Analysis
-
max time kernel
135s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2023, 03:28
Static task
static1
Behavioral task
behavioral1
Sample
8f5be7118a31e78c16a95ff80698d2935b429602bb1d11eb0adc98d398ecd8ed.exe
Resource
win10v2004-20220812-en
General
-
Target
8f5be7118a31e78c16a95ff80698d2935b429602bb1d11eb0adc98d398ecd8ed.exe
-
Size
725KB
-
MD5
7572a6779ef07749c061901d1833ddc3
-
SHA1
31eddfb9d6ae3aad39b178b91519d59b88b42524
-
SHA256
8f5be7118a31e78c16a95ff80698d2935b429602bb1d11eb0adc98d398ecd8ed
-
SHA512
eb0b1b510840c70c215e99cd8d0d470cf956651ee7d1448c662adc451232a67bc47011bce148014f9e9a9995ef3870fb2af075208f70a8ad0b76ed9d77532b1d
-
SSDEEP
12288:2Mrfy90cLSDhCNHXyrWL98lvpjK4SwvDuOJOrOWG4zU/tAueTgtUwv7czH:hyHLSDhC5CrWBMK4SwvDuqmE4IlKTgtk
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Extracted
amadey
3.66
62.204.41.5/Bu58Ngs/index.php
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation mJS66.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 8 IoCs
pid Process 2520 sMp01Gw.exe 680 sIO09wn.exe 1236 kqO15bD.exe 3884 mJS66.exe 3992 mnolyk.exe 4780 nGS70qO.exe 1140 mnolyk.exe 1700 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 4676 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sMp01Gw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" sMp01Gw.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sIO09wn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" sIO09wn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8f5be7118a31e78c16a95ff80698d2935b429602bb1d11eb0adc98d398ecd8ed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8f5be7118a31e78c16a95ff80698d2935b429602bb1d11eb0adc98d398ecd8ed.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4520 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1236 kqO15bD.exe 1236 kqO15bD.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1236 kqO15bD.exe Token: SeDebugPrivilege 4780 nGS70qO.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 4740 wrote to memory of 2520 4740 8f5be7118a31e78c16a95ff80698d2935b429602bb1d11eb0adc98d398ecd8ed.exe 81 PID 4740 wrote to memory of 2520 4740 8f5be7118a31e78c16a95ff80698d2935b429602bb1d11eb0adc98d398ecd8ed.exe 81 PID 4740 wrote to memory of 2520 4740 8f5be7118a31e78c16a95ff80698d2935b429602bb1d11eb0adc98d398ecd8ed.exe 81 PID 2520 wrote to memory of 680 2520 sMp01Gw.exe 82 PID 2520 wrote to memory of 680 2520 sMp01Gw.exe 82 PID 2520 wrote to memory of 680 2520 sMp01Gw.exe 82 PID 680 wrote to memory of 1236 680 sIO09wn.exe 83 PID 680 wrote to memory of 1236 680 sIO09wn.exe 83 PID 680 wrote to memory of 1236 680 sIO09wn.exe 83 PID 680 wrote to memory of 3884 680 sIO09wn.exe 89 PID 680 wrote to memory of 3884 680 sIO09wn.exe 89 PID 680 wrote to memory of 3884 680 sIO09wn.exe 89 PID 3884 wrote to memory of 3992 3884 mJS66.exe 91 PID 3884 wrote to memory of 3992 3884 mJS66.exe 91 PID 3884 wrote to memory of 3992 3884 mJS66.exe 91 PID 2520 wrote to memory of 4780 2520 sMp01Gw.exe 92 PID 2520 wrote to memory of 4780 2520 sMp01Gw.exe 92 PID 2520 wrote to memory of 4780 2520 sMp01Gw.exe 92 PID 3992 wrote to memory of 4520 3992 mnolyk.exe 93 PID 3992 wrote to memory of 4520 3992 mnolyk.exe 93 PID 3992 wrote to memory of 4520 3992 mnolyk.exe 93 PID 3992 wrote to memory of 2372 3992 mnolyk.exe 95 PID 3992 wrote to memory of 2372 3992 mnolyk.exe 95 PID 3992 wrote to memory of 2372 3992 mnolyk.exe 95 PID 2372 wrote to memory of 3976 2372 cmd.exe 97 PID 2372 wrote to memory of 3976 2372 cmd.exe 97 PID 2372 wrote to memory of 3976 2372 cmd.exe 97 PID 2372 wrote to memory of 2656 2372 cmd.exe 98 PID 2372 wrote to memory of 2656 2372 cmd.exe 98 PID 2372 wrote to memory of 2656 2372 cmd.exe 98 PID 2372 wrote to memory of 4000 2372 cmd.exe 99 PID 2372 wrote to memory of 4000 2372 cmd.exe 99 PID 2372 wrote to memory of 4000 2372 cmd.exe 99 PID 2372 wrote to memory of 2064 2372 cmd.exe 100 PID 2372 wrote to memory of 2064 2372 cmd.exe 100 PID 2372 wrote to memory of 2064 2372 cmd.exe 100 PID 2372 wrote to memory of 1536 2372 cmd.exe 101 PID 2372 wrote to memory of 1536 2372 cmd.exe 101 PID 2372 wrote to memory of 1536 2372 cmd.exe 101 PID 2372 wrote to memory of 2444 2372 cmd.exe 102 PID 2372 wrote to memory of 2444 2372 cmd.exe 102 PID 2372 wrote to memory of 2444 2372 cmd.exe 102 PID 3992 wrote to memory of 4676 3992 mnolyk.exe 105 PID 3992 wrote to memory of 4676 3992 mnolyk.exe 105 PID 3992 wrote to memory of 4676 3992 mnolyk.