Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2023, 04:35
Static task
static1
Behavioral task
behavioral1
Sample
05df909abefe089fe0e4ea48bd0b3fa682acee77fd81bb23f369b1a5a2f6b1d7.exe
Resource
win10v2004-20221111-en
General
-
Target
05df909abefe089fe0e4ea48bd0b3fa682acee77fd81bb23f369b1a5a2f6b1d7.exe
-
Size
726KB
-
MD5
b8e0c115de12e9b987a96d3c0900a3ec
-
SHA1
cfa5b14a207e639c81941ec0e5639e13c727013b
-
SHA256
05df909abefe089fe0e4ea48bd0b3fa682acee77fd81bb23f369b1a5a2f6b1d7
-
SHA512
692876e25448dfb1ee849c74cb7a351d2f35601844158d339d436a9157ceab2dc46ed6f01e0f4cde104740bae101a6b1a000332e1adad90ac9da426122e9c6b5
-
SSDEEP
12288:5Mrwy907Ve31EUvV6vxWwaOm16a+oJj0vDUZJre5J0zAULDxos4zl/tAu7EgBy5C:lyIA3ZVixWw6MEj0vDUDrFSs4plPEgBp
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Extracted
amadey
3.66
62.204.41.5/Bu58Ngs/index.php
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation mSk10.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 8 IoCs
pid Process 380 sBt84LC.exe 432 sPK24qq.exe 4724 knM43iq.exe 2904 mSk10.exe 4456 mnolyk.exe 3876 noO66Ej.exe 732 mnolyk.exe 4092 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 2308 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sBt84LC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" sBt84LC.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sPK24qq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" sPK24qq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 05df909abefe089fe0e4ea48bd0b3fa682acee77fd81bb23f369b1a5a2f6b1d7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 05df909abefe089fe0e4ea48bd0b3fa682acee77fd81bb23f369b1a5a2f6b1d7.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3600 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4724 knM43iq.exe 4724 knM43iq.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4724 knM43iq.exe Token: SeDebugPrivilege 3876 noO66Ej.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 2112 wrote to memory of 380 2112 05df909abefe089fe0e4ea48bd0b3fa682acee77fd81bb23f369b1a5a2f6b1d7.exe 81 PID 2112 wrote to memory of 380 2112 05df909abefe089fe0e4ea48bd0b3fa682acee77fd81bb23f369b1a5a2f6b1d7.exe 81 PID 2112 wrote to memory of 380 2112 05df909abefe089fe0e4ea48bd0b3fa682acee77fd81bb23f369b1a5a2f6b1d7.exe 81 PID 380 wrote to memory of 432 380 sBt84LC.exe 82 PID 380 wrote to memory of 432 380 sBt84LC.exe 82 PID 380 wrote to memory of 432 380 sBt84LC.exe 82 PID 432 wrote to memory of 4724 432 sPK24qq.exe 83 PID 432 wrote to memory of 4724 432 sPK24qq.exe 83 PID 432 wrote to memory of 4724 432 sPK24qq.exe 83 PID 432 wrote to memory of 2904 432 sPK24qq.exe 88 PID 432 wrote to memory of 2904 432 sPK24qq.exe 88 PID 432 wrote to memory of 2904 432 sPK24qq.exe 88 PID 2904 wrote to memory of 4456 2904 mSk10.exe 89 PID 2904 wrote to memory of 4456 2904 mSk10.exe 89 PID 2904 wrote to memory of 4456 2904 mSk10.exe 89 PID 380 wrote to memory of 3876 380 sBt84LC.exe 90 PID 380 wrote to memory of 3876 380 sBt84LC.exe 90 PID 380 wrote to memory of 3876 380 sBt84LC.exe 90 PID 4456 wrote to memory of 3600 4456 mnolyk.exe 91 PID 4456 wrote to memory of 3600 4456 mnolyk.exe 91 PID 4456 wrote to memory of 3600 4456 mnolyk.exe 91 PID 4456 wrote to memory of 3740 4456 mnolyk.exe 93 PID 4456 wrote to memory of 3740 4456 mnolyk.exe 93 PID 4456 wrote to memory of 3740 4456 mnolyk.exe 93 PID 3740 wrote to memory of 2748 3740 cmd.exe 95 PID 3740 wrote to memory of 2748 3740 cmd.exe 95 PID 3740 wrote to memory of 2748 3740 cmd.exe 95 PID 3740 wrote to memory of 1088 3740 cmd.exe 96 PID 3740 wrote to memory of 1088 3740 cmd.exe 96 PID 3740 wrote to memory of 1088 3740 cmd.exe 96 PID 3740 wrote to memory of 4228 3740 cmd.exe 97 PID 3740 wrote to memory of 4228 3740 cmd.exe 97 PID 3740 wrote to memory of 4228 3740 cmd.exe 97 PID 3740 wrote to memory of 4396 3740 cmd.exe 98 PID 3740 wrote to memory of 4396 3740 cmd.exe 98 PID 3740 wrote to memory of 4396 3740 cmd.exe 98 PID 3740 wrote to memory of 4768 3740 cmd.exe 99 PID 3740 wrote to memory of 4768 3740 cmd.exe 99 PID 3740 wrote to memory of 4768 3740 cmd.exe 99 PID 3740 wrote to memory of 1824 3740 cmd.exe 100 PID 3740 wrote to memory of 1824 3740 cmd.exe 100 PID 3740 wrote to memory of 1824 3740 cmd.exe 100 PID 4456 wrote to memory of 2308 4456 mnolyk.exe 105 PID 4456 wrote to memory of 2308 4456 mnolyk.exe 105 PID 4456 wrote to memory of 2308 4456 mnolyk.