Analysis
-
max time kernel
142s -
max time network
90s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
06-02-2023 11:29
Static task
static1
Behavioral task
behavioral1
Sample
2a679bfd6613cf466c6c856b691a5ef1bdd2955f04f428671b6a1d2188823131.exe
Resource
win10-20220812-en
General
-
Target
2a679bfd6613cf466c6c856b691a5ef1bdd2955f04f428671b6a1d2188823131.exe
-
Size
642KB
-
MD5
8b45f319ca84eac7d07515d73a814f82
-
SHA1
c871320f1dc52adff37efbdd690cf2a89ba589bb
-
SHA256
2a679bfd6613cf466c6c856b691a5ef1bdd2955f04f428671b6a1d2188823131
-
SHA512
e3991592a6801ddb4959a7b6fc48e49ef3d7d561c4ccf9c8277166638690f9e8b511fea0eb4de9efa8c549205c46f4170b1abaeaf862064d2e995b9e518a8e55
-
SSDEEP
12288:2Mrdy904o03mPy1mSauq8aQoSXrgyMYfUwcZa:Xy9v5baIaRurUwcQ
Malware Config
Extracted
redline
bilod
193.233.20.7:4138
-
auth_value
407a8c8d5a1f9a3348afc8c6b0155512
Extracted
amadey
3.66
62.204.41.5/Bu58Ngs/index.php
Signatures
-
Processes:
mika.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" mika.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" mika.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" mika.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" mika.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" mika.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/4644-268-0x0000000002680000-0x00000000026C6000-memory.dmp family_redline behavioral1/memory/4644-274-0x0000000005080000-0x00000000050C4000-memory.dmp family_redline behavioral1/memory/4644-311-0x0000000000490000-0x000000000053E000-memory.dmp family_redline -
Executes dropped EXE 7 IoCs
Processes:
cYJn.exeaYJx.exemika.exevona.exemnolyk.exemnolyk.exemnolyk.exepid process 2232 cYJn.exe 4644 aYJx.exe 4912 mika.exe 4960 vona.exe 1392 mnolyk.exe 1804 mnolyk.exe 4760 mnolyk.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4928 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
mika.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" mika.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
2a679bfd6613cf466c6c856b691a5ef1bdd2955f04f428671b6a1d2188823131.execYJn.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2a679bfd6613cf466c6c856b691a5ef1bdd2955f04f428671b6a1d2188823131.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2a679bfd6613cf466c6c856b691a5ef1bdd2955f04f428671b6a1d2188823131.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cYJn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" cYJn.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
aYJx.exemika.exepid process 4644 aYJx.exe 4644 aYJx.exe 4912 mika.exe 4912 mika.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
aYJx.exemika.exedescription pid process Token: SeDebugPrivilege 4644 aYJx.exe Token: SeDebugPrivilege 4912 mika.exe -
Suspicious use of WriteProcessMemory 41 IoCs
Processes:
2a679bfd6613cf466c6c856b691a5ef1bdd2955f04f428671b6a1d2188823131.execYJn.exevona.exemnolyk.execmd.exedescription pid process target process PID 60 wrote to memory of 2232 60 2a679bfd6613cf466c6c856b691a5ef1bdd2955f04f428671b6a1d2188823131.exe cYJn.exe PID 60 wrote to memory of 2232 60 2a679bfd6613cf466c6c856b691a5ef1bdd2955f04f428671b6a1d2188823131.exe cYJn.exe PID 60 wrote to memory of 2232 60 2a679bfd6613cf466c6c856b691a5ef1bdd2955f04f428671b6a1d2188823131.exe cYJn.exe PID 2232 wrote to memory of 4644 2232 cYJn.exe aYJx.exe PID 2232 wrote to memory of 4644 2232 cYJn.exe aYJx.exe PID 2232 wrote to memory of 4644 2232 cYJn.exe aYJx.exe PID 2232 wrote to memory of 4912 2232 cYJn.exe mika.exe PID 2232 wrote to memory of 4912 2232 cYJn.exe mika.exe PID 60 wrote to memory of 4960 60 2a679bfd6613cf466c6c856b691a5ef1bdd2955f04f428671b6a1d2188823131.exe vona.exe PID 60 wrote to memory of 4960 60 2a679bfd6613cf466c6c856b691a5ef1bdd2955f04f428671b6a1d2188823131.exe vona.exe PID 60 wrote to memory of 4960 60 2a679bfd6613cf466c6c856b691a5ef1bdd2955f04f428671b6a1d2188823131.exe vona.exe PID 4960 wrote to memory of 1392 4960 vona.exe mnolyk.exe PID 4960 wrote to memory of 1392 4960 vona.exe mnolyk.exe PID 4960 wrote to memory of 1392 4960 vona.exe mnolyk.exe PID 1392 wrote to memory of 2240 1392 mnolyk.exe schtasks.exe PID 1392 wrote to memory of 2240 1392 mnolyk.exe schtasks.exe PID 1392 wrote to memory of 2240 1392 mnolyk.exe schtasks.exe PID 1392 wrote to memory of 1276 1392 mnolyk.exe cmd.exe PID 1392 wrote to memory of 1276 1392 mnolyk.exe cmd.exe PID 1392 wrote to memory of 1276 1392 mnolyk.exe cmd.exe PID 1276 wrote to memory of 4824 1276 cmd.exe cmd.exe PID 1276 wrote to memory of 4824 1276 cmd.exe cmd.exe PID 1276 wrote