Analysis
-
max time kernel
137s -
max time network
176s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 16:25
Static task
static1
Behavioral task
behavioral1
Sample
dd30ca110d2c890977d45c7c68fefcf0c62e49f932fdd98cc9ecf2c4d285df2a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dd30ca110d2c890977d45c7c68fefcf0c62e49f932fdd98cc9ecf2c4d285df2a.exe
Resource
win10v2004-20220812-en
General
-
Target
dd30ca110d2c890977d45c7c68fefcf0c62e49f932fdd98cc9ecf2c4d285df2a.exe
-
Size
244KB
-
MD5
03e4f75c45659084bc8b63e7762d8969
-
SHA1
a55603b1c70428da45c55cb94a2a8bfd2ec9dd24
-
SHA256
dd30ca110d2c890977d45c7c68fefcf0c62e49f932fdd98cc9ecf2c4d285df2a
-
SHA512
2bd10bd3313f0e8c653bc4851f0693934d5514f361710dd735e00c76e4fb723280d930e2520d5f7ac18c5ce5ac96515a40192681dabc6a447f5eff98988040a6
-
SSDEEP
3072:5sWWuKJ/k/zv2UFWVLx8QFcP5wU3RE65BhG2QI/OCyINzljGiFBQbJWJiUQ7xBtT:ZWl/QWVLx8AdJ4NQK3pG6QbJWIvJRt
Malware Config
Extracted
amadey
3.50
193.56.146.194/h49vlBP/index.php
Extracted
redline
Testing.v1
185.106.92.111:2510
-
auth_value
336be733d6f6d74b812efad48d422273
Signatures
-
Detect Amadey credential stealer module 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll amadey_cred_module \Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll amadey_cred_module \Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll amadey_cred_module behavioral1/memory/1608-100-0x0000000000160000-0x0000000000184000-memory.dmp amadey_cred_module \Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll amadey_cred_module \Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll amadey_cred_module -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/428-76-0x0000000002440000-0x000000000247E000-memory.dmp family_redline behavioral1/memory/428-77-0x0000000004980000-0x00000000049BC000-memory.dmp family_redline -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 8 1608 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
Processes:
rovwer.exenon.exeree.exerovwer.exerovwer.exepid process 776 rovwer.exe 428 non.exe 1296 ree.exe 1588 rovwer.exe 960 rovwer.exe -
Loads dropped DLL 10 IoCs
Processes:
dd30ca110d2c890977d45c7c68fefcf0c62e49f932fdd98cc9ecf2c4d285df2a.exerovwer.exerundll32.exepid process 1552 dd30ca110d2c890977d45c7c68fefcf0c62e49f932fdd98cc9ecf2c4d285df2a.exe 1552 dd30ca110d2c890977d45c7c68fefcf0c62e49f932fdd98cc9ecf2c4d285df2a.exe 776 rovwer.exe 776 rovwer.exe 776 rovwer.exe 776 rovwer.exe 1608 rundll32.exe 1608 rundll32.exe 1608 rundll32.exe 1608 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
rovwer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\non.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000130001\\non.exe" rovwer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ree.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000131001\\ree.exe" rovwer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
rundll32.exenon.exepid process 1608 rundll32.exe 1608 rundll32.exe 1608 rundll32.exe 1608 rundll32.exe 428 non.exe 428 non.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
