Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2023, 05:00
Static task
static1
Behavioral task
behavioral1
Sample
f39607a881931b95a07013faf1a77b6cdfea352c6a0ca744f5e6ba402b58446e.exe
Resource
win10v2004-20220812-en
General
-
Target
f39607a881931b95a07013faf1a77b6cdfea352c6a0ca744f5e6ba402b58446e.exe
-
Size
725KB
-
MD5
58242ae186e30a96411a36bef45c92bd
-
SHA1
e7f7c6b1ca8824473525e6dd211a9add742e9a56
-
SHA256
f39607a881931b95a07013faf1a77b6cdfea352c6a0ca744f5e6ba402b58446e
-
SHA512
ef82b0cc56a3d313cc2df82e59b11947ea8f556271b2978daefd1bae71601d65e2fa44ba09b5bf47d0e80df059c0a74f8c6cb56a4d6f1c18a66640398b786415
-
SSDEEP
12288:IMr8y902uIuVBf4EEfvKW+VwUJLXPnEMIvDO8JI8iz/urlD8dhZjXUidoTp:0ysIuVR4Hfv6Vwqz/IvDOAI8TD8DNUiM
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Extracted
amadey
3.66
62.204.41.5/Bu58Ngs/index.php
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation mjo50.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 8 IoCs
pid Process 536 sDp59si.exe 5024 sHS22DH.exe 1436 kFm53pU.exe 4988 mjo50.exe 2208 mnolyk.exe 3152 nxS00sJ.exe 4600 mnolyk.exe 4844 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 828 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f39607a881931b95a07013faf1a77b6cdfea352c6a0ca744f5e6ba402b58446e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f39607a881931b95a07013faf1a77b6cdfea352c6a0ca744f5e6ba402b58446e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sDp59si.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" sDp59si.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sHS22DH.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" sHS22DH.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2016 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1436 kFm53pU.exe 1436 kFm53pU.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1436 kFm53pU.exe Token: SeDebugPrivilege 3152 nxS00sJ.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 4992 wrote to memory of 536 4992 f39607a881931b95a07013faf1a77b6cdfea352c6a0ca744f5e6ba402b58446e.exe 80 PID 4992 wrote to memory of 536 4992 f39607a881931b95a07013faf1a77b6cdfea352c6a0ca744f5e6ba402b58446e.exe 80 PID 4992 wrote to memory of 536 4992 f39607a881931b95a07013faf1a77b6cdfea352c6a0ca744f5e6ba402b58446e.exe 80 PID 536 wrote to memory of 5024 536 sDp59si.exe 81 PID 536 wrote to memory of 5024 536 sDp59si.exe 81 PID 536 wrote to memory of 5024 536 sDp59si.exe 81 PID 5024 wrote to memory of 1436 5024 sHS22DH.exe 82 PID 5024 wrote to memory of 1436 5024 sHS22DH.exe 82 PID 5024 wrote to memory of 1436 5024 sHS22DH.exe 82 PID 5024 wrote to memory of 4988 5024 sHS22DH.exe 83 PID 5024 wrote to memory of 4988 5024 sHS22DH.exe 83 PID 5024 wrote to memory of 4988 5024 sHS22DH.exe 83 PID 4988 wrote to memory of 2208 4988 mjo50.exe 84 PID 4988 wrote to memory of 2208 4988 mjo50.exe 84 PID 4988 wrote to memory of 2208 4988 mjo50.exe 84 PID 536 wrote to memory of 3152 536 sDp59si.exe 85 PID 536 wrote to memory of 3152 536 sDp59si.exe 85 PID 536 wrote to memory of 3152 536 sDp59si.exe 85 PID 2208 wrote to memory of 2016 2208 mnolyk.exe 86 PID 2208 wrote to memory of 2016 2208 mnolyk.exe 86 PID 2208 wrote to memory of 2016 2208 mnolyk.exe 86 PID 2208 wrote to memory of 4312 2208 mnolyk.exe 88 PID 2208 wrote to memory of 4312 2208 mnolyk.exe 88 PID 2208 wrote to memory of 4312 2208 mnolyk.exe 88 PID 4312 wrote to memory of 3316 4312 cmd.exe 90 PID 4312 wrote to memory of 3316 4312 cmd.exe 90 PID 4312 wrote to memory of 3316 4312 cmd.exe 90 PID 4312 wrote to memory of 4244 4312 cmd.exe 91 PID 4312 wrote to memory of 4244 4312 cmd.exe 91 PID 4312 wrote to memory of 4244 4312 cmd.exe 91 PID 4312 wrote to memory of 3000 4312 cmd.exe 92 PID 4312 wrote to memory of 3000 4312 cmd.exe 92 PID 4312 wrote to memory of 3000 4312 cmd.exe 92 PID 4312 wrote to memory of 4940 4312 cmd.exe 93 PID 4312 wrote to memory of 4940 4312 cmd.exe 93 PID 4312 wrote to memory of 4940 4312 cmd.exe 93 PID 4312 wrote to memory of 3096 4312 cmd.exe 94 PID 4312 wrote to memory of 3096 4312 cmd.exe 94 PID 4312 wrote to memory of 3096 4312 cmd.exe 94 PID 4312 wrote to memory of 4576 4312 cmd.exe 95 PID 4312 wrote to memory of 4576 4312 cmd.exe 95 PID 4312 wrote to memory of 4576 4312 cmd.exe 95 PID 2208 wrote to memory of 828 2208 mnolyk.exe 103 PID 2208 wrote to memory of 828 2208 mnolyk.exe 103 PID 2208 wrote to memory of 828 2208 mnolyk.