Analysis
-
max time kernel
144s -
max time network
173s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:14
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
General
-
Target
file.exe
-
Size
245KB
-
MD5
b5820c0fb930ee3460da54f05ef51d8c
-
SHA1
b7d81bf3035aa2110edda9feeb64b1bb7c2b5939
-
SHA256
bf24fcd67a5e4bfe47d5d7bceccf2dd7af585c44edf4f68bb86c2d2e6149c8a9
-
SHA512
9ae65a51ef59622adfcef7bfcbb38adb6b94f5bc54dc6347416726129d75c82946199197ae414c1feaf651f22664d4a8b2735feb3cba3fccf66c0983719c9aef
-
SSDEEP
3072:wBk7t4IJ+LQB4Wsw65r+64ek7sAE+I7h5S7TcJ3NqvEjEPH71Cmv3DWkJ4ViOte3:n7ULQB4Hz+Teescg3S3cdQEEHBekJ6g
Malware Config
Extracted
amadey
3.50
193.56.146.194/h49vlBP/index.php
Extracted
redline
novr
31.41.244.14:4694
-
auth_value
34ddf4eb9326256f20a48cd5f1e9b496
Signatures
-
Detect Amadey credential stealer module 5 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll amadey_cred_module \Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll amadey_cred_module \Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll amadey_cred_module \Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll amadey_cred_module \Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll amadey_cred_module -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\1000121001\lada.exe family_redline C:\Users\Admin\AppData\Local\Temp\1000121001\lada.exe family_redline C:\Users\Admin\AppData\Local\Temp\1000121001\lada.exe family_redline behavioral1/memory/1768-73-0x0000000000D80000-0x0000000000DA8000-memory.dmp family_redline -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 9 1132 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
rovwer.exelada.exerovwer.exerovwer.exepid process 1824 rovwer.exe 1768 lada.exe 1788 rovwer.exe 1996 rovwer.exe -
Loads dropped DLL 7 IoCs
Processes:
file.exerovwer.exerundll32.exepid process 2016 file.exe 2016 file.exe 1824 rovwer.exe 1132 rundll32.exe 1132 rundll32.exe 1132 rundll32.exe 1132 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
rovwer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\lada.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000121001\\lada.exe" rovwer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
lada.exerundll32.exepid process 1768 lada.exe 1132 rundll32.exe 1132 rundll32.exe 1132 rundll32.exe 1132 rundll32.exe 1768 lada.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
lada.exedescription pid process Token: SeDebugPrivilege 1768 lada.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
file.exerovwer.exetaskeng.exedescription pid process target process PID 2016 wrote to memory of 1824 2016 file.exe rovwer.exe PID 2016 wrote to memory of 1824 2016 file.exe rovwer.exe PID 2016 wrote to memory of 1824 2016 file.exe rovwer.exe PID 2016 wrote to memory of 1824 2016 file.exe rovwer.exe PID 1824 wrote to memory of 1552 1824 rovwer.exe schtasks.exe PID 1824 wrote to memory of 1552 1824 rovwer.exe schtasks.exe PID 1824 wrote to memory of 1552 1824 rovwer.exe schtasks.exe PID 1824 wrote to memory of 1552 1824 rovwer.exe schtasks.exe PID 1824 wrote to memory of 1768 1824 rovwer.exe lada.exe PID 1824 wrote to memory of 1768 1824 rovwer.exe lada.exe PID 1824 wrote to memory of 1768 1824 rovwer.exe lada.exe PID 1824 wrote to memory of 1768 1824 rovwer.exe lada.exe PID 1156 wrote to memory of 1788 1156 taskeng.exe rovwer.exe PID 1156 wrote to memory of 1788 1156 taskeng.exe rovwer.exe PID 1156 wrote to memory of 1788 1156 taskeng.exe rovwer.exe PID 1156 wrote to memory of 1788 1156 taskeng.exe rovwer.exe PID 1824 wrote to memory of 1132 1824 rovwer.exe rundll32.exe PID 1824 wrote to memory of 1132 1824 rovwer.exe rundll32.exe PID 1824 wrote to memory of 1132 1824 rovwer.exe rundll32.exe PID 1824 wrote to memory of 1132 1824 rovwer.exe rundll32.exe PID 1824 wrote to memory of 1132 1824 rovwer.exe rundll32.exe PID 1824 wrote to memory of 1132 1824 rovwer.exe rundll32.exe PID 1824 wrote to memory of 1132 1824 rovwer.exe rundll32.exe PID 1156 wrote to memory of 1996 1156 taskeng.exe rovwer.exe PID 1156 wrote to memory of 1996 1156 taskeng.exe rovwer.exe PID 1156 wrote to memory of 1996 1156 taskeng.exe rovwer.exe PID 1156 wrote to memory of 1996 1156 taskeng.exe rovwer.exe -
outlook_win_path 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe" /F3⤵
- Creates scheduled task(s)