non.exedescription pid process Token: SeDebugPrivilege 428 non.exe -
Suspicious use of WriteProcessMemory 37 IoCs
Processes:
dd30ca110d2c890977d45c7c68fefcf0c62e49f932fdd98cc9ecf2c4d285df2a.exerovwer.exetaskeng.exeree.execmd.exedescription pid process target process PID 1552 wrote to memory of 776 1552 dd30ca110d2c890977d45c7c68fefcf0c62e49f932fdd98cc9ecf2c4d285df2a.exe rovwer.exe PID 1552 wrote to memory of 776 1552 dd30ca110d2c890977d45c7c68fefcf0c62e49f932fdd98cc9ecf2c4d285df2a.exe rovwer.exe PID 1552 wrote to memory of 776 1552 dd30ca110d2c890977d45c7c68fefcf0c62e49f932fdd98cc9ecf2c4d285df2a.exe rovwer.exe PID 1552 wrote to memory of 776 1552 dd30ca110d2c890977d45c7c68fefcf0c62e49f932fdd98cc9ecf2c4d285df2a.exe rovwer.exe PID 776 wrote to memory of 268 776 rovwer.exe schtasks.exe PID 776 wrote to memory of 268 776 rovwer.exe schtasks.exe PID 776 wrote to memory of 268 776 rovwer.exe schtasks.exe PID 776 wrote to memory of 268 776 rovwer.exe schtasks.exe PID 776 wrote to memory of 428 776 rovwer.exe non.exe PID 776 wrote to memory of 428 776 rovwer.exe non.exe PID 776 wrote to memory of 428 776 rovwer.exe non.exe PID 776 wrote to memory of 428 776 rovwer.exe non.exe PID 776 wrote to memory of 1296 776 rovwer.exe ree.exe PID 776 wrote to memory of 1296 776 rovwer.exe ree.exe PID 776 wrote to memory of 1296 776 rovwer.exe ree.exe PID 776 wrote to memory of 1296 776 rovwer.exe ree.exe PID 1480 wrote to memory of 1588 1480 taskeng.exe rovwer.exe PID 1480 wrote to memory of 1588 1480 taskeng.exe rovwer.exe PID 1480 wrote to memory of 1588 1480 taskeng.exe rovwer.exe PID 1480 wrote to memory of 1588 1480 taskeng.exe rovwer.exe PID 776 wrote to memory of 1608 776 rovwer.exe rundll32.exe PID 776 wrote to memory of 1608 776 rovwer.exe rundll32.exe PID 776 wrote to memory of 1608 776 rovwer.exe rundll32.exe PID 776 wrote to memory of 1608 776 rovwer.exe rundll32.exe PID 776 wrote to memory of 1608 776 rovwer.exe rundll32.exe PID 776 wrote to memory of 1608 776 rovwer.exe rundll32.exe PID 776 wrote to memory of 1608 776 rovwer.exe rundll32.exe PID 1480 wrote to memory of 960 1480 taskeng.exe rovwer.exe PID 1480 wrote to memory of 960 1480 taskeng.exe rovwer.exe PID 1480 wrote to memory of 960 1480 taskeng.exe rovwer.exe PID 1480 wrote to memory of 960 1480 taskeng.exe rovwer.exe PID 1296 wrote to memory of 1624 1296 ree.exe cmd.exe PID 1296 wrote to memory of 1624 1296 ree.exe cmd.exe PID 1296 wrote to memory of 1624 1296 ree.exe cmd.exe PID 1624 wrote to memory of 1152 1624 cmd.exe schtasks.exe PID 1624 wrote to memory of 1152 1624 cmd.exe schtasks.exe PID 1624 wrote to memory of 1152 1624 cmd.exe schtasks.exe -
outlook_win_path 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd30ca110d2c890977d45c7c68fefcf0c62e49f932fdd98cc9ecf2c4d285df2a.exe"C:\Users\Admin\AppData\Local\Temp\dd30ca110d2c890977d45c7c68fefcf0c62e49f932fdd98cc9ecf2c4d285df2a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe" /F3⤵
- Creates scheduled task(s)
PID:268 -
C:\Users\Admin\AppData\Local\Temp\1000130001\non.exe"C:\Users\Admin\AppData\Local\Temp\1000130001\non.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:428 -
