Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2023, 08:54
Static task
static1
Behavioral task
behavioral1
Sample
9cae5ae55d42bc7a61dda984026d98a44f69ac034f3e20b6a0130e1feba92c5f.exe
Resource
win10v2004-20220901-en
General
-
Target
9cae5ae55d42bc7a61dda984026d98a44f69ac034f3e20b6a0130e1feba92c5f.exe
-
Size
715KB
-
MD5
9a030e57d56897cf5a37c0836efe45d8
-
SHA1
627045a86b1946420c1c53b9597a39aa2e14b5be
-
SHA256
9cae5ae55d42bc7a61dda984026d98a44f69ac034f3e20b6a0130e1feba92c5f
-
SHA512
651ddf1a3aa764cecc363d5aa23c3d515c62af5cd5cae3915a4db040d76613f9fe6900a9e6a240f355e47e83278d770d1e1fb8de7f65951acaa0bb5940ad6613
-
SSDEEP
12288:FMrFy90LL8qM98vYNv99mGXsKXWIv9N+cvDjGJf1mnTi7Q+zd8icX/e:8ycL8p8QFYG1WIvecvDjSf6Ti7RGiWe
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Extracted
amadey
3.66
62.204.41.5/Bu58Ngs/index.php
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation mVV78.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 8 IoCs
pid Process 3128 sZx49Pz.exe 3448 sqh98ZR.exe 5112 kpz20oX.exe 4900 mVV78.exe 1108 mnolyk.exe 4460 npm98rB.exe 4732 mnolyk.exe 4420 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 4060 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sqh98ZR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" sqh98ZR.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9cae5ae55d42bc7a61dda984026d98a44f69ac034f3e20b6a0130e1feba92c5f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9cae5ae55d42bc7a61dda984026d98a44f69ac034f3e20b6a0130e1feba92c5f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sZx49Pz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" sZx49Pz.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5068 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5112 kpz20oX.exe 5112 kpz20oX.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5112 kpz20oX.exe Token: SeDebugPrivilege 4460 npm98rB.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 3440 wrote to memory of 3128 3440 9cae5ae55d42bc7a61dda984026d98a44f69ac034f3e20b6a0130e1feba92c5f.exe 81 PID 3440 wrote to memory of 3128 3440 9cae5ae55d42bc7a61dda984026d98a44f69ac034f3e20b6a0130e1feba92c5f.exe 81 PID 3440 wrote to memory of 3128 3440 9cae5ae55d42bc7a61dda984026d98a44f69ac034f3e20b6a0130e1feba92c5f.exe 81 PID 3128 wrote to memory of 3448 3128 sZx49Pz.exe 82 PID 3128 wrote to memory of 3448 3128 sZx49Pz.exe 82 PID 3128 wrote to memory of 3448 3128 sZx49Pz.exe 82 PID 3448 wrote to memory of 5112 3448 sqh98ZR.exe 83 PID 3448 wrote to memory of 5112 3448 sqh98ZR.exe 83 PID 3448 wrote to memory of 5112 3448 sqh98ZR.exe 83 PID 3448 wrote to memory of 4900 3448 sqh98ZR.exe 90 PID 3448 wrote to memory of 4900 3448 sqh98ZR.exe 90 PID 3448 wrote to memory of 4900 3448 sqh98ZR.exe 90 PID 4900 wrote to memory of 1108 4900 mVV78.exe 91 PID 4900 wrote to memory of 1108 4900 mVV78.exe 91 PID 4900 wrote to memory of 1108 4900 mVV78.exe 91 PID 3128 wrote to memory of 4460 3128 sZx49Pz.exe 92 PID 3128 wrote to memory of 4460 3128 sZx49Pz.exe 92 PID 3128 wrote to memory of 4460 3128 sZx49Pz.exe 92 PID 1108 wrote to memory of 5068 1108 mnolyk.exe 93 PID 1108 wrote to memory of 5068 1108 mnolyk.exe 93 PID 1108 wrote to memory of 5068 1108 mnolyk.exe 93 PID 1108 wrote to memory of 1232 1108 mnolyk.exe 95 PID 1108 wrote to memory of 1232 1108 mnolyk.exe 95 PID 1108 wrote to memory of 1232 1108 mnolyk.exe 95 PID 1232 wrote to memory of 2024 1232 cmd.exe 97 PID 1232 wrote to memory of 2024 1232 cmd.exe 97 PID 1232 wrote to memory of 2024 1232 cmd.exe 97 PID 1232 wrote to memory of 3108 1232 cmd.exe 98 PID 1232 wrote to memory of 3108 1232 cmd.exe 98 PID 1232 wrote to memory of 3108 1232 cmd.exe 98 PID 1232 wrote to memory of 980 1232 cmd.exe 99 PID 1232 wrote to memory of 980 1232 cmd.exe 99 PID 1232 wrote to memory of 980 1232 cmd.exe 99 PID 1232 wrote to memory of 3564 1232 cmd.exe 100 PID 1232 wrote to memory of 3564 1232 cmd.exe 100 PID 1232 wrote to memory of 3564 1232 cmd.exe 100 PID 1232 wrote to memory of 3772 1232 cmd.exe 101 PID 1232 wrote to memory of 3772 1232 cmd.exe 101 PID 1232 wrote to memory of 3772 1232 cmd.exe 101 PID 1232 wrote to memory of 4120 1232 cmd.exe 102 PID 1232 wrote to memory of 4120 1232 cmd.exe 102 PID 1232 wrote to memory of 4120 1232 cmd.exe 102 PID 1108 wrote to memory of 4060 1108 mnolyk.exe 105 PID 1108 wrote to memory of 4060 1108 mnolyk.exe 105 PID 1108 wrote to memory of 4060 1108 mnolyk.