Analysis
-
max time kernel
135s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
14/02/2023, 09:25
Static task
static1
Behavioral task
behavioral1
Sample
db7b24b27dcebc1318b2aecb383cd316d27dbae724864a1ad2fc92551d471678.exe
Resource
win10-20220812-en
General
-
Target
db7b24b27dcebc1318b2aecb383cd316d27dbae724864a1ad2fc92551d471678.exe
-
Size
715KB
-
MD5
a35f9283464442412f0fac34c236c776
-
SHA1
8ce8d88f6e2f5a9bb8beaa6593f1af4d91b9a431
-
SHA256
db7b24b27dcebc1318b2aecb383cd316d27dbae724864a1ad2fc92551d471678
-
SHA512
986a575d2de240eb798df7cb83ef1c49bee36737885d67bea8def243965ea51da04e71978c6d1ab510c657d99d6232cac813639b81ef6b8df8293a1a8ce40346
-
SSDEEP
12288:TMrjy90AEZ/YV3+7FCwP60gVt0TgqvDDAJAarpeV7htz6fFUNmpc9:4ynEWV3ZwP8z08qvDD8Ac+778FPy
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Extracted
amadey
3.66
62.204.41.5/Bu58Ngs/index.php
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/1488-536-0x0000000002600000-0x0000000002646000-memory.dmp family_redline behavioral1/memory/1488-555-0x0000000002960000-0x00000000029A4000-memory.dmp family_redline -
Executes dropped EXE 8 IoCs
pid Process 2020 sFW22fR.exe 3568 sZI24ZX.exe 396 kie47zo.exe 2644 maO61.exe 1600 mnolyk.exe 1488 nHx86jL.exe 4796 mnolyk.exe 3308 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 4220 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sZI24ZX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" sZI24ZX.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce db7b24b27dcebc1318b2aecb383cd316d27dbae724864a1ad2fc92551d471678.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" db7b24b27dcebc1318b2aecb383cd316d27dbae724864a1ad2fc92551d471678.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sFW22fR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" sFW22fR.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3676 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 396 kie47zo.exe 396 kie47zo.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 396 kie47zo.exe Token: SeDebugPrivilege 1488 nHx86jL.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2020 1968 db7b24b27dcebc1318b2aecb383cd316d27dbae724864a1ad2fc92551d471678.exe 66 PID 1968 wrote to memory of 2020 1968 db7b24b27dcebc1318b2aecb383cd316d27dbae724864a1ad2fc92551d471678.exe 66 PID 1968 wrote to memory of 2020 1968 db7b24b27dcebc1318b2aecb383cd316d27dbae724864a1ad2fc92551d471678.exe 66 PID 2020 wrote to memory of 3568 2020 sFW22fR.exe 67 PID 2020 wrote to memory of 3568 2020 sFW22fR.exe 67 PID 2020 wrote to memory of 3568 2020 sFW22fR.exe 67 PID 3568 wrote to memory of 396 3568 sZI24ZX.exe 68 PID 3568 wrote to memory of 396 3568 sZI24ZX.exe 68 PID 3568 wrote to memory of 396 3568 sZI24ZX.exe 68 PID 3568 wrote to memory of 2644 3568 sZI24ZX.exe 70 PID 3568 wrote to memory of 2644 3568 sZI24ZX.exe 70 PID 3568 wrote to memory of 2644 3568 sZI24ZX.exe 70 PID 2644 wrote to memory of 1600 2644 maO61.exe 71 PID 2644 wrote to memory of 1600 2644 maO61.exe 71 PID 2644 wrote to memory of 1600 2644 maO61.exe 71 PID 2020 wrote to memory of 1488 2020 sFW22fR.exe 72 PID 2020 wrote to memory of 1488 2020 sFW22fR.exe 72 PID 2020 wrote to memory of 1488 2020 sFW22fR.exe 72 PID 1600 wrote to memory of 3676 1600 mnolyk.exe 73 PID 1600 wrote to memory of 3676 1600 mnolyk.exe 73 PID 1600 wrote to memory of 3676 1600 mnolyk.exe 73 PID 1600 wrote to memory of 2636 1600 mnolyk.exe 74 PID 1600 wrote to memory of 2636 1600 mnolyk.exe 74 PID 1600 wrote to memory of 2636 1600 mnolyk.exe 74 PID 2636 wrote to memory of 3600 2636 cmd.exe 77 PID 2636 wrote to memory of 3600 2636 cmd.exe 77 PID 2636 wrote to memory of 3600 2636 cmd.exe 77 PID 2636 wrote to memory of 4004 2636 cmd.exe 78 PID 2636 wrote to memory of 4004 2636 cmd.exe 78 PID 2636 wrote to memory of 4004 2636 cmd.exe 78 PID 2636 wrote to memory of 4508 2636 cmd.exe 79 PID 2636 wrote to memory of 4508 2636 cmd.exe 79 PID 2636 wrote to memory of 4508 2636 cmd.exe 79 PID 2636 wrote to memory of 4544 2636 cmd.exe 80 PID 2636 wrote to memory of 4544 2636 cmd.exe 80 PID 2636 wrote to memory of 4544 2636 cmd.exe 80 PID 2636 wrote to memory of 4800 2636 cmd.exe 81 PID 2636 wrote to memory of 4800 2636 cmd.exe 81 PID 2636 wrote to memory of 4800 2636 cmd.exe 81 PID 2636 wrote to memory of 2688 2636 cmd.exe 82 PID 2636 wrote to memory of 2688 2636 cmd.exe 82 PID 2636 wrote to memory of 2688 2636 cmd.exe 82 PID 1600 wrote to memory of 4220 1600 mnolyk.exe 84 PID 1600 wrote to memory of 4220 1600 mnolyk.exe 84 PID 1600 wrote to memory of 4220 1600 mnolyk.