Threat name:
Amadey, PureLog Stealer, RedLine, SmokeL
Alert
Classification:
phis.troj.spyw.evad
.NET source code contains method to dynamically call methods (often used by packers)
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Installs new ROOT certificates
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Reads the System eventlog
Sample uses string decryption to hide its real strings
Sigma detected: Capture Wi-Fi password
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected Costura Assembly Loader
Yara detected Generic Downloader
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1416268
Sample:
2ZQkFRoMrY.exe
Startdate:
27/03/2024
Architecture:
WINDOWS
Score:
100
179
Multi AV Scanner detection
for domain / URL
2->179
181
Found malware configuration
2->181
183
Malicious sample detected
(through community Yara
rule)
2->183
185
26 other signatures
2->185
9
explorgu.exe
48
2->9
started
14
2ZQkFRoMrY.exe
5
2->14
started
16
chrosha.exe
2->16
started
18
2 other processes
2->18
process3
dnsIp4
135
193.233.132.167
FREE-NET-ASFREEnetEU
Russian Federation
9->135
137
185.215.113.32
WHOLESALECONNECTIONSNL
Portugal
9->137
143
3 other IPs or domains
9->143
107
C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+
9->107
dropped
109
C:\Users\user\AppData\Roaming\...\clip64.dll, PE32
9->109
dropped
111
C:\Users\user\AppData\Local\...\32456.exe, PE32
9->111
dropped
115
17 other malicious files
9->115
dropped
233
Antivirus detection
for dropped file
9->233
235
Multi AV Scanner detection
for dropped file
9->235
237
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
9->237
247
5 other signatures
9->247
20
NewB.exe
9->20
started
25
alex1234.exe
9->25
started
27
987123.exe
9->27
started
29
7 other processes
9->29
113
C:\Users\user\AppData\Local\...\explorgu.exe, PE32
14->113
dropped
239
Detected unpacking (changes
PE section rights)
14->239
241
Found evasive API chain
(may stop execution
after reading information
in the PEB, e.g. number
of processors)
14->241
243
Tries to evade debugger
and weak emulator (self
modifying code)
14->243
245
Tries to detect virtualization
through RDTSC time measurements
14->245
139
23.33.180.114
AKAMAI-ASUS
United States
18->139
141
127.0.0.1
unknown
unknown
18->141
file5
signatures6
process7
dnsIp8
119
81.94.159.197
WESTCALL-ASRU
Russian Federation
20->119
121
185.172.128.144
NADYMSS-ASRU
Russian Federation
20->121
127
2 other IPs or domains
20->127
91
C:\...\4767d2e713f2021e8fe856e3ea638b58.exe, PE32
20->91
dropped
93
C:\Users\user\AppData\Local\...\toolspub1.exe, PE32
20->93
dropped
95
C:\Users\user\AppData\Local\...\ISetup8.exe, PE32
20->95
dropped
105
3 other malicious files
20->105
dropped
207
Multi AV Scanner detection
for dropped file
20->207
209
Creates an undocumented
autostart registry key
20->209
211
Uses schtasks.exe or
at.exe to add and modify
task schedules
20->211
31
ISetup8.exe
20->31
started
50
2 other processes
20->50
213
Writes to foreign memory
regions
25->213
215
Allocates memory in
foreign processes
25->215
217
Injects a PE file into
a foreign processes
25->217
36
RegAsm.exe
25->36
started
38
conhost.exe
25->38
started
219
Detected unpacking (changes
PE section rights)
27->219
221
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
27->221
229
4 other signatures
27->229
40
explorer.exe
27->40
injected
123
185.215.113.67
WHOLESALECONNECTIONSNL
Portugal
29->123
125
217.195.207.156
ASFIBERSUNUCUTR
Turkey
29->125
97
C:\Users\user\AppData\Local\...\update.exe, PE32
29->97
dropped
99
C:\Users\user\AppData\Local\...\setup.exe, PE32
29->99
dropped
101
C:\Users\user\AppData\Local\...\chrosha.exe, PE32
29->101
dropped
103
C:\Users\user\AppData\Local\Temp\...\run.vbs, ASCII
29->103
dropped
223
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
29->223
225
Machine Learning detection
for dropped file
29->225
227
Found many strings related
to Crypto-Wallets (likely
being stolen)
29->227
231
5 other signatures
29->231
42
rundll32.exe
25
29->42
started
44
wscript.exe
29->44
started
46
RegAsm.exe
5
4
29->46
started
48
conhost.exe
29->48
started
file9
signatures10
process11
dnsIp12
145
185.172.128.65
NADYMSS-ASRU
Russian Federation
31->145
147
185.172.128.90
NADYMSS-ASRU
Russian Federation
31->147
75
C:\Users\user\AppData\Local\Temp\u36g.1.exe, PE32
31->75
dropped
77
C:\Users\user\AppData\Local\Temp\u36g.0.exe, PE32
31->77
dropped
153
Antivirus detection
for dropped file
31->153
155
Multi AV Scanner detection
for dropped file
31->155
157
Detected unpacking (changes
PE section rights)
31->157
175
2 other signatures
31->175
79
C:\Users\user\AppData\Roaming\...\propro.exe, PE32
36->79
dropped
81
C:\Users\user\AppData\Roaming\...\Traffic.exe, PE32
36->81
dropped
52
Traffic.exe
36->52
started
56
propro.exe
36->56
started
149
91.215.85.120
PINDC-ASRU
Russian Federation
40->149
83
C:\Users\user\AppData\Roaming\bbgsfhe, PE32
40->83
dropped
85
C:\Users\user\AppData\Local\Temp\296C.exe, PE32
40->85
dropped
87
C:\Users\user\AppData\Local\Temp\1BDE.dll, PE32
40->87
dropped
89
C:\Users\user\AppData\Local\Temp\13CF.exe, PE32
40->89
dropped
159
Benign windows process
drops PE files
40->159
161
Hides that the sample
has been downloaded
from the Internet (zone.identifier)
40->161
163
Tries to steal Instant
Messenger accounts or
passwords
42->163
177
4 other signatures
42->177
58
powershell.exe
42->58
started
61
netsh.exe
2
42->61
started
165
Windows Scripting host
queries suspicious COM
object (likely to drop
second stage)
44->165
63
update.exe
44->63
started
151
4.185.137.132
LEVEL3US
United States
46->151
167
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
46->167
169
Found many strings related
to Crypto-Wallets (likely
being stolen)
46->169
171
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
46->171
173
Tries to steal Crypto
Currency Wallets
46->173
65
WerFault.exe
50->65
started
67
conhost.exe
50->67
started
file13
signatures14
process15
dnsIp16
129
5.42.65.67
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
52->129
187
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
52->187
189
Found many strings related
to Crypto-Wallets (likely
being stolen)
52->189
191
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
52->191
193
Reads the System eventlog
52->193
69
conhost.exe
52->69
started
131
185.172.128.33
NADYMSS-ASRU
Russian Federation
56->131
195
Installs new ROOT certificates
56->195
197
Tries to steal Crypto
Currency Wallets
56->197
117
C:\Users\user\...\246122658369_Desktop.zip, Zip
58->117
dropped
71
conhost.exe
58->71
started
73
conhost.exe
61->73
started
199
Multi AV Scanner detection
for dropped file
63->199
201
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
63->201
203
Writes to foreign memory
regions
63->203
205
2 other signatures
63->205
133
20.189.173.21
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
65->133
file17
signatures18
process19
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.