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\1000121001\lada.exe"C:\Users\Admin\AppData\Local\Temp\1000121001\lada.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1768 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:1132
-
C:\Windows\system32\taskeng.exetaskeng.exe {5B92D95E-8BDE-4E27-93EF-A1AB1A41929B} S-1-5-21-3406023954-474543476-3319432036-1000:VUIIVLGQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe2⤵
- Executes dropped EXE
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe2⤵
- Executes dropped EXE
PID:1996
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
137KB
MD5bae3fb566c191522bab2bde67c482767
SHA17da8b30a638ff9f943cf03b32a4f254273990708
SHA2563ed2170e83cce59a98471509fb4a84090f2ddcb38549a191663d5fbd05612e01
SHA512f9859aba46d440df5dd10059a95708acdd45cca36339867ee654c271f4bb065f6c58005eadadc9a954c35078986402d2f379d5cf3c10484c603ae262d38e1f46
-
Filesize
137KB
MD5bae3fb566c191522bab2bde67c482767
SHA17da8b30a638ff9f943cf03b32a4f254273990708
SHA2563ed2170e83cce59a98471509fb4a84090f2ddcb38549a191663d5fbd05612e01
SHA512f9859aba46d440df5dd10059a95708acdd45cca36339867ee654c271f4bb065f6c58005eadadc9a954c35078986402d2f379d5cf3c10484c603ae262d38e1f46
-
Filesize
245KB
MD5b5820c0fb930ee3460da54f05ef51d8c
SHA1b7d81bf3035aa2110edda9feeb64b1bb7c2b5939
SHA256bf24fcd67a5e4bfe47d5d7bceccf2dd7af585c44edf4f68bb86c2d2e6149c8a9
SHA5129ae65a51ef59622adfcef7bfcbb38adb6b94f5bc54dc6347416726129d75c82946199197ae414c1feaf651f22664d4a8b2735feb3cba3fccf66c0983719c9aef
-
Filesize
245KB
MD5b5820c0fb930ee3460da54f05ef51d8c
SHA1b7d81bf3035aa2110edda9feeb64b1bb7c2b5939
SHA256bf24fcd67a5e4bfe47d5d7bceccf2dd7af585c44edf4f68bb86c2d2e6149c8a9
SHA5129ae65a51ef59622adfcef7bfcbb38adb6b94f5bc54dc6347416726129d75c82946199197ae414c1feaf651f22664d4a8b2735feb3cba3fccf66c0983719c9aef
-
Filesize
245KB
MD5b5820c0fb930ee3460da54f05ef51d8c
SHA1b7d81bf3035aa2110edda9feeb64b1bb7c2b5939
SHA256bf24fcd67a5e4bfe47d5d7bceccf2dd7af585c44edf4f68bb86c2d2e6149c8a9
SHA5129ae65a51ef59622adfcef7bfcbb38adb6b94f5bc54dc6347416726129d75c82946199197ae414c1feaf651f22664d4a8b2735feb3cba3fccf66c0983719c9aef
-
Filesize
245KB
MD5b5820c0fb930ee3460da54f05ef51d8c
SHA1b7d81bf3035aa2110edda9feeb64b1bb7c2b5939
SHA256bf24fcd67a5e4bfe47d5d7bceccf2dd7af585c44edf4f68bb86c2d2e6149c8a9
SHA5129ae65a51ef59622adfcef7bfcbb38adb6b94f5bc54dc6347416726129d75c82946199197ae414c1feaf651f22664d4a8b2735feb3cba3fccf66c0983719c9aef
-
Filesize
126KB
MD5674cec24e36e0dfaec6290db96dda86e
SHA1581e3a7a541cc04641e751fc850d92e07236681f
SHA256de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded
SHA5126d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029
-
Filesize
137KB
MD5bae3fb566c191522bab2bde67c482767
SHA17da8b30a638ff9f943cf03b32a4f254273990708
SHA2563ed2170e83cce59a98471509fb4a84090f2ddcb38549a191663d5fbd05612e01
SHA512f9859aba46d440df5dd10059a95708acdd45cca36339867ee654c271f4bb065f6c58005eadadc9a954c35078986402d2f379d5cf3c10484c603ae262d38e1f46
-
Filesize
245KB
MD5b5820c0fb930ee3460da54f05ef51d8c
SHA1b7d81bf3035aa2110edda9feeb64b1bb7c2b5939
SHA256bf24fcd67a5e4bfe47d5d7bceccf2dd7af585c44edf4f68bb86c2d2e6149c8a9
SHA5129ae65a51ef59622adfcef7bfcbb38adb6b94f5bc54dc6347416726129d75c82946199197ae414c1feaf651f22664d4a8b2735feb3cba3fccf66c0983719c9aef
-
Filesize
245KB
MD5b5820c0fb930ee3460da54f05ef51d8c
SHA1b7d81bf3035aa2110edda9feeb64b1bb7c2b5939
SHA256bf24fcd67a5e4bfe47d5d7bceccf2dd7af585c44edf4f68bb86c2d2e6149c8a9
SHA5129ae65a51ef59622adfcef7bfcbb38adb6b94f5bc54dc6347416726129d75c82946199197ae414c1feaf651f22664d4a8b2735feb3cba3fccf66c0983719c9aef
-
Filesize
126KB
MD5674cec24e36e0dfaec6290db96dda86e
SHA1581e3a7a541cc04641e751fc850d92e07236681f
SHA256de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded
SHA5126d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029
-
Filesize
126KB
MD5674cec24e36e0dfaec6290db96dda86e
SHA1581e3a7a541cc04641e751fc850d92e07236681f
SHA256de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded
SHA5126d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029
-
Filesize
126KB
MD5674cec24e36e0dfaec6290db96dda86e
SHA1581e3a7a541cc04641e751fc850d92e07236681f
SHA256de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded
SHA5126d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029
-
Filesize
126KB
MD5674cec24e36e0dfaec6290db96dda86e
SHA1581e3a7a541cc04641e751fc850d92e07236681f
SHA256de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded
SHA5126d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029