Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
24/03/2025, 15:58
Static task
static1
Behavioral task
behavioral1
Sample
001ece20ef94c85e55ef0a6f365b452dca11fbec2cac6f2a4df55b4c890e3375.exe
Resource
win10v2004-20250314-en
General
-
Target
001ece20ef94c85e55ef0a6f365b452dca11fbec2cac6f2a4df55b4c890e3375.exe
-
Size
722KB
-
MD5
542c4ead0d3004314149e8e75edfcd46
-
SHA1
2b7c674b2b2f6ac812a180b8e80ae7b94517685d
-
SHA256
001ece20ef94c85e55ef0a6f365b452dca11fbec2cac6f2a4df55b4c890e3375
-
SHA512
c2e933bed85e14b2b6f9495b553e284d76cb91068a86cb1252c75e35604fa87c896c158f4fed8f2f49075f038e595aac2e3deb68b8cfd7ac0d2443bfb40f2ba5
-
SSDEEP
12288:iMrty90M/MWArMIsV20IXvglhc585rMPJmPnCI5RMIxeMhp:7y5/ZAsDiYl2585rMPwPl+Ix5
Malware Config
Extracted
amadey
3.87
59b440
http://77.91.68.18
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
-
url_paths
/nice/index.php
Extracted
redline
turop
77.91.124.54:19071
-
auth_value
288bd34bce1667b91e279fa0e1085613
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000800000002428c-26.dat healer behavioral1/memory/228-28-0x0000000000790000-0x000000000079A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" a6239898.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a6239898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a6239898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a6239898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a6239898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a6239898.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a6239898.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a6239898.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications a6239898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" a6239898.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000024287-48.dat family_redline behavioral1/memory/4884-50-0x0000000000580000-0x00000000005B0000-memory.dmp family_redline -
Redline family
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation b1350157.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation saves.exe -
Executes dropped EXE 10 IoCs
pid Process 1512 v3099591.exe 3972 v9232368.exe 6124 v5307313.exe 228 a6239898.exe 4748 b1350157.exe 2664 saves.exe 4716 c2452410.exe 4884 d5731805.exe 4368 saves.exe 5976 saves.exe -
Windows security modification 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a6239898.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 001ece20ef94c85e55ef0a6f365b452dca11fbec2cac6f2a4df55b4c890e3375.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3099591.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v9232368.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v5307313.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 368 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c2452410.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 001ece20ef94c85e55ef0a6f365b452dca11fbec2cac6f2a4df55b4c890e3375.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v3099591.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v5307313.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v9232368.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1350157.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5731805.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language saves.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c2452410.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c2452410.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c2452410.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1308 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 228 a6239898.exe 228 a6239898.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 228 a6239898.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 6068 wrote to memory of 1512 6068 001ece20ef94c85e55ef0a6f365b452dca11fbec2cac6f2a4df55b4c890e3375.exe 86 PID 6068 wrote to memory of 1512 6068 001ece20ef94c85e55ef0a6f365b452dca11fbec2cac6f2a4df55b4c890e3375.exe 86 PID 6068 wrote to memory of 1512 6068 001ece20ef94c85e55ef0a6f365b452dca11fbec2cac6f2a4df55b4c890e3375.exe 86 PID 1512 wrote to memory of 3972 1512 v3099591.exe 87 PID 1512 wrote to memory of 3972 1512 v3099591.exe 87 PID 1512 wrote to memory of 3972 1512 v3099591.exe 87 PID 3972 wrote to memory of 6124 3972 v9232368.exe 88 PID 3972 wrote to memory of 6124 3972 v9232368.exe 88 PID 3972 wrote to memory of 6124 3972 v9232368.exe 88 PID 6124 wrote to memory of 228 6124 v5307313.exe 90 PID 6124 wrote to memory of 228 6124 v5307313.exe 90 PID 6124 wrote to memory of 4748 6124 v5307313.exe 97 PID 6124 wrote to memory of 4748 6124 v5307313.exe 97 PID 6124 wrote to memory of 4748 6124 v5307313.exe 97 PID 4748 wrote to memory of 2664 4748 b1350157.exe 98 PID 4748 wrote to memory of 2664 4748 b1350157.exe 98 PID 4748 wrote to memory of 2664 4748 b1350157.exe 98 PID 3972 wrote to memory of 4716 3972 v9232368.exe 99 PID 3972 wrote to memory of 4716 3972 v9232368.exe 99 PID 3972 wrote to memory of 4716 3972 v9232368.exe 99 PID 1512 wrote to memory of 4884 1512 v3099591.exe 100 PID 1512 wrote to memory of 4884 1512 v3099591.exe 100 PID 1512 wrote to memory of 4884 1512 v3099591.exe 100 PID 2664 wrote to memory of 1308 2664 saves.exe 101 PID 2664 wrote to memory of 1308 2664 saves.exe 101 PID 2664 wrote to memory of 1308 2664 saves.exe 101 PID 2664 wrote to memory of 2340 2664 saves.exe 103 PID 2664 wrote to memory of 2340 2664 saves.exe 103 PID 2664 wrote to memory of 2340 2664 