C:\Users\Admin\AppData\Local\Temp\1000131001\ree.exe"C:\Users\Admin\AppData\Local\Temp\1000131001\ree.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\system32\cmd.exe"cmd.exe" /C schtasks /create /tn \yuSePkFLKU /tr "C:\Users\Admin\AppData\Roaming\yuSePkFLKU\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f4⤵
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\system32\schtasks.exeschtasks /create /tn \yuSePkFLKU /tr "C:\Users\Admin\AppData\Roaming\yuSePkFLKU\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f5⤵
- Creates scheduled task(s)
PID:1152 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:1608
-
C:\Windows\system32\taskeng.exetaskeng.exe {07FF166D-B0E5-4496-87F3-AB897FE0B648} S-1-5-21-3385717845-2518323428-350143044-1000:SABDUHNY\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe2⤵
- Executes dropped EXE
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe2⤵
- Executes dropped EXE
PID:960
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
317KB
MD5d46c47543ab771c8d6bd2d7c9ba853a3
SHA1b339decb0fd779a0a7c192d321aec1017808e28e
SHA2569617d4eefc2c16ff7587d7a85c1f52d23053e02632e9cfc27e0a5eb84486f05c
SHA512e601d8b012d81409005b3b7aa002b2ce4417ae36f0a62f6dba4fdb592f6e730eafb02d1c5adbdc6db800206204b5b30577366e85f8faa3b719ef0dc574917d8f
-
Filesize
8KB
MD5ce738de8f3bc9c183348ecd1f5cf6fc4
SHA19a65168430c85371c6fc527abed1ff88e025ebc0
SHA25647e6940d28f5fe2396a1eb161fe4aa9ebbc138e8dcd72ce72aa598ff6d0cb1e4
SHA51234695070cc67a0e916d2a45696ded026b225c7f913d11d6366bcc09f8aed81e8f29782dec63991ff1c7c9ce93cbd0b62bd84c8887a103df7e496984a98791191
-
Filesize
8KB
MD5ce738de8f3bc9c183348ecd1f5cf6fc4
SHA19a65168430c85371c6fc527abed1ff88e025ebc0
SHA25647e6940d28f5fe2396a1eb161fe4aa9ebbc138e8dcd72ce72aa598ff6d0cb1e4
SHA51234695070cc67a0e916d2a45696ded026b225c7f913d11d6366bcc09f8aed81e8f29782dec63991ff1c7c9ce93cbd0b62bd84c8887a103df7e496984a98791191
-
Filesize
244KB
MD503e4f75c45659084bc8b63e7762d8969
SHA1a55603b1c70428da45c55cb94a2a8bfd2ec9dd24
SHA256dd30ca110d2c890977d45c7c68fefcf0c62e49f932fdd98cc9ecf2c4d285df2a
SHA5122bd10bd3313f0e8c653bc4851f0693934d5514f361710dd735e00c76e4fb723280d930e2520d5f7ac18c5ce5ac96515a40192681dabc6a447f5eff98988040a6
-
Filesize
244KB
MD503e4f75c45659084bc8b63e7762d8969
SHA1a55603b1c70428da45c55cb94a2a8bfd2ec9dd24
SHA256dd30ca110d2c890977d45c7c68fefcf0c62e49f932fdd98cc9ecf2c4d285df2a
SHA5122bd10bd3313f0e8c653bc4851f0693934d5514f361710dd735e00c76e4fb723280d930e2520d5f7ac18c5ce5ac96515a40192681dabc6a447f5eff98988040a6
-
Filesize
244KB
MD503e4f75c45659084bc8b63e7762d8969
SHA1a55603b1c70428da45c55cb94a2a8bfd2ec9dd24
SHA256dd30ca110d2c890977d45c7c68fefcf0c62e49f932fdd98cc9ecf2c4d285df2a
SHA5122bd10bd3313f0e8c653bc4851f0693934d5514f361710dd735e00c76e4fb723280d930e2520d5f7ac18c5ce5ac96515a40192681dabc6a447f5eff98988040a6
-
Filesize
244KB
MD503e4f75c45659084bc8b63e7762d8969
SHA1a55603b1c70428da45c55cb94a2a8bfd2ec9dd24
SHA256dd30ca110d2c890977d45c7c68fefcf0c62e49f932fdd98cc9ecf2c4d285df2a
