Analysis
-
max time kernel
152s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2023, 11:04
Static task
static1
Behavioral task
behavioral1
Sample
357c0ec297490d4eb939cf1df58e2ac5a722036d9252f65a50ecc6c69162879d.exe
Resource
win10v2004-20221111-en
General
-
Target
357c0ec297490d4eb939cf1df58e2ac5a722036d9252f65a50ecc6c69162879d.exe
-
Size
719KB
-
MD5
9bee22de3b0924437b8770156d4583db
-
SHA1
226103c1d561b18c1e21fad991a5c25a50c0e130
-
SHA256
357c0ec297490d4eb939cf1df58e2ac5a722036d9252f65a50ecc6c69162879d
-
SHA512
34157c00c893248b9fb3e5b28e3f5b7bddaa092572f6a2b35fafaee67492328861c1db1cd7fe4f79f837f2d39563afed378d2a6cfe9b55a5b05ab4325b844df6
-
SSDEEP
12288:yMrty90sr+kVV59g0aWKeRUDzdWSHwYC88NWfIPWolgglBGnqIBzhZlvl82C:3yDrTVVHRmDnHBC88NWfIuWgglBGqwzo
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
amadey
3.66
62.204.41.5/Bu58Ngs/index.php
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation mQf39.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 8 IoCs
pid Process 2744 skH04ol.exe 4536 sOP17Bj.exe 2672 kEP69iz.exe 4360 mQf39.exe 2680 mnolyk.exe 2132 nDU47jA.exe 4760 rmS25ny.exe 840 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 3580 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 357c0ec297490d4eb939cf1df58e2ac5a722036d9252f65a50ecc6c69162879d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 357c0ec297490d4eb939cf1df58e2ac5a722036d9252f65a50ecc6c69162879d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce skH04ol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" skH04ol.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sOP17Bj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" sOP17Bj.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4036 2132 WerFault.exe 85 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 432 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2672 kEP69iz.exe 2672 kEP69iz.exe 2132 nDU47jA.exe 2132 nDU47jA.exe 4760 rmS25ny.exe 4760 rmS25ny.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2672 kEP69iz.exe Token: SeDebugPrivilege 2132 nDU47jA.exe Token: SeDebugPrivilege 4760 rmS25ny.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4600 wrote to memory of 2744 4600 357c0ec297490d4eb939cf1df58e2ac5a722036d9252f65a50ecc6c69162879d.exe 80 PID 4600 wrote to memory of 2744 4600 357c0ec297490d4eb939cf1df58e2ac5a722036d9252f65a50ecc6c69162879d.exe 80 PID 4600 wrote to memory of 2744 4600 357c0ec297490d4eb939cf1df58e2ac5a722036d9252f65a50ecc6c69162879d.exe 80 PID 2744 wrote to memory of 4536 2744 skH04ol.exe 81 PID 2744 wrote to memory of 4536 2744 skH04ol.exe 81 PID 2744 wrote to memory of 4536 2744 skH04ol.exe 81 PID 4536 wrote to memory of 2672 4536 sOP17Bj.exe 82 PID 4536 wrote to memory of 2672 4536 sOP17Bj.exe 82 PID 4536 wrote to memory of 2672 4536 sOP17Bj.exe 82 PID 4536 wrote to memory of 4360 4536 sOP17Bj.exe 83 PID 4536 wrote to memory of 4360 4536 sOP17Bj.exe 83 PID 4536 wrote to memory of 4360 4536 sOP17Bj.exe 83 PID 4360 wrote to memory of 2680 4360 mQf39.exe 84 PID 4360 wrote to memory of 2680 4360 mQf39.exe 84 PID 4360 wrote to memory of 2680 4360 mQf39.exe 84 PID 2744 wrote to memory of 2132 2744 skH04ol.exe 85 PID 2744 wrote to memory of 2132 2744 skH04ol.exe 85 PID 2744 wrote to memory of 2132 2744 skH04ol.exe 85 PID 2680 wrote to memory of 432 2680 mnolyk.exe 86 PID 2680 wrote to memory of 432 2680 mnolyk.exe 86 PID 2680 wrote to memory of 432 2680 mnolyk.exe 86 PID 2680 wrote to memory of 2548 2680 mnolyk.exe 88 PID 2680 wrote to memory of 2548 2680 mnolyk.exe 88 PID 2680 wrote to memory of 2548 2680 mnolyk.exe 88 PID 2548 wrote to memory of 3920 2548 cmd.exe 90 PID 2548 wrote to memory of 3920 2548 cmd.exe 90 PID 2548 wrote to memory of 3920 2548 cmd.exe 90 PID 2548 wrote to memory of 4628 2548 cmd.exe 91 PID 2548 wrote to memory of 4628 2548 cmd.exe 91 PID 2548 wrote to memory of 4628 2548 cmd.exe 91 PID 2548 wrote to memory of 4384 2548 cmd.exe 92 PID 2548 wrote to memory of 4384 2548 cmd.exe 92 PID 2548 wrote to memory of 4384 2548 cmd.exe 92 PID 2548 wrote to memory of 4568 2548 cmd.exe 93 PID 2548 wrote to memory of 4568 2548 cmd.exe 93 PID 2548 wrote to memory of 4568 2548 cmd.exe 93 PID 2548 wrote to memory of 4356 2548 cmd.exe 94 PID 2548 wrote to memory of 4356 2548 cmd.exe 94 PID 2548 wrote to memory of 4356 2548 cmd.exe 94 PID 2548 wrote to memory of 2572 2548 cmd.exe 95 PID 2548 wrote to memory of 2572 2548 cmd.exe 95 PID 2548 wrote to memory of 2572 2548 cmd.exe 95 PID 4600 wrote to memory of 4760 4600 357c0ec297490d4eb939cf1df58e2ac5a722036d9252f65a50ecc6c69162879d.exe 99 PID 4600 wrote to memory of 4760 4600 357c0ec297490d4eb939cf1df58e2ac5a722036d9252f65a50ecc6c69162879d.exe 99 PID 2680 wrote to memory of 3580 2680 mnolyk.exe 100 PID 2680 wrote to memory of 3580 2680 mnolyk.exe 100 PID 2680 wrote to memory of 3580 2680 mnolyk.