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\db7b24b27dcebc1318b2aecb383cd316d27dbae724864a1ad2fc92551d471678.exe"C:\Users\Admin\AppData\Local\Temp\db7b24b27dcebc1318b2aecb383cd316d27dbae724864a1ad2fc92551d471678.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sFW22fR.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sFW22fR.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sZI24ZX.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sZI24ZX.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kie47zo.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kie47zo.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:396
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\maO61.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\maO61.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe" /F6⤵
- Creates scheduled task(s)
PID:3676
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5eb6b96734" /P "Admin:N"&&CACLS "..\5eb6b96734" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3600
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"7⤵PID:4004
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E7⤵PID:4508
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4544
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:N"7⤵PID:4800
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:R" /E7⤵PID:2688
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:4220
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nHx86jL.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nHx86jL.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
-
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:4796
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:3308
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
611KB
MD5f4ac2409bb4492bed3822f89ab58a24c
SHA11b11c7fcb38e8a7d363264aae3269587c6cb6784
SHA256b3db78dfc9cc807808076a22d4c6439e8653bb228a5e3c10484d6e0abfecbc49
SHA512adf06383fe0147594b8b7a6f07fdb134a9e0a490e049662f8af0d4ca778cdc7819a6e9447b20aa86c6e09f5d47767803a65198d7ccb1eba16e8197f0518eaab3
-
Filesize
611KB
MD5f4ac2409bb4492bed3822f89ab58a24c
SHA11b11c7fcb38e8a7d363264aae3269587c6cb6784
SHA256b3db78dfc9cc807808076a22d4c6439e8653bb228a5e3c10484d6e0abfecbc49
SHA512adf06383fe0147594b8b7a6f07fdb134a9e0a490e049662f8af0d4ca778cdc7819a6e9447b20aa86c6e09f5d47767803a65198d7ccb1eba16e8197f0518eaab3
-
Filesize
279KB
MD562620b58e5ea5b8d240b73fec4203422
SHA1394220113df9b5af5d5dba10f8ae695d5e43e183
SHA256db45f6b42ded0701d23fa902e933c57a4d72667b5f5af023f8002564f62e482e
SHA512c12a878551f5fec683c6bb40dc8fcd736fcdbc87db7db8ae6d750b5efe22ca2aa08ee7a0172eb9eecfda77a95707ce05cfb3b6455b6aa846232c209e676ca188
-
Filesize
279KB
MD562620b58e5ea5b8d240b73fec4203422
SHA1394220113df9b5af5d5dba10f8ae695d5e43e183
SHA256db45f6b42ded0701d23fa902e933c57a4d72667b5f5af023f8002564f62e482e
SHA512c12a878551f5fec683c6bb40dc8fcd736fcdbc87db7db8ae6d750b5efe22ca2aa08ee7a0172eb9eecfda77a95707ce05cfb3b6455b6aa846232c209e676ca188
-
Filesize
286KB
MD5c746662a94bbdfc4743c00daf164090c
SHA1d96b2a0dbd5fb7de55f8b53ba5f8f18ee6f6ec5d
SHA256673d5af29f5496238246ebca3930ce00f5f0dd4a410f0797309d7837d28c7479
SHA5125d88a6a9573fa237ce312cf35a569963fdffbe1eebfd0a28a6c7a36f152f74c721c53eaf282db7f18e6e95820828459f8c9bfc9eb02df1924da4e1edd909c62b
-
Filesize
286KB
MD5c746662a94bbdfc4743c00daf164090c
SHA1d96b2a0dbd5fb7de55f8b53ba5f8f18ee6f6ec5d
SHA256673d5af29f5496238246ebca3930ce00f5f0dd4a410f0797309d7837d28c7479
SHA5125d88a6a9573fa237ce312cf35a569963fdffbe1eebfd0a28a6c7a36f152f74c721c53eaf282db7f18e6e95820828459f8c9bfc9eb02df1924da4e1edd909c62b
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
89KB
MD59221a421a3e777eb7d4ce55e474bcc4a
SHA1c96d7bd7ccbf9352d50527bff472595b3dc5298e
SHA25610ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8
SHA51263ac172cb19c7c020676937cb35e853710d08e99e06e8cdcb410c37e0c9056af409a50fdec0c90a3c532edcf5e0f128fa1e2181063e1208d4fc4643b1b5736f3
-
Filesize
89KB
MD59221a421a3e777eb7d4ce55e474bcc4a
SHA1c96d7bd7ccbf9352d50527bff472595b3dc5298e
SHA25610ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8
SHA51263ac172cb19c7c020676937cb35e853710d08e99e06e8cdcb410c37e0c9056af409a50fdec0c90a3c532edcf5e0f128fa1e2181063e1208d4fc4643b1b5736f3