Analysis
-
max time kernel
147s -
max time network
104s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
17/02/2023, 01:38
Static task
static1
General
-
Target
a77f966ae69102dc0afb16fe69796597bf3a4b60b6ddb373e1e223d8a60b55bd.exe
-
Size
742KB
-
MD5
05c69852c81500c29d10bd6f7ab6db8a
-
SHA1
6b113555ca36e694ebb4dc563fe77866a7450fc0
-
SHA256
a77f966ae69102dc0afb16fe69796597bf3a4b60b6ddb373e1e223d8a60b55bd
-
SHA512
2c3ace38ef3a10a71805e8a5acf0a94fbe10e0ade841dfb7558e17f68e8c88acb45c6cfbc6b18ef669ec78f650e3e4a5ac5e183b8599b4ae114e95db841fd30d
-
SSDEEP
12288:tMrly90sxVxAfMpvrnXuUjMJDDr5G3WbJhi4C8rNcBdih4tbpprRGQkKdntu/:oybVSEdDXTQD/s3WbJJDrmBd7tRLkb
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Extracted
redline
ruma
193.233.20.13:4136
-
auth_value
647d00dfaba082a4a30f383bca5d1a2a
Extracted
amadey
3.66
193.233.20.4/t6r48nSa/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" fOO09By.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" fOO09By.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" fOO09By.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" fOO09By.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" fOO09By.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/4996-423-0x0000000002690000-0x00000000026D6000-memory.dmp family_redline behavioral1/memory/4996-428-0x0000000002860000-0x00000000028A4000-memory.dmp family_redline -
Executes dropped EXE 9 IoCs
pid Process 3412 shL39UU.exe 4704 sIz95Ng.exe 4620 fOO09By.exe 4596 hlt85lw.exe 4996 kay10Bj.exe 3056 nml96Lf.exe 2864 mnolyk.exe 948 mnolyk.exe 560 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 3348 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" fOO09By.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a77f966ae69102dc0afb16fe69796597bf3a4b60b6ddb373e1e223d8a60b55bd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a77f966ae69102dc0afb16fe69796597bf3a4b60b6ddb373e1e223d8a60b55bd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce shL39UU.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" shL39UU.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sIz95Ng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" sIz95Ng.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1460 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4620 fOO09By.exe 4620 fOO09By.exe 4596 hlt85lw.exe 4596 hlt85lw.exe 4996 kay10Bj.exe 4996 kay10Bj.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4620 fOO09By.exe Token: SeDebugPrivilege 4596 hlt85lw.exe Token: SeDebugPrivilege 4996 kay10Bj.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2780 wrote to memory of 3412 2780 a77f966ae69102dc0afb16fe69796597bf3a4b60b6ddb373e1e223d8a60b55bd.exe 66 PID 2780 wrote to memory of 3412 2780 a77f966ae69102dc0afb16fe69796597bf3a4b60b6ddb373e1e223d8a60b55bd.exe 66 PID 2780 wrote to memory of 3412 2780 a77f966ae69102dc0afb16fe69796597bf3a4b60b6ddb373e1e223d8a60b55bd.exe 66 PID 3412 wrote to memory of 4704 3412 shL39UU.exe 67 PID 3412 wrote to memory of 4704 3412 shL39UU.exe 67 PID 3412 wrote to memory of 4704 3412 shL39UU.exe 67 PID 4704 wrote to memory of 4620 4704 sIz95Ng.exe 68 PID 4704 wrote to memory of 4620 4704 sIz95Ng.exe 68 PID 4704 wrote to memory of 4596 4704 sIz95Ng.exe 69 PID 