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\357c0ec297490d4eb939cf1df58e2ac5a722036d9252f65a50ecc6c69162879d.exe"C:\Users\Admin\AppData\Local\Temp\357c0ec297490d4eb939cf1df58e2ac5a722036d9252f65a50ecc6c69162879d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\skH04ol.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\skH04ol.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sOP17Bj.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sOP17Bj.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kEP69iz.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kEP69iz.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mQf39.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mQf39.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe" /F6⤵
- Creates scheduled task(s)
PID:432
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5eb6b96734" /P "Admin:N"&&CACLS "..\5eb6b96734" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3920
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"7⤵PID:4628
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E7⤵PID:4384
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4568
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:N"7⤵PID:4356
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:R" /E7⤵PID:2572
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:3580
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nDU47jA.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nDU47jA.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 13284⤵
- Program crash
PID:4036
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rmS25ny.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rmS25ny.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2132 -ip 21321⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:840
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
615KB
MD53c2e683a95e0a660b38e5d5526c29698
SHA18e72588a60ca79aa678fd9e8296f72ae0b21dab8
SHA256eecea9115f6521c8c6aeb490508e0addee8cb6da79174d3f3e8010b6f8c4b4ec
SHA512f57552c0c80ce3e1d5fda45c50e1d11cd77561190a6712e37db3836896dcee3060e8f748bd7c336af3a1bcaac99de56342de6f4976b43d016b45105443db0478
-
Filesize
615KB
MD53c2e683a95e0a660b38e5d5526c29698
SHA18e72588a60ca79aa678fd9e8296f72ae0b21dab8
SHA256eecea9115f6521c8c6aeb490508e0addee8cb6da79174d3f3e8010b6f8c4b4ec
SHA512f57552c0c80ce3e1d5fda45c50e1d11cd77561190a6712e37db3836896dcee3060e8f748bd7c336af3a1bcaac99de56342de6f4976b43d016b45105443db0478
-
Filesize
289KB
MD5f342f2a8fe360afdc2dc03c5d8ccc0c7
SHA1b574324d34bac92df9b656b64b25e59ac3e2e111
SHA256f10ded8a5ec704dd5bc919c2e992aa30c246b30d3e6109ab83fe7d801248f1ef
SHA512444ecb4f34553747e3581285cccb354f996e96cbb1dfc16534ad801e23ab9fba22bec06fab00cd4e96586899a93968405e4db9f064f3d9cff6d9b4ea6516479a
-
Filesize
289KB
MD5f342f2a8fe360afdc2dc03c5d8ccc0c7
SHA1b574324d34bac92df9b656b64b25e59ac3e2e111
SHA256f10ded8a5ec704dd5bc919c2e992aa30c246b30d3e6109ab83fe7d801248f1ef
SHA512444ecb4f34553747e3581285cccb354f996e96cbb1dfc16534ad801e23ab9fba22bec06fab00cd4e96586899a93968405e4db9f064f3d9cff6d9b4ea6516479a
-
Filesize
286KB
MD5b1142a6069ce6e5f9bb82ba97224f4fe
SHA16307b579eb6843cc14471a88806dbddfbd7f4f34
SHA2569ad118a32b91a685c981ede29e94b958fe071a361f2b12d5c8b19749ae1193ef
SHA512ebabecb83d2aead9de59f0f390b4d74a27e67916c75e31663447f1a78ee0510915630852f8d01f7bb113804aa98895bfe2e09b78ef9926a2c89892ba1ae95dd9
-
Filesize
286KB
MD5b1142a6069ce6e5f9bb82ba97224f4fe
SHA16307b579eb6843cc14471a88806dbddfbd7f4f34
SHA2569ad118a32b91a685c981ede29e94b958fe071a361f2b12d5c8b19749ae1193ef
SHA512ebabecb83d2aead9de59f0f390b4d74a27e67916c75e31663447f1a78ee0510915630852f8d01f7bb113804aa98895bfe2e09b78ef9926a2c89892ba1ae95dd9
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
89KB
MD59221a421a3e777eb7d4ce55e474bcc4a
SHA1c96d7bd7ccbf9352d50527bff472595b3dc5298e
SHA25610ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8
SHA51263ac172cb19c7c020676937cb35e853710d08e99e06e8cdcb410c37e0c9056af409a50fdec0c90a3c532edcf5e0f128fa1e2181063e1208d4fc4643b1b5736f3
-
Filesize
89KB
MD59221a421a3e777eb7d4ce55e474bcc4a
SHA1c96d7bd7ccbf9352d50527bff472595b3dc5298e
SHA25610ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8
SHA51263ac172cb19c7c020676937cb35e853710d08e99e06e8cdcb410c37e0c9056af409a50fdec0c90a3c532edcf5e0f128fa1e2181063e1208d4fc4643b1b5736f3