Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2023, 19:09
Static task
static1
Behavioral task
behavioral1
Sample
74b6959aa6878a932e18c4120ea4f1e18a81521b447013fa9b1f39919e4b1c18.exe
Resource
win10v2004-20220812-en
General
-
Target
74b6959aa6878a932e18c4120ea4f1e18a81521b447013fa9b1f39919e4b1c18.exe
-
Size
717KB
-
MD5
e53e65ed0b3d0f36e8e75ceec6b55a2e
-
SHA1
97c3dd8a2aba29da354114de8f3905b2926e6c7d
-
SHA256
74b6959aa6878a932e18c4120ea4f1e18a81521b447013fa9b1f39919e4b1c18
-
SHA512
21bb622013ebc8071572611ad0d62931a7653f563bf925994b7cf8bdb346c1c85960b0652f07bc35884f828f3a27ca2ec419202651fbbaebed7252e62867925d
-
SSDEEP
12288:gMrNy90ZsK85Br+07eWX6YTfYm6oRPgBSmj88fvKIPMmHnX60s5DlbfVqnXzOeO:9yPlT+e6Qwm6oRPgY688fvKI0m3pyDlp
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
amadey
3.66
62.204.41.5/Bu58Ngs/index.php
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation mJf32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 6 IoCs
pid Process 2268 sLn67uw.exe 4468 sRF51JF.exe 3924 kOW16vZ.exe 1132 mJf32.exe 4624 mnolyk.exe 408 nGk62Su.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 74b6959aa6878a932e18c4120ea4f1e18a81521b447013fa9b1f39919e4b1c18.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 74b6959aa6878a932e18c4120ea4f1e18a81521b447013fa9b1f39919e4b1c18.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sLn67uw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" sLn67uw.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sRF51JF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" sRF51JF.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2288 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3924 kOW16vZ.exe 3924 kOW16vZ.exe 408 nGk62Su.exe 408 nGk62Su.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3924 kOW16vZ.exe Token: SeDebugPrivilege 408 nGk62Su.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1388 wrote to memory of 2268 1388 74b6959aa6878a932e18c4120ea4f1e18a81521b447013fa9b1f39919e4b1c18.exe 81 PID 1388 wrote to memory of 2268 1388 74b6959aa6878a932e18c4120ea4f1e18a81521b447013fa9b1f39919e4b1c18.exe 81 PID 1388 wrote to memory of 2268 1388 74b6959aa6878a932e18c4120ea4f1e18a81521b447013fa9b1f39919e4b1c18.exe 81 PID 2268 wrote to memory of 4468 2268 sLn67uw.exe 82 PID 2268 wrote to memory of 4468 2268 sLn67uw.exe 82 PID 2268 wrote to memory of 4468 2268 sLn67uw.exe 82 PID 4468 wrote to memory of 3924 4468 sRF51JF.exe 83 PID 4468 wrote to memory of 3924 4468 sRF51JF.exe 83 PID 4468 wrote to memory of 3924 4468 sRF51JF.exe 83 PID 4468 wrote to memory of 1132 4468 sRF51JF.exe 86 PID 4468 wrote to memory of 1132 4468 sRF51JF.exe 86 PID 4468 wrote to memory of 1132 4468 sRF51JF.exe 86 PID 1132 wrote to memory of 4624 1132 mJf32.exe 87 PID 1132 wrote to memory of 4624 1132 mJf32.exe 87 PID 1132 wrote to memory of 4624 1132 mJf32.exe 87 PID 2268 wrote to memory of 408 2268 sLn67uw.exe 88 PID 2268 wrote to memory of 408 2268 sLn67uw.exe 88 PID 2268 wrote to memory of 408 2268 sLn67uw.exe 88 PID 4624 wrote to memory of 2288 4624 mnolyk.exe 89 PID 4624 wrote to memory of 2288 4624 mnolyk.exe 89 PID 4624 wrote to memory of 2288 4624 mnolyk.exe 89 PID 4624 wrote to memory of 1600 4624 mnolyk.exe 91 PID 4624 wrote to memory of 1600 4624 mnolyk.exe 91 PID 4624 wrote to memory of 1600 4624 mnolyk.exe 91 PID 1600 wrote to memory of 936 1600 cmd.exe 93 PID 1600 wrote to memory of 936 1600 cmd.exe 93 PID 1600 wrote to memory of 936 1600 cmd.exe 93 PID 1600 wrote to memory of 2832 1600 cmd.exe 94 PID 1600 wrote to memory of 2832 1600 cmd.exe 94 PID 1600 wrote to memory of 2832 1600 cmd.exe 94 PID 1600 wrote to memory of 1988 1600 cmd.exe 95 PID 1600 wrote to memory of 1988 1600 cmd.exe 95 PID 1600 wrote to memory of 1988 1600 cmd.exe 95 PID 1600 wrote to memory of 4936 1600 cmd.exe 96 PID 1600 wrote to memory of 4936 1600 cmd.exe 96 PID 1600 wrote to memory of 4936 1600 cmd.exe 96 PID 1600 wrote to memory of 1244 1600 cmd.exe 97 PID 1600 wrote to memory of 1244 1600 cmd.exe 97 PID 1600 wrote to memory of 1244 1600 cmd.exe 97 PID 1600 wrote to memory of 1648 1600 cmd.exe 98 PID 1600 wrote to memory of 1648 1600 cmd.exe 98 PID 1600 wrote to memory of 1648 1600 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\74b6959aa6878a932e18c4120ea4f1e18a81521b447013fa9b1f39919e4b1c18.exe"C:\Users\Admin\AppData\Local\Temp\74b6959aa6878a932e18c4120ea4f1e18a81521b447013fa9b1f39919e4b1c18.