SHA5122bd10bd3313f0e8c653bc4851f0693934d5514f361710dd735e00c76e4fb723280d930e2520d5f7ac18c5ce5ac96515a40192681dabc6a447f5eff98988040a6
-
Filesize
126KB
MD5674cec24e36e0dfaec6290db96dda86e
SHA1581e3a7a541cc04641e751fc850d92e07236681f
SHA256de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded
SHA5126d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029
-
Filesize
317KB
MD5d46c47543ab771c8d6bd2d7c9ba853a3
SHA1b339decb0fd779a0a7c192d321aec1017808e28e
SHA2569617d4eefc2c16ff7587d7a85c1f52d23053e02632e9cfc27e0a5eb84486f05c
SHA512e601d8b012d81409005b3b7aa002b2ce4417ae36f0a62f6dba4fdb592f6e730eafb02d1c5adbdc6db800206204b5b30577366e85f8faa3b719ef0dc574917d8f
-
Filesize
317KB
MD5d46c47543ab771c8d6bd2d7c9ba853a3
SHA1b339decb0fd779a0a7c192d321aec1017808e28e
SHA2569617d4eefc2c16ff7587d7a85c1f52d23053e02632e9cfc27e0a5eb84486f05c
SHA512e601d8b012d81409005b3b7aa002b2ce4417ae36f0a62f6dba4fdb592f6e730eafb02d1c5adbdc6db800206204b5b30577366e85f8faa3b719ef0dc574917d8f
-
Filesize
8KB
MD5ce738de8f3bc9c183348ecd1f5cf6fc4
SHA19a65168430c85371c6fc527abed1ff88e025ebc0
SHA25647e6940d28f5fe2396a1eb161fe4aa9ebbc138e8dcd72ce72aa598ff6d0cb1e4
SHA51234695070cc67a0e916d2a45696ded026b225c7f913d11d6366bcc09f8aed81e8f29782dec63991ff1c7c9ce93cbd0b62bd84c8887a103df7e496984a98791191
-
Filesize
8KB
MD5ce738de8f3bc9c183348ecd1f5cf6fc4
SHA19a65168430c85371c6fc527abed1ff88e025ebc0
SHA25647e6940d28f5fe2396a1eb161fe4aa9ebbc138e8dcd72ce72aa598ff6d0cb1e4
SHA51234695070cc67a0e916d2a45696ded026b225c7f913d11d6366bcc09f8aed81e8f29782dec63991ff1c7c9ce93cbd0b62bd84c8887a103df7e496984a98791191
-
Filesize
244KB
MD503e4f75c45659084bc8b63e7762d8969
SHA1a55603b1c70428da45c55cb94a2a8bfd2ec9dd24
SHA256dd30ca110d2c890977d45c7c68fefcf0c62e49f932fdd98cc9ecf2c4d285df2a
SHA5122bd10bd3313f0e8c653bc4851f0693934d5514f361710dd735e00c76e4fb723280d930e2520d5f7ac18c5ce5ac96515a40192681dabc6a447f5eff98988040a6
-
Filesize
244KB
MD503e4f75c45659084bc8b63e7762d8969
SHA1a55603b1c70428da45c55cb94a2a8bfd2ec9dd24
SHA256dd30ca110d2c890977d45c7c68fefcf0c62e49f932fdd98cc9ecf2c4d285df2a
SHA5122bd10bd3313f0e8c653bc4851f0693934d5514f361710dd735e00c76e4fb723280d930e2520d5f7ac18c5ce5ac96515a40192681dabc6a447f5eff98988040a6
-
Filesize
126KB
MD5674cec24e36e0dfaec6290db96dda86e
SHA1581e3a7a541cc04641e751fc850d92e07236681f
SHA256de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded
SHA5126d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029
-
Filesize
126KB
MD5674cec24e36e0dfaec6290db96dda86e
SHA1581e3a7a541cc04641e751fc850d92e07236681f
SHA256de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded
SHA5126d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029
-
Filesize
126KB
MD5674cec24e36e0dfaec6290db96dda86e
SHA1581e3a7a541cc04641e751fc850d92e07236681f
SHA256de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded
SHA5126d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029
-
Filesize
126KB
MD5674cec24e36e0dfaec6290db96dda86e
SHA1581e3a7a541cc04641e751fc850d92e07236681f
SHA256de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded
SHA5126d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029