Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2023, 01:45
Static task
static1
Behavioral task
behavioral1
Sample
afc75875bee82d5c43782b266681102da95a9c56da98c1f62d452a6517f244f8.exe
Resource
win10v2004-20221111-en
General
-
Target
afc75875bee82d5c43782b266681102da95a9c56da98c1f62d452a6517f244f8.exe
-
Size
725KB
-
MD5
a2109b2561d2bd75240dcd8241f45400
-
SHA1
f57fad36fec2a0918abad24143d28ad7ec0c12b8
-
SHA256
afc75875bee82d5c43782b266681102da95a9c56da98c1f62d452a6517f244f8
-
SHA512
7b30b55d2d1bf92eee40566eb9d112dd01d5041fa53bf7f8be11ded1c6619c917a6eabb58b0a00b32eb802829dd5d5781d93f336f437501ecb0301b21fda4ade
-
SSDEEP
12288:GMrMy90r/rYVbct6/gJf07VKlg+TvDrcJRpUWUZ4tGmikkkrY:yye+ct6oGVKlg+TvDrgRpUWUZ4ImuEY
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Extracted
amadey
3.66
62.204.41.5/Bu58Ngs/index.php
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation mab89.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 8 IoCs
pid Process 4308 sKb37fX.exe 664 sjn95qN.exe 2096 kXB96DP.exe 1540 mab89.exe 1756 mnolyk.exe 4744 nQy82JD.exe 2036 mnolyk.exe 4088 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 836 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" sKb37fX.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sjn95qN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" sjn95qN.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce afc75875bee82d5c43782b266681102da95a9c56da98c1f62d452a6517f244f8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" afc75875bee82d5c43782b266681102da95a9c56da98c1f62d452a6517f244f8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sKb37fX.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2008 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2096 kXB96DP.exe 2096 kXB96DP.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2096 kXB96DP.exe Token: SeDebugPrivilege 4744 nQy82JD.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 4160 wrote to memory of 4308 4160 afc75875bee82d5c43782b266681102da95a9c56da98c1f62d452a6517f244f8.exe 81 PID 4160 wrote to memory of 4308 4160 afc75875bee82d5c43782b266681102da95a9c56da98c1f62d452a6517f244f8.exe 81 PID 4160 wrote to memory of 4308 4160 afc75875bee82d5c43782b266681102da95a9c56da98c1f62d452a6517f244f8.exe 81 PID 4308 wrote to memory of 664 4308 sKb37fX.exe 82 PID 4308 wrote to memory of 664 4308 sKb37fX.exe 82 PID 4308 wrote to memory of 664 4308 sKb37fX.exe 82 PID 664 wrote to memory of 2096 664 sjn95qN.exe 83 PID 664 wrote to memory of 2096 664 sjn95qN.exe 83 PID 664 wrote to memory of 2096 664 sjn95qN.exe 83 PID 664 wrote to memory of 1540 664 sjn95qN.exe 84 PID 664 wrote to memory of 1540 664 sjn95qN.exe 84 PID 664 wrote to memory of 1540 664 sjn95qN.exe 84 PID 1540 wrote to memory of 1756 1540 mab89.exe 85 PID 1540 wrote to memory of 1756 1540 mab89.exe 85 PID 1540 wrote to memory of 1756 1540 mab89.exe 85 PID 4308 wrote to memory of 4744 4308 sKb37fX.exe 86 PID 4308 wrote to memory of 4744 4308 sKb37fX.exe 86 PID 4308 wrote to memory of 4744 4308 sKb37fX.exe 86 PID 1756 wrote to memory of 2008 1756 mnolyk.exe 87 PID 1756 wrote to memory of 2008 1756 mnolyk.exe 87 PID 1756 wrote to memory of 2008 1756 mnolyk.exe 87 PID 1756 wrote to memory of 612 1756 mnolyk.exe 89 PID 1756 wrote to memory of 612 1756 mnolyk.exe 89 PID 1756 wrote to memory of 612 1756 mnolyk.exe 89 PID 612 wrote to memory of 344 612 cmd.exe 91 PID 612 wrote to memory of 344 612 cmd.exe 91 PID 612 wrote to memory of 344 612 cmd.exe 91 PID 612 wrote to memory of 220 612 cmd.exe 92 PID 612 wrote to memory of 220 612 cmd.exe 92 PID 612 wrote to memory of 220 612 cmd.exe 92 PID 612 wrote to memory of 3868 612 cmd.exe 93 PID 612 wrote to memory of 3868 612 cmd.exe 93 PID 612 wrote to memory of 3868 612 cmd.exe 93 PID 612 wrote to memory of 424 612 cmd.exe 94 PID 612 wrote to memory of 424 612 cmd.exe 94 PID 612 wrote to memory of 424 612 cmd.exe 94 PID 612 wrote to memory of 4724 612 cmd.exe 95 PID 612 wrote to memory of 4724 612 cmd.exe 95 PID 612 wrote to memory of 4724 612 cmd.exe 95 PID 612 wrote to memory of 4532 612 cmd.exe 96 PID 612 wrote to memory of 4532 612 cmd.exe 96 PID 612 wrote to memory of 4532 612 cmd.exe 96 PID 1756 wrote to memory of 836 1756 mnolyk.exe 105 PID 1756 wrote to memory of 836 1756 mnolyk.exe 105 PID 1756 wrote to memory of 836 1756 mnolyk.