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\05df909abefe089fe0e4ea48bd0b3fa682acee77fd81bb23f369b1a5a2f6b1d7.exe"C:\Users\Admin\AppData\Local\Temp\05df909abefe089fe0e4ea48bd0b3fa682acee77fd81bb23f369b1a5a2f6b1d7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sBt84LC.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sBt84LC.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sPK24qq.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sPK24qq.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\knM43iq.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\knM43iq.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4724
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mSk10.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mSk10.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe" /F6⤵
- Creates scheduled task(s)
PID:3600
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5eb6b96734" /P "Admin:N"&&CACLS "..\5eb6b96734" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2748
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"7⤵PID:1088
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E7⤵PID:4228
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4396
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:N"7⤵PID:4768
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:R" /E7⤵PID:1824
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:2308
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\noO66Ej.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\noO66Ej.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3876
-
-
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:732
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:4092
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
622KB
MD5a695fd7b27ea1a6ff2a230d9ba39dba4
SHA1e93137b370263f1c8c96b5e17ecfaed7bf4d125e
SHA256fdc047ca7586b7b5fe731c8048c720fadc04403701ebc9c11a176c0571e5d612
SHA512fabbd45f6aa0606969c18539ee7ad3b6a036b55cab825dec3fe4ac642cdde1bbd30f3af934663c2f46b4b5ed9a4b7bc65393b79ecc06ea03f4d79ea44f94b60e
-
Filesize
622KB
MD5a695fd7b27ea1a6ff2a230d9ba39dba4
SHA1e93137b370263f1c8c96b5e17ecfaed7bf4d125e
SHA256fdc047ca7586b7b5fe731c8048c720fadc04403701ebc9c11a176c0571e5d612
SHA512fabbd45f6aa0606969c18539ee7ad3b6a036b55cab825dec3fe4ac642cdde1bbd30f3af934663c2f46b4b5ed9a4b7bc65393b79ecc06ea03f4d79ea44f94b60e
-
Filesize
305KB
MD50c9076ec4095c5084780c931b13e72e7
SHA155b6e8bdc66a2eea0a733e94d6f30de4f46f8e42
SHA25659d5940bf01d2f15faae8ff641d5fced786e74ef03cb453d74a4d062e764db63
SHA5128cc2a68768ee3928c8fbec137a157f5cd48bc3ed0a07cebc6d425491ae7db62af20dac5d249e6a4754d09860c3aacf05f4d0067efdcf492fde0add557b32d99f
-
Filesize
305KB
MD50c9076ec4095c5084780c931b13e72e7
SHA155b6e8bdc66a2eea0a733e94d6f30de4f46f8e42
SHA25659d5940bf01d2f15faae8ff641d5fced786e74ef03cb453d74a4d062e764db63
SHA5128cc2a68768ee3928c8fbec137a157f5cd48bc3ed0a07cebc6d425491ae7db62af20dac5d249e6a4754d09860c3aacf05f4d0067efdcf492fde0add557b32d99f
-
Filesize
286KB
MD52fb318383f94d56d95d84465bea6fa55
SHA103b40072bfc7b080f577cc9f3f0e134d02030615
SHA25694f8d9159fb51b48992dfe3081931e6a8c29ddc06899cead4341d330b09bca07
SHA5121a15994f21dce4584171867dc30ea516683f4f7a61db95f2d1a85290c4f75ed442e2e457dcec256a5e0bfab16e30517792276e62d46d87f0a62a011175a2894d
-
Filesize
286KB
MD52fb318383f94d56d95d84465bea6fa55
SHA103b40072bfc7b080f577cc9f3f0e134d02030615
SHA25694f8d9159fb51b48992dfe3081931e6a8c29ddc06899cead4341d330b09bca07
SHA5121a15994f21dce4584171867dc30ea516683f4f7a61db95f2d1a85290c4f75ed442e2e457dcec256a5e0bfab16e30517792276e62d46d87f0a62a011175a2894d
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
89KB
MD59221a421a3e777eb7d4ce55e474bcc4a
SHA1c96d7bd7ccbf9352d50527bff472595b3dc5298e
SHA25610ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8
SHA51263ac172cb19c7c020676937cb35e853710d08e99e06e8cdcb410c37e0c9056af409a50fdec0c90a3c532edcf5e0f128fa1e2181063e1208d4fc4643b1b5736f3
-
Filesize
89KB
MD59221a421a3e777eb7d4ce55e474bcc4a
SHA1c96d7bd7ccbf9352d50527bff472595b3dc5298e
SHA25610ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8
SHA51263ac172cb19c7c020676937cb35e853710d08e99e06e8cdcb410c37e0c9056af409a50fdec0c90a3c532edcf5e0f128fa1e2181063e1208d4fc4643b1b5736f3