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f5be7118a31e78c16a95ff80698d2935b429602bb1d11eb0adc98d398ecd8ed.exe"C:\Users\Admin\AppData\Local\Temp\8f5be7118a31e78c16a95ff80698d2935b429602bb1d11eb0adc98d398ecd8ed.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sMp01Gw.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sMp01Gw.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sIO09wn.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sIO09wn.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kqO15bD.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kqO15bD.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1236
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mJS66.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mJS66.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe" /F6⤵
- Creates scheduled task(s)
PID:4520
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5eb6b96734" /P "Admin:N"&&CACLS "..\5eb6b96734" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3976
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"7⤵PID:2656
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E7⤵PID:4000
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2064
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:N"7⤵PID:1536
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:R" /E7⤵PID:2444
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:4676
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nGS70qO.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nGS70qO.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4780
-
-
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:1140
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:1700
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
622KB
MD5e217ea306eed0679652308b7dc48d2c8
SHA1509f073138c6f5b2ef40cecbed1211797611fe98
SHA256bcbeb009a31d308b2367bf7ba2564b3a790c73bc1f6958fb52f0b2ccd2ff33ec
SHA51229b344292e872bfe831210bfb59cd069cc8e6b0590a52d195179af35f0d37bb17c08f8aec0173f8b729a84dcac409f57e0a92b912ee9832177744baf64e923dd
-
Filesize
622KB
MD5e217ea306eed0679652308b7dc48d2c8
SHA1509f073138c6f5b2ef40cecbed1211797611fe98
SHA256bcbeb009a31d308b2367bf7ba2564b3a790c73bc1f6958fb52f0b2ccd2ff33ec
SHA51229b344292e872bfe831210bfb59cd069cc8e6b0590a52d195179af35f0d37bb17c08f8aec0173f8b729a84dcac409f57e0a92b912ee9832177744baf64e923dd
-
Filesize
305KB
MD50c9076ec4095c5084780c931b13e72e7
SHA155b6e8bdc66a2eea0a733e94d6f30de4f46f8e42
SHA25659d5940bf01d2f15faae8ff641d5fced786e74ef03cb453d74a4d062e764db63
SHA5128cc2a68768ee3928c8fbec137a157f5cd48bc3ed0a07cebc6d425491ae7db62af20dac5d249e6a4754d09860c3aacf05f4d0067efdcf492fde0add557b32d99f
-
Filesize
305KB
MD50c9076ec4095c5084780c931b13e72e7
SHA155b6e8bdc66a2eea0a733e94d6f30de4f46f8e42
SHA25659d5940bf01d2f15faae8ff641d5fced786e74ef03cb453d74a4d062e764db63
SHA5128cc2a68768ee3928c8fbec137a157f5cd48bc3ed0a07cebc6d425491ae7db62af20dac5d249e6a4754d09860c3aacf05f4d0067efdcf492fde0add557b32d99f
-
Filesize
286KB
MD548b04a437ac09eee328a1da42711ff64
SHA173e9a978a7f151668216370e007687263ceffc30
SHA256c8fd8209d64665eea0b469883b64dd31a6668902862936dd311d026f204f14d1
SHA5122bf53a91f92b227cb4280363c3c1fe7d0ab9b106f67ef0f9b33137003e6ba88d451553bc26678065f2b928edd88a505d8d346e95c9e112fe9ef3e7b9a6d7b091
-
Filesize
286KB
MD548b04a437ac09eee328a1da42711ff64
SHA173e9a978a7f151668216370e007687263ceffc30
SHA256c8fd8209d64665eea0b469883b64dd31a6668902862936dd311d026f204f14d1
SHA5122bf53a91f92b227cb4280363c3c1fe7d0ab9b106f67ef0f9b33137003e6ba88d451553bc26678065f2b928edd88a505d8d346e95c9e112fe9ef3e7b9a6d7b091
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
89KB
MD59221a421a3e777eb7d4ce55e474bcc4a
SHA1c96d7bd7ccbf9352d50527bff472595b3dc5298e
SHA25610ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8
SHA51263ac172cb19c7c020676937cb35e853710d08e99e06e8cdcb410c37e0c9056af409a50fdec0c90a3c532edcf5e0f128fa1e2181063e1208d4fc4643b1b5736f3
-
Filesize
89KB
MD59221a421a3e777eb7d4ce55e474bcc4a
SHA1c96d7bd7ccbf9352d50527bff472595b3dc5298e
SHA25610ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8
SHA51263ac172cb19c7c020676937cb35e853710d08e99e06e8cdcb410c37e0c9056af409a50fdec0c90a3c532edcf5e0f128fa1e2181063e1208d4fc4643b1b5736f3