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sLn67uw.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sLn67uw.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sRF51JF.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sRF51JF.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kOW16vZ.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kOW16vZ.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3924
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mJf32.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mJf32.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe" /F6⤵
- Creates scheduled task(s)
PID:2288
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5eb6b96734" /P "Admin:N"&&CACLS "..\5eb6b96734" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:936
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"7⤵PID:2832
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E7⤵PID:1988
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4936
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:N"7⤵PID:1244
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:R" /E7⤵PID:1648
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nGk62Su.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nGk62Su.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:408
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 408 -ip 4081⤵PID:3984
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
613KB
MD5cb72a439cd4a29455dd5eb64b2791a3a
SHA1ded651d8f33118103693e511c070f4d323621855
SHA256d66861a89fdc5ee2ff15124c3621cf2ead4f1df40df247c446bc3b96546ae86d
SHA51236a80917ddd5e4d7b8e2a698473b343aa71a27d6d1b6a1bbabf95654e0854a784e6105628d695d6e3da4150526cdacc8f2e83a64cfca07b334e05d9fabe2bf9c
-
Filesize
613KB
MD5cb72a439cd4a29455dd5eb64b2791a3a
SHA1ded651d8f33118103693e511c070f4d323621855
SHA256d66861a89fdc5ee2ff15124c3621cf2ead4f1df40df247c446bc3b96546ae86d
SHA51236a80917ddd5e4d7b8e2a698473b343aa71a27d6d1b6a1bbabf95654e0854a784e6105628d695d6e3da4150526cdacc8f2e83a64cfca07b334e05d9fabe2bf9c
-
Filesize
285KB
MD5fedf16f09251d8609500419e3c262080
SHA1ed407237b4a6f6b7145ccd97d4e830bf56b34438
SHA256b376ab7ab350cf1e8af37e54f7184c1e2c28599ef594c76d6e87e996a67e620c
SHA512158d7bdd79a609c7b3332fe5a913fb0c5f84947d3cd05b152a2aca368c6d06372e45a5d9b39789741c2ddbb70e1975cff5ad9641ebb63e028f5ad0433fcce1fc
-
Filesize
285KB
MD5fedf16f09251d8609500419e3c262080
SHA1ed407237b4a6f6b7145ccd97d4e830bf56b34438
SHA256b376ab7ab350cf1e8af37e54f7184c1e2c28599ef594c76d6e87e996a67e620c
SHA512158d7bdd79a609c7b3332fe5a913fb0c5f84947d3cd05b152a2aca368c6d06372e45a5d9b39789741c2ddbb70e1975cff5ad9641ebb63e028f5ad0433fcce1fc
-
Filesize
286KB
MD5282a86708622d4bd741ec50b55c97bad
SHA189be17c7bad3867298ace76997baef6ca91dc626
SHA2569df4d3c75bb27ca09b57d507becfe2da3779ecc96af5ac1e3b007d658fa7d500
SHA5124f6ed2e694544dc8112e686d795935f4b37a05b189ba4a65c36445df706c26de83be7337720cd810aa86f1301ba6cf727f76cae372fd886498437b22e0f582ba
-
Filesize
286KB
MD5282a86708622d4bd741ec50b55c97bad
SHA189be17c7bad3867298ace76997baef6ca91dc626
SHA2569df4d3c75bb27ca09b57d507becfe2da3779ecc96af5ac1e3b007d658fa7d500
SHA5124f6ed2e694544dc8112e686d795935f4b37a05b189ba4a65c36445df706c26de83be7337720cd810aa86f1301ba6cf727f76cae372fd886498437b22e0f582ba
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd