Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2023 09:42
Static task
static1
Behavioral task
behavioral1
Sample
f5ad1e15e1211b60c066c1d924ff9c6a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f5ad1e15e1211b60c066c1d924ff9c6a.exe
Resource
win10v2004-20221111-en
General
-
Target
f5ad1e15e1211b60c066c1d924ff9c6a.exe
-
Size
715KB
-
MD5
f5ad1e15e1211b60c066c1d924ff9c6a
-
SHA1
bd0abd13667843f4551c9b2940ec7b46ec811d02
-
SHA256
ec7c4f05150f213e7be63cec7528aa7660acb543d4986c4e0aad7c90a2131889
-
SHA512
d94662eaa93088ae89dd270b61f824bb5e3765c2402f30cd0d1f17401b431cc5df3eea112fddecb3329012d47365ce207b387acc2cad411d89158171830ee013
-
SSDEEP
12288:4Mr7y90GH9osJXyscMZOqq2b+/1L0WSfAvD8aJPgHfLD1vr1bzgAnNMUkNj1m:TyHHNy7ca/14WAAvD8OOly4Mb4
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Extracted
amadey
3.66
62.204.41.5/Bu58Ngs/index.php
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation mTJ79.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 8 IoCs
pid Process 4876 spH05zC.exe 4480 sMS71xF.exe 1684 kHp83aI.exe 2132 mTJ79.exe 2752 mnolyk.exe 368 nmb57Na.exe 2364 mnolyk.exe 648 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 2944 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f5ad1e15e1211b60c066c1d924ff9c6a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f5ad1e15e1211b60c066c1d924ff9c6a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce spH05zC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" spH05zC.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sMS71xF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" sMS71xF.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4072 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1684 kHp83aI.exe 1684 kHp83aI.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1684 kHp83aI.exe Token: SeDebugPrivilege 368 nmb57Na.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 4916 wrote to memory of 4876 4916 f5ad1e15e1211b60c066c1d924ff9c6a.exe 81 PID 4916 wrote to memory of 4876 4916 f5ad1e15e1211b60c066c1d924ff9c6a.exe 81 PID 4916 wrote to memory of 4876 4916 f5ad1e15e1211b60c066c1d924ff9c6a.exe 81 PID 4876 wrote to memory of 4480 4876 spH05zC.exe 82 PID 4876 wrote to memory of 4480 4876 spH05zC.exe 82 PID 4876 wrote to memory of 4480 4876 spH05zC.exe 82 PID 4480 wrote to memory of 1684 4480 sMS71xF.exe 83 PID 4480 wrote to memory of 1684 4480 sMS71xF.exe 83 PID 4480 wrote to memory of 1684 4480 sMS71xF.exe 83 PID 4480 wrote to memory of 2132 4480 sMS71xF.exe 84 PID 4480 wrote to memory of 2132 4480 sMS71xF.exe 84 PID 4480 wrote to memory of 2132 4480 sMS71xF.exe 84 PID 2132 wrote to memory of 2752 2132 mTJ79.exe 85 PID 2132 wrote to memory of 2752 2132 mTJ79.exe 85 PID 2132 wrote to memory of 2752 2132 mTJ79.exe 85 PID 4876 wrote to memory of 368 4876 spH05zC.exe 86 PID 4876 wrote to memory of 368 4876 spH05zC.exe 86 PID 4876 wrote to memory of 368 4876 spH05zC.exe 86 PID 2752 wrote to memory of 4072 2752 mnolyk.exe 87 PID 2752 wrote to memory of 4072 2752 mnolyk.exe 87 PID 2752 wrote to memory of 4072 2752 mnolyk.exe 87 PID 2752 wrote to memory of 1924 2752 mnolyk.exe 89 PID 2752 wrote to memory of 1924 2752 mnolyk.exe 89 PID 2752 wrote to memory of 1924 2752 mnolyk.exe 89 PID 1924 wrote to memory of 5048 1924 cmd.exe 91 PID 1924 wrote to memory of 5048 1924 cmd.exe 91 PID 1924 wrote to memory of 5048 1924 cmd.exe 91 PID 1924 wrote to memory of 3048 1924 cmd.exe 92 PID 1924 wrote to memory of 3048 1924 cmd.exe 92 PID 1924 wrote to memory of 3048 1924 cmd.exe 92 PID 1924 wrote to memory of 2136 1924 cmd.exe 93 PID 1924 wrote to memory of 2136 1924 cmd.exe 93 PID 1924 wrote to memory of 2136 1924 cmd.exe 93 PID 1924 wrote to memory of 1756 1924 cmd.exe 94 PID 1924 wrote to memory of 1756 1924 cmd.exe 94 PID 1924 wrote to memory of 1756 1924 cmd.exe 94 PID 1924 wrote to memory of 4216 1924 cmd.exe 95 PID 1924 wrote to memory of 4216 1924 cmd.exe 95 PID 1924 wrote to memory of 4216 1924 cmd.exe 95 PID 1924 wrote to memory of 4060 1924 cmd.exe 96 PID 1924 wrote to memory of 4060 1924 cmd.exe 96 PID 1924 wrote to memory of 4060 1924 cmd.exe 96 PID 2752 wrote to memory of 2944 2752 mnolyk.exe 105 PID 2752 wrote to memory of 2944 2752 mnolyk.exe 105 PID 2752 wrote to memory of 2944 2752 mnolyk.