4704 wrote to memory of 4596 4704 sIz95Ng.exe 69 PID 4704 wrote to memory of 4596 4704 sIz95Ng.exe 69 PID 3412 wrote to memory of 4996 3412 shL39UU.exe 71 PID 3412 wrote to memory of 4996 3412 shL39UU.exe 71 PID 3412 wrote to memory of 4996 3412 shL39UU.exe 71 PID 2780 wrote to memory of 3056 2780 a77f966ae69102dc0afb16fe69796597bf3a4b60b6ddb373e1e223d8a60b55bd.exe 72 PID 2780 wrote to memory of 3056 2780 a77f966ae69102dc0afb16fe69796597bf3a4b60b6ddb373e1e223d8a60b55bd.exe 72 PID 2780 wrote to memory of 3056 2780 a77f966ae69102dc0afb16fe69796597bf3a4b60b6ddb373e1e223d8a60b55bd.exe 72 PID 3056 wrote to memory of 2864 3056 nml96Lf.exe 73 PID 3056 wrote to memory of 2864 3056 nml96Lf.exe 73 PID 3056 wrote to memory of 2864 3056 nml96Lf.exe 73 PID 2864 wrote to memory of 1460 2864 mnolyk.exe 74 PID 2864 wrote to memory of 1460 2864 mnolyk.exe 74 PID 2864 wrote to memory of 1460 2864 mnolyk.exe 74 PID 2864 wrote to memory of 2352 2864 mnolyk.exe 75 PID 2864 wrote to memory of 2352 2864 mnolyk.exe 75 PID 2864 wrote to memory of 2352 2864 mnolyk.exe 75 PID 2352 wrote to memory of 3624 2352 cmd.exe 78 PID 2352 wrote to memory of 3624 2352 cmd.exe 78 PID 2352 wrote to memory of 3624 2352 cmd.exe 78 PID 2352 wrote to memory of 3228 2352 cmd.exe 79 PID 2352 wrote to memory of 3228 2352 cmd.exe 79 PID 2352 wrote to memory of 3228 2352 cmd.exe 79 PID 2352 wrote to memory of 2232 2352 cmd.exe 80 PID 2352 wrote to memory of 2232 2352 cmd.exe 80 PID 2352 wrote to memory of 2232 2352 cmd.exe 80 PID 2352 wrote to memory of 4144 2352 cmd.exe 81 PID 2352 wrote to memory of 4144 2352 cmd.exe 81 PID 2352 wrote to memory of 4144 2352 cmd.exe 81 PID 2352 wrote to memory of 1012 2352 cmd.exe 82 PID 2352 wrote to memory of 1012 2352 cmd.exe 82 PID 2352 wrote to memory of 1012 2352 cmd.exe 82 PID 2352 wrote to memory of 852 2352 cmd.exe 83 PID 2352 wrote to memory of 852 2352 cmd.exe 83 PID 2352 wrote to memory of 852 2352 cmd.exe 83 PID 2864 wrote to memory of 3348 2864 mnolyk.exe 85 PID 2864 wrote to memory of 3348 2864 mnolyk.exe 85 PID 2864 wrote to memory of 3348 2864 mnolyk.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\a77f966ae69102dc0afb16fe69796597bf3a4b60b6ddb373e1e223d8a60b55bd.exe"C:\Users\Admin\AppData\Local\Temp\a77f966ae69102dc0afb16fe69796597bf3a4b60b6ddb373e1e223d8a60b55bd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\shL39UU.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\shL39UU.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sIz95Ng.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sIz95Ng.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\fOO09By.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\fOO09By.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hlt85lw.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hlt85lw.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4596
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kay10Bj.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kay10Bj.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4996
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nml96Lf.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nml96Lf.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe" /F4⤵