to memory of 4824 1276 cmd.exe cmd.exe PID 1276 wrote to memory of 64 1276 cmd.exe cacls.exe PID 1276 wrote to memory of 64 1276 cmd.exe cacls.exe PID 1276 wrote to memory of 64 1276 cmd.exe cacls.exe PID 1276 wrote to memory of 2176 1276 cmd.exe cacls.exe PID 1276 wrote to memory of 2176 1276 cmd.exe cacls.exe PID 1276 wrote to memory of 2176 1276 cmd.exe cacls.exe PID 1276 wrote to memory of 4544 1276 cmd.exe cmd.exe PID 1276 wrote to memory of 4544 1276 cmd.exe cmd.exe PID 1276 wrote to memory of 4544 1276 cmd.exe cmd.exe PID 1276 wrote to memory of 992 1276 cmd.exe cacls.exe PID 1276 wrote to memory of 992 1276 cmd.exe cacls.exe PID 1276 wrote to memory of 992 1276 cmd.exe cacls.exe PID 1276 wrote to memory of 4168 1276 cmd.exe cacls.exe PID 1276 wrote to memory of 4168 1276 cmd.exe cacls.exe PID 1276 wrote to memory of 4168 1276 cmd.exe cacls.exe PID 1392 wrote to memory of 4928 1392 mnolyk.exe rundll32.exe PID 1392 wrote to memory of 4928 1392 mnolyk.exe rundll32.exe PID 1392 wrote to memory of 4928 1392 mnolyk.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a679bfd6613cf466c6c856b691a5ef1bdd2955f04f428671b6a1d2188823131.exe"C:\Users\Admin\AppData\Local\Temp\2a679bfd6613cf466c6c856b691a5ef1bdd2955f04f428671b6a1d2188823131.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cYJn.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cYJn.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aYJx.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aYJx.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4644
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mika.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mika.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4912
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vona.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vona.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe" /F4⤵
- Creates scheduled task(s)
PID:2240
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5eb6b96734" /P "Admin:N"&&CACLS "..\5eb6b96734" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4824
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"5⤵PID:64
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E5⤵PID:2176
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4544
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:N"5⤵PID:992
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:R" /E5⤵PID:4168
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4928
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:1804
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:4760
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
456KB
MD5a6f269f6313bc2f437a254524959e9bc
SHA1380825ae8d72948ad63dbb9bdf7db3eb4de8ba1d
SHA2569ee767feb93919cd69d63ebfd03a5c788b1050b3b9b8f887035af37f95d7299e
SHA512043dd9834803d2b21461488b86073a03176b53344d9f4b69654f79bfa97f1975705fabdcf3d5d04105577c77f5435923cb2fdb80ceec78a4b68c017172b7d55c
-
Filesize
456KB
MD5a6f269f6313bc2f437a254524959e9bc
SHA1380825ae8d72948ad63dbb9bdf7db3eb4de8ba1d
SHA2569ee767feb93919cd69d63ebfd03a5c788b1050b3b9b8f887035af37f95d7299e
SHA512043dd9834803d2b21461488b86073a03176b53344d9f4b69654f79bfa97f1975705fabdcf3d5d04105577c77f5435923cb2fdb80ceec78a4b68c017172b7d55c
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
425KB
MD5cac9c1edb035eec6f2d552ec3ca96145
SHA11c980162ae50cbaf1b479d7bc9575faa55a53504
SHA25629cc22cd2167fcc12eb0f555d6f7b4ec0be43c76d03ea53e35ecf3464c5e4efa
SHA51231c1998d244cb0a9613cb8544f4de636194a636dd98015ab04d14cfdd72b3db3503e98c72a319dce2251979d9fa8c1dbb8ff95beeb89dc9cd9a183a1530dd84f
-
Filesize
425KB
MD5cac9c1edb035eec6f2d552ec3ca96145
SHA11c980162ae50cbaf1b479d7bc9575faa55a53504
SHA25629cc22cd2167fcc12eb0f555d6f7b4ec0be43c76d03ea53e35ecf3464c5e4efa
SHA51231c1998d244cb0a9613cb8544f4de636194a636dd98015ab04d14cfdd72b3db3503e98c72a319dce2251979d9fa8c1dbb8ff95beeb89dc9cd9a183a1530dd84f
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
89KB
MD59221a421a3e777eb7d4ce55e474bcc4a
SHA1c96d7bd7ccbf9352d50527bff472595b3dc5298e
SHA25610ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8
SHA51263ac172cb19c7c020676937cb35e853710d08e99e06e8cdcb410c37e0c9056af409a50fdec0c90a3c532edcf5e0f128fa1e2181063e1208d4fc4643b1b5736f3
-
Filesize
89KB
MD59221a421a3e777eb7d4ce55e474bcc4a
SHA1c96d7bd7ccbf9352d50527bff472595b3dc5298e
SHA25610ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8
SHA51263ac172cb19c7c020676937cb35e853710d08e99e06e8cdcb410c37e0c9056af409a50fdec0c90a3c532edcf5e0f128fa1e2181063e1208d4fc4643b1b5736f3