saves.exe 103 PID 2340 wrote to memory of 4940 2340 cmd.exe 105 PID 2340 wrote to memory of 4940 2340 cmd.exe 105 PID 2340 wrote to memory of 4940 2340 cmd.exe 105 PID 2340 wrote to memory of 6036 2340 cmd.exe 106 PID 2340 wrote to memory of 6036 2340 cmd.exe 106 PID 2340 wrote to memory of 6036 2340 cmd.exe 106 PID 2340 wrote to memory of 2724 2340 cmd.exe 107 PID 2340 wrote to memory of 2724 2340 cmd.exe 107 PID 2340 wrote to memory of 2724 2340 cmd.exe 107 PID 2340 wrote to memory of 5852 2340 cmd.exe 108 PID 2340 wrote to memory of 5852 2340 cmd.exe 108 PID 2340 wrote to memory of 5852 2340 cmd.exe 108 PID 2340 wrote to memory of 976 2340 cmd.exe 109 PID 2340 wrote to memory of 976 2340 cmd.exe 109 PID 2340 wrote to memory of 976 2340 cmd.exe 109 PID 2340 wrote to memory of 2908 2340 cmd.exe 110 PID 2340 wrote to memory of 2908 2340 cmd.exe 110 PID 2340 wrote to memory of 2908 2340 cmd.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\001ece20ef94c85e55ef0a6f365b452dca11fbec2cac6f2a4df55b4c890e3375.exe"C:\Users\Admin\AppData\Local\Temp\001ece20ef94c85e55ef0a6f365b452dca11fbec2cac6f2a4df55b4c890e3375.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:6068 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3099591.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3099591.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9232368.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9232368.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5307313.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5307313.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:6124 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6239898.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6239898.exe5⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:228
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1350157.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1350157.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1308
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵
- System Location Discovery: System Language Discovery
PID:4940
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵
- System Location Discovery: System Language Discovery
PID:6036
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵
- System Location Discovery: System Language Discovery
PID:2724
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵
- System Location Discovery: System Language Discovery
PID:5852
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵
- System Location Discovery: System Language Discovery
PID:976
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵
- System Location Discovery: System Language Discovery
PID:2908
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2452410.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2452410.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:4716
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d5731805.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d5731805.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4884
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4368
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:5976
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:368
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
558KB
MD5aa6844e362ddf97043d736910c1018c1
SHA190c894facd193d6757103eee8a858b52143845dd
SHA2563de972d12ad7af5442f3eff826854a4cf3346bc9f6803bff60817acff261293a
SHA5128bd7442b0e1e1ed37d40e4ed5f6dc148dab7346204175bcdacc8f1bdfac5680266cfdb8fec949f1576e192bb4c2d1373146fc139c47a07bcee74b3337b0d51d8
-
Filesize
175KB
MD539d3d3a55c98a0b4d9b92b1976b3a28d
SHA14445868bd59e4e11867622d80e63cac0a42f064b
SHA256405ab0751f04eb2c3a94107e73308ac7742a3a875090c38901a864c8213cbdaf
SHA51278fca2b3c4c1bb261fa944c8b6494a8b333e317df3643490ee501e9ffbf4cb343087a232c019de5b46a210541835b9ec6d314acf5fefbceb1348d14be59bb7aa
-
Filesize
402KB
MD5d867fef685bda8a20420efd9164ac2a8
SHA1aae0d319eac19dc33ee2b5e044a50bcfb04a7661
SHA256057e0b6530b220ff4bd28819c9d4006487a6dfa477e125ffeaefa082d4b0c3c2
SHA512c063ca30a05e27cd45b72a0c134161c2c154bf6fbef51405df353bc3eccb13aee1b4e0f1cb6b67c043f86fff97e9b717cae8912bf4d8f17c08c4b9d03ff0b1cd
-
Filesize
43KB
MD51a048f1ff412c57789eecac14c81c9dd
SHA19107ed179ee377ff240e2c08be4956152334b9bb
SHA256419bc6855d4b98e985538a5c23046cfcc0fefb8ef7c8fc876a7d12f4646a9d6c
SHA51244f2790752972a64b495274dffe8eaaf491648e4cd5d62c9df32d3d5cf7d23e221f5542af2426d48bd94ba4e5a9b20eb71515262997d74770533567a7d14b044
-
Filesize
277KB
MD5223f25ede2ef46bc0b51e2c156cd498d
SHA12d056a7f75f69772f1c3465167517c785b0f9ee0
SHA256fdc84c0ca7c67657d7cade0e5a04296888ec28664cc49ced2d86adfa64a426c1
SHA5128f88f902fe881d9bb86af5a2bdcf513cb98a9569ee0d038a82718330360465b7f436da400805f59fd99b48cdf7b309f12f8dc074d8d019c9a4df784805a55c4f
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
313KB
MD52646194c5fa0f891afe999af5eced480
SHA13f1a99817e9fb9483764fda8d8c4fad544d41d9a
SHA25690a377f1cde400d7f61ae746e89ed7532d6ea2669793bde90ea8b038b77642e8
SHA5123e98c3cfc32f5062fa5c6da24fb80db46b96e1aacc9c635e356d99e41a51123569d401cbc1b78c158679fad6d1406aa9690d4793dfe83b1f9d16a5769d041bf8
-
Filesize
19B
MD5595e88012a6521aae3e12cbebe76eb9e
SHA1da3968197e7bf67aa45a77515b52ba2710c5fc34
SHA256b16e15764b8bc06c5c3f9f19bc8b99fa48e7894aa5a6ccdad65da49bbf564793
SHA512fd13c580d15cc5e8b87d97ead633209930e00e85c113c776088e246b47f140efe99bdf6ab02070677445db65410f7e62ec23c71182f9f78e9d0e1b9f7fda0dc3