- Creates scheduled task(s)
PID:1460
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5eb6b96734" /P "Admin:N"&&CACLS "..\5eb6b96734" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3624
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"5⤵PID:3228
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E5⤵PID:2232
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4144
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:N"5⤵PID:1012
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:R" /E5⤵PID:852
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3348
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:948
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:560
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
556KB
MD5776c5920a94e8bec98a72b32d3245b69
SHA192d94374b65006016e542321cfbd8a27a60e8889
SHA2569d4cca9bf15e69906d533eb37756b3ac4d067bdec0487561b910c0a81da506ec
SHA5124123f9a5d9499366fc68a3dd54087e3a395b3f6df465509a7e59a89ed0b6f9ed0d52c8e2b5225e6a44f063aeadcc058ac98a22f05c47438b4b9f0e53bd8b312e
-
Filesize
556KB
MD5776c5920a94e8bec98a72b32d3245b69
SHA192d94374b65006016e542321cfbd8a27a60e8889
SHA2569d4cca9bf15e69906d533eb37756b3ac4d067bdec0487561b910c0a81da506ec
SHA5124123f9a5d9499366fc68a3dd54087e3a395b3f6df465509a7e59a89ed0b6f9ed0d52c8e2b5225e6a44f063aeadcc058ac98a22f05c47438b4b9f0e53bd8b312e
-
Filesize
352KB
MD563b0cb9489c4c25ac9807cc76289624a
SHA17d7f83d83cc126dfbc8e2beac9a305100088d39f
SHA256add02f47b506d7832798a176511b05e9dd5e2d04f6105436b7d7a49907ad811c
SHA51268a5d29184031690fb310b1b263d81f5b1039aa03d8d3d9b14e1d7fa93210bd472fccaf101575a2076ce20b5f13785009885208283c57276e99e428c9dea6261
-
Filesize
352KB
MD563b0cb9489c4c25ac9807cc76289624a
SHA17d7f83d83cc126dfbc8e2beac9a305100088d39f
SHA256add02f47b506d7832798a176511b05e9dd5e2d04f6105436b7d7a49907ad811c
SHA51268a5d29184031690fb310b1b263d81f5b1039aa03d8d3d9b14e1d7fa93210bd472fccaf101575a2076ce20b5f13785009885208283c57276e99e428c9dea6261
-
Filesize
202KB
MD575b5fa7412a49993a48cc3df70b977b2
SHA1283fcd429fe80e75f4e24d560a7fdc5cf1b0b144
SHA25658be70911e300f18d17c5d60e5dee47647a2f31ccc0b0f979ace6cf21b9a83a2
SHA512dabe9bfca7c4e5a7c28136d680aa406cdd077ad6adfbd82a26887e977c648be4d5b284d94528c5b30d76e8360bf78b203160522d96e8d85ff7ad24856729bf54
-
Filesize
202KB
MD575b5fa7412a49993a48cc3df70b977b2
SHA1283fcd429fe80e75f4e24d560a7fdc5cf1b0b144
SHA25658be70911e300f18d17c5d60e5dee47647a2f31ccc0b0f979ace6cf21b9a83a2
SHA512dabe9bfca7c4e5a7c28136d680aa406cdd077ad6adfbd82a26887e977c648be4d5b284d94528c5b30d76e8360bf78b203160522d96e8d85ff7ad24856729bf54
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
89KB
MD54cf63b9a3e4bc0910af4d8baa5939238
SHA1361eea9bb65071ebf09d9598fe7a482e487b919f
SHA256dd82c0954f9047eb2a601aefa58eec94c79f71cab58f980a663ae3b8a54a63f9
SHA512177f101609bbdb7a3e423ecb2914b21d3fb91bf1e6267c4a30313b8ae0b5bc49659fc6ce1f1715649b8ee774022a9b045d886f2ba658ef065eefceedeaf7ee38
-
Filesize
89KB
MD54cf63b9a3e4bc0910af4d8baa5939238
SHA1361eea9bb65071ebf09d9598fe7a482e487b919f
SHA256dd82c0954f9047eb2a601aefa58eec94c79f71cab58f980a663ae3b8a54a63f9
SHA512177f101609bbdb7a3e423ecb2914b21d3fb91bf1e6267c4a30313b8ae0b5bc49659fc6ce1f1715649b8ee774022a9b045d886f2ba658ef065eefceedeaf7ee38