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5ad1e15e1211b60c066c1d924ff9c6a.exe"C:\Users\Admin\AppData\Local\Temp\f5ad1e15e1211b60c066c1d924ff9c6a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\spH05zC.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\spH05zC.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sMS71xF.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sMS71xF.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kHp83aI.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kHp83aI.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mTJ79.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mTJ79.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe" /F6⤵
- Creates scheduled task(s)
PID:4072
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5eb6b96734" /P "Admin:N"&&CACLS "..\5eb6b96734" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:5048
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"7⤵PID:3048
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E7⤵PID:2136
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1756
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:N"7⤵PID:4216
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:R" /E7⤵PID:4060
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:2944
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nmb57Na.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nmb57Na.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:368
-
-
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:2364
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:648
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
612KB
MD57094ab66eeb5c57922739891f528af69
SHA14f0c74da394ab5d4098e797b429b29289a240b66
SHA25669735b510790de25e419be9affb0d42fd4305d43dbd97f02433f6ae218387150
SHA512e6bc6b0711e98a0dd27ce261eb981982484b37447deca9ccec9727f90f1b95a8b9c0b6f7ead88ecdce459441e0a7c13e39bbbb57dc83f349f7439dc329ae58fb
-
Filesize
612KB
MD57094ab66eeb5c57922739891f528af69
SHA14f0c74da394ab5d4098e797b429b29289a240b66
SHA25669735b510790de25e419be9affb0d42fd4305d43dbd97f02433f6ae218387150
SHA512e6bc6b0711e98a0dd27ce261eb981982484b37447deca9ccec9727f90f1b95a8b9c0b6f7ead88ecdce459441e0a7c13e39bbbb57dc83f349f7439dc329ae58fb
-
Filesize
279KB
MD5b7bb700e5a7a0c61fb93590366fe6ab9
SHA139a45f5aefb163427aa29ffcbdf130017cd52e62
SHA2561516fc2758b409c7d53002665c888d62ac481d89679f4738c7d05cc672de319e
SHA512605e922a2acb2008468dbe20f678b73af11a689d4081827f1ede264b4b9921b2579df2c56f70e196b793a5089805936a40aa1f886122ace11d05fb6259463319
-
Filesize
279KB
MD5b7bb700e5a7a0c61fb93590366fe6ab9
SHA139a45f5aefb163427aa29ffcbdf130017cd52e62
SHA2561516fc2758b409c7d53002665c888d62ac481d89679f4738c7d05cc672de319e
SHA512605e922a2acb2008468dbe20f678b73af11a689d4081827f1ede264b4b9921b2579df2c56f70e196b793a5089805936a40aa1f886122ace11d05fb6259463319
-
Filesize
286KB
MD543d2f820b61628a4b22d28b66f047c09
SHA15b3becd2e875d39476fe74c224f00b646a89bfb8
SHA25696f3eed77fb20dccbb3b3c6878f3bd2d5910cd90ed95452a7e539b29896cb085
SHA512d432aaaef84846b4cc206e10364d4fc435261890095654964b863788354d86768a2941b0174dbd6820c4c1d26ac92a5dd3535b370e108b86293c473c25655c63
-
Filesize
286KB
MD543d2f820b61628a4b22d28b66f047c09
SHA15b3becd2e875d39476fe74c224f00b646a89bfb8
SHA25696f3eed77fb20dccbb3b3c6878f3bd2d5910cd90ed95452a7e539b29896cb085
SHA512d432aaaef84846b4cc206e10364d4fc435261890095654964b863788354d86768a2941b0174dbd6820c4c1d26ac92a5dd3535b370e108b86293c473c25655c63
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
89KB
MD59221a421a3e777eb7d4ce55e474bcc4a
SHA1c96d7bd7ccbf9352d50527bff472595b3dc5298e
SHA25610ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8
SHA51263ac172cb19c7c020676937cb35e853710d08e99e06e8cdcb410c37e0c9056af409a50fdec0c90a3c532edcf5e0f128fa1e2181063e1208d4fc4643b1b5736f3
-
Filesize
89KB
MD59221a421a3e777eb7d4ce55e474bcc4a
SHA1c96d7bd7ccbf9352d50527bff472595b3dc5298e
SHA25610ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8
SHA51263ac172cb19c7c020676937cb35e853710d08e99e06e8cdcb410c37e0c9056af409a50fdec0c90a3c532edcf5e0f128fa1e2181063e1208d4fc4643b1b5736f3