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\9cae5ae55d42bc7a61dda984026d98a44f69ac034f3e20b6a0130e1feba92c5f.exe"C:\Users\Admin\AppData\Local\Temp\9cae5ae55d42bc7a61dda984026d98a44f69ac034f3e20b6a0130e1feba92c5f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sZx49Pz.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sZx49Pz.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sqh98ZR.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sqh98ZR.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kpz20oX.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kpz20oX.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5112
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mVV78.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mVV78.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe" /F6⤵
- Creates scheduled task(s)
PID:5068
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5eb6b96734" /P "Admin:N"&&CACLS "..\5eb6b96734" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2024
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"7⤵PID:3108
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E7⤵PID:980
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3564
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:N"7⤵PID:3772
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:R" /E7⤵PID:4120
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:4060
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\npm98rB.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\npm98rB.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:4732
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:4420
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
611KB
MD550920e1200be9fb38a55ad604523f24f
SHA17f29c01d3db10f420706219382f05da5340d83c9
SHA2562fe55723e5d8cf461d4e4b58a80b51527aaa1349b1c2d907c05452db63cbd8df
SHA5120f183b976a381e4f73d651b7ea83ae35df9d7977b20feb9721b6222318e59e367d5b1a5c4433fb2d86d81206c1b2ab964f0b911f71db7fd00a0719b73283d6a0
-
Filesize
611KB
MD550920e1200be9fb38a55ad604523f24f
SHA17f29c01d3db10f420706219382f05da5340d83c9
SHA2562fe55723e5d8cf461d4e4b58a80b51527aaa1349b1c2d907c05452db63cbd8df
SHA5120f183b976a381e4f73d651b7ea83ae35df9d7977b20feb9721b6222318e59e367d5b1a5c4433fb2d86d81206c1b2ab964f0b911f71db7fd00a0719b73283d6a0
-
Filesize
279KB
MD562620b58e5ea5b8d240b73fec4203422
SHA1394220113df9b5af5d5dba10f8ae695d5e43e183
SHA256db45f6b42ded0701d23fa902e933c57a4d72667b5f5af023f8002564f62e482e
SHA512c12a878551f5fec683c6bb40dc8fcd736fcdbc87db7db8ae6d750b5efe22ca2aa08ee7a0172eb9eecfda77a95707ce05cfb3b6455b6aa846232c209e676ca188
-
Filesize
279KB
MD562620b58e5ea5b8d240b73fec4203422
SHA1394220113df9b5af5d5dba10f8ae695d5e43e183
SHA256db45f6b42ded0701d23fa902e933c57a4d72667b5f5af023f8002564f62e482e
SHA512c12a878551f5fec683c6bb40dc8fcd736fcdbc87db7db8ae6d750b5efe22ca2aa08ee7a0172eb9eecfda77a95707ce05cfb3b6455b6aa846232c209e676ca188
-
Filesize
286KB
MD54dee4e84648caddd2a6d51771b79d45a
SHA17a9c9731f657ca0f715ffa87b8890199d7b48129
SHA2561e9ac1e6c9aea118675c3abafd3fdbfee647e678101a9b7878c5f74bf0d2bffb
SHA512955d82249b1b0e83e4995a5fc3ee9050386f1235aa3fe15fe7999c8ce8c929098d8fe5785a37927c573ec9687335589f617725cc3dbaaf229edb638885810d28
-
Filesize
286KB
MD54dee4e84648caddd2a6d51771b79d45a
SHA17a9c9731f657ca0f715ffa87b8890199d7b48129
SHA2561e9ac1e6c9aea118675c3abafd3fdbfee647e678101a9b7878c5f74bf0d2bffb
SHA512955d82249b1b0e83e4995a5fc3ee9050386f1235aa3fe15fe7999c8ce8c929098d8fe5785a37927c573ec9687335589f617725cc3dbaaf229edb638885810d28
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
89KB
MD59221a421a3e777eb7d4ce55e474bcc4a
SHA1c96d7bd7ccbf9352d50527bff472595b3dc5298e
SHA25610ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8
SHA51263ac172cb19c7c020676937cb35e853710d08e99e06e8cdcb410c37e0c9056af409a50fdec0c90a3c532edcf5e0f128fa1e2181063e1208d4fc4643b1b5736f3
-
Filesize
89KB
MD59221a421a3e777eb7d4ce55e474bcc4a
SHA1c96d7bd7ccbf9352d50527bff472595b3dc5298e
SHA25610ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8
SHA51263ac172cb19c7c020676937cb35e853710d08e99e06e8cdcb410c37e0c9056af409a50fdec0c90a3c532edcf5e0f128fa1e2181063e1208d4fc4643b1b5736f3