SHA25607b580992772a2c00dce50e84b89e1379ba48020188be665547a3081e865c62e
SHA5123a9ee518a27ff0ad08873de2357d2ee64b1fe2df6002ea7ca3313ab23be3c4561c8ac702884d9e720e1336ea40503df18b36b29eb6e12d01ce1f390bd822de13
-
Filesize
277KB
MD5d4340cd392960113e1fd74691951f261
SHA120bf61ebaf7d091187acf2c24fe812b57f70cc28
SHA25644c66c20f12040728e9dd5cbf423419c07a7a30a0a110bb0f0a927dd0c17fda6
SHA512c7945bd32619b4daa66124eeee2bb6bdc6c86545955a628116c67d619a45cdab2c50393feaabf11b361ee533d796cdc1d127792c5a9757b4b42aec627cb4f482
-
Filesize
15KB
MD5d28069656dcfda9c1a4897783d4e7f36
SHA1e6bfb7150e88c8d75d7591a64b0b58a964de2957
SHA256d276a57f62ca06578b16e9fcd713bd4a7ae87a5a97457be9ed01cc42d63f5f3e
SHA5128fd90570b3ef86c924976b83d5fd85d904f4f1a72fc631590b262dcf391819a77c301dbdf96854eb8045d8b383b83572e50a5669eb4b917de5d61afd66df6f98
-
Filesize
322KB
MD5e0105cdac8cb92a683b9a5b9ee3d11ff
SHA17d54b067cd78a8701f80255a3f87a53a72b0f0e8
SHA2563afe7ccdedc43a4578bb49fa2cabd54ed0889cfeb28bba5706aad34463c23691
SHA51229cec183cc2fdf39781ec02fc09fa53ecceb10ae5d786e8b9a2d5fbf89d132191b78289faf69827b83d97360c0157a1cf765767c4dd117ca7df2ec5d15d017a1