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\afc75875bee82d5c43782b266681102da95a9c56da98c1f62d452a6517f244f8.exe"C:\Users\Admin\AppData\Local\Temp\afc75875bee82d5c43782b266681102da95a9c56da98c1f62d452a6517f244f8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sKb37fX.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sKb37fX.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sjn95qN.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sjn95qN.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kXB96DP.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kXB96DP.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2096
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mab89.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mab89.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe" /F6⤵
- Creates scheduled task(s)
PID:2008
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5eb6b96734" /P "Admin:N"&&CACLS "..\5eb6b96734" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:344
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"7⤵PID:220
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E7⤵PID:3868
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:424
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:N"7⤵PID:4724
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:R" /E7⤵PID:4532
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:836
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nQy82JD.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nQy82JD.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4744
-
-
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:2036
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:4088
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
621KB
MD5cd1ae1ad6bde559738e68ec080a81328
SHA11eb801b03dae6a2ee1869d5c55da70b8901e3cb5
SHA256511cece3dcda6f6006945b92f93af704e510685fc56daf44069ce138d538d5d2
SHA512b6d29d070d5b5cb81a4517cc2b880bc7bdcbd7d22487473805a4160b8103cd32e17d62f98776643a0207becffe25005fa9a71b28ef5275f0478e81aa58e4301a
-
Filesize
621KB
MD5cd1ae1ad6bde559738e68ec080a81328
SHA11eb801b03dae6a2ee1869d5c55da70b8901e3cb5
SHA256511cece3dcda6f6006945b92f93af704e510685fc56daf44069ce138d538d5d2
SHA512b6d29d070d5b5cb81a4517cc2b880bc7bdcbd7d22487473805a4160b8103cd32e17d62f98776643a0207becffe25005fa9a71b28ef5275f0478e81aa58e4301a
-
Filesize
305KB
MD5887a923444630d617f74a05594a07c5d
SHA1a7c221c67e0e75bdc9b23978dbb6348a9c92880c
SHA256fc5f71914bda330771cfe5a9c86783fb395dfc53dc31fc3a5bbbac9386e6a492
SHA5127c2efce103af79fc570d9f53b3a3b79f1488fafe1c73661600a5564faba52d0d9ab8a6499092b62c09862022b060511e1511ab6887e24dd3fad587282559adb5
-
Filesize
305KB
MD5887a923444630d617f74a05594a07c5d
SHA1a7c221c67e0e75bdc9b23978dbb6348a9c92880c
SHA256fc5f71914bda330771cfe5a9c86783fb395dfc53dc31fc3a5bbbac9386e6a492
SHA5127c2efce103af79fc570d9f53b3a3b79f1488fafe1c73661600a5564faba52d0d9ab8a6499092b62c09862022b060511e1511ab6887e24dd3fad587282559adb5
-
Filesize
286KB
MD55706a3ebd0c5b19cf393dfdd065e7bc3
SHA1007c45d996388bc88e70a29253616458f226162a
SHA256040b470ab1ff4c316636b779afed569892f00faa6606def47fc5f4d556ea9851
SHA51267aecd4fe87e71c158a1147d9fbd628a00738e596b179a77bbf962f1320bc9b48654c115188393e04e7e227cd0ec7bfa33b76babba1fdf25009f88497707e242
-
Filesize
286KB
MD55706a3ebd0c5b19cf393dfdd065e7bc3
SHA1007c45d996388bc88e70a29253616458f226162a
SHA256040b470ab1ff4c316636b779afed569892f00faa6606def47fc5f4d556ea9851
SHA51267aecd4fe87e71c158a1147d9fbd628a00738e596b179a77bbf962f1320bc9b48654c115188393e04e7e227cd0ec7bfa33b76babba1fdf25009f88497707e242
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
89KB
MD59221a421a3e777eb7d4ce55e474bcc4a
SHA1c96d7bd7ccbf9352d50527bff472595b3dc5298e
SHA25610ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8
SHA51263ac172cb19c7c020676937cb35e853710d08e99e06e8cdcb410c37e0c9056af409a50fdec0c90a3c532edcf5e0f128fa1e2181063e1208d4fc4643b1b5736f3
-
Filesize
89KB
MD59221a421a3e777eb7d4ce55e474bcc4a
SHA1c96d7bd7ccbf9352d50527bff472595b3dc5298e
SHA25610ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8
SHA51263ac172cb19c7c020676937cb35e853710d08e99e06e8cdcb410c37e0c9056af409a50fdec0c90a3c532edcf5e0f128fa1e2181063e1208d4fc4643b1b5736f3