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\f39607a881931b95a07013faf1a77b6cdfea352c6a0ca744f5e6ba402b58446e.exe"C:\Users\Admin\AppData\Local\Temp\f39607a881931b95a07013faf1a77b6cdfea352c6a0ca744f5e6ba402b58446e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sDp59si.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sDp59si.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sHS22DH.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sHS22DH.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kFm53pU.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kFm53pU.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1436
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mjo50.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mjo50.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe" /F6⤵
- Creates scheduled task(s)
PID:2016
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5eb6b96734" /P "Admin:N"&&CACLS "..\5eb6b96734" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3316
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"7⤵PID:4244
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E7⤵PID:3000
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4940
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:N"7⤵PID:3096
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:R" /E7⤵PID:4576
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:828
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nxS00sJ.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nxS00sJ.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3152
-
-
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:4600
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:4844
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
621KB
MD5d29051db768bdb0fc7099837f956ae82
SHA1c3da293307eeb016f397020a56063f66051d5b11
SHA2563ce26aa032fe6e8121dd076a2b7cd74412564b1f925917324172938e04cec016
SHA51235e629e03703e5976e3d2b77c31a42c37e3f2cc84557197fe49374f00ec8fc4849d9366fb012e724d4508f69cda40b2dbdbc5a253db2fb2335e34dd7f9d2d76a
-
Filesize
621KB
MD5d29051db768bdb0fc7099837f956ae82
SHA1c3da293307eeb016f397020a56063f66051d5b11
SHA2563ce26aa032fe6e8121dd076a2b7cd74412564b1f925917324172938e04cec016
SHA51235e629e03703e5976e3d2b77c31a42c37e3f2cc84557197fe49374f00ec8fc4849d9366fb012e724d4508f69cda40b2dbdbc5a253db2fb2335e34dd7f9d2d76a
-
Filesize
305KB
MD5916194217be3cc6303da8937cef905f1
SHA13dd48e2c403f082f6aebf1e3187df0277acbbd33
SHA25671d06269b84f0fd810add7dcd9490642e6792279b33c9c0cd3b94943eb0a4ddb
SHA512e5bccd398d2997950fac1eb3b003796333b689ac951c856c0820f26fbdf194ca58759f3ae3623b30e3251149d479f95657fd88479925d8a04973fc442e7cd836
-
Filesize
305KB
MD5916194217be3cc6303da8937cef905f1
SHA13dd48e2c403f082f6aebf1e3187df0277acbbd33
SHA25671d06269b84f0fd810add7dcd9490642e6792279b33c9c0cd3b94943eb0a4ddb
SHA512e5bccd398d2997950fac1eb3b003796333b689ac951c856c0820f26fbdf194ca58759f3ae3623b30e3251149d479f95657fd88479925d8a04973fc442e7cd836
-
Filesize
286KB
MD540a51ddf2f4d0e67146a46cff44b29a0
SHA1913ddaf73c97da779e0bfe7b2ba2f84639a0baa4
SHA2561af83eb125a88e4866dde58895565aaec47936e7acd39e8a7fa08332a5c1f0bc
SHA51243037067557d0db3e75235db3eb6eb0c60591a490a8cd368a8df545050f38c73ea1f55713de67486ce33d147e67b94dbe1479e82b9af5974c45a084ffe8f5d3b
-
Filesize
286KB
MD540a51ddf2f4d0e67146a46cff44b29a0
SHA1913ddaf73c97da779e0bfe7b2ba2f84639a0baa4
SHA2561af83eb125a88e4866dde58895565aaec47936e7acd39e8a7fa08332a5c1f0bc
SHA51243037067557d0db3e75235db3eb6eb0c60591a490a8cd368a8df545050f38c73ea1f55713de67486ce33d147e67b94dbe1479e82b9af5974c45a084ffe8f5d3b
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
89KB
MD59221a421a3e777eb7d4ce55e474bcc4a
SHA1c96d7bd7ccbf9352d50527bff472595b3dc5298e
SHA25610ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8
SHA51263ac172cb19c7c020676937cb35e853710d08e99e06e8cdcb410c37e0c9056af409a50fdec0c90a3c532edcf5e0f128fa1e2181063e1208d4fc4643b1b5736f3
-
Filesize
89KB
MD59221a421a3e777eb7d4ce55e474bcc4a
SHA1c96d7bd7ccbf9352d50527bff472595b3dc5298e
SHA25610ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8
SHA51263ac172cb19c7c020676937cb35e853710d08e99e06e8cdcb410c37e0c9056af409a50fdec0c90a3c532edcf5e0f128fa1e2181063e1208d4fc4643b1b5736f3