Analysis
-
max time kernel
136s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
20/08/2023, 08:51
Static task
static1
Behavioral task
behavioral1
Sample
0c695ad3072a4b741093cab6a0441cc485098a463e2506bac83e58eb445c7896.exe
Resource
win10-20230703-en
General
-
Target
0c695ad3072a4b741093cab6a0441cc485098a463e2506bac83e58eb445c7896.exe
-
Size
756KB
-
MD5
4d78181ce83b667c5052a386656c9cb4
-
SHA1
9de12866bfcd1bff6267fc37722cd5524b0326a4
-
SHA256
0c695ad3072a4b741093cab6a0441cc485098a463e2506bac83e58eb445c7896
-
SHA512
ea469c6736ef59c1ac8a28e60da5b15629921658a7af19101ae22fd1e496f694198c6f8a03033ad47db809e3cf8588028aa80ce73baed038821a744e25ad01ce
-
SSDEEP
12288:YMrJy90U/ORpsFOMafC5FAVt6M+SBpPv36GeS2dO7BjzR7ZMubH:xybO8FOTa5FG5+UlvJhR7lzRtL
Malware Config
Extracted
amadey
S-%lu-
77.91.68.18/nice/index.php
3.87/nice/index.php
Extracted
redline
jonka
77.91.124.73:19071
-
auth_value
c95bc30cd252fa6dff2a19fd78bfab4e
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 4708 y7255338.exe 4088 y7311178.exe 3948 m4912579.exe 3712 n6909720.exe 4476 saves.exe 5088 o4658231.exe 3268 saves.exe 3628 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 2620 rundll32.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0c695ad3072a4b741093cab6a0441cc485098a463e2506bac83e58eb445c7896.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y7255338.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y7311178.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4884 schtasks.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 4152 wrote to memory of 4708 4152 0c695ad3072a4b741093cab6a0441cc485098a463e2506bac83e58eb445c7896.exe 70 PID 4152 wrote to memory of 4708 4152 0c695ad3072a4b741093cab6a0441cc485098a463e2506bac83e58eb445c7896.exe 70 PID 4152 wrote to memory of 4708 4152 0c695ad3072a4b741093cab6a0441cc485098a463e2506bac83e58eb445c7896.exe 70 PID 4708 wrote to memory of 4088 4708 y7255338.exe 71 PID 4708 wrote to memory of 4088 4708 y7255338.exe 71 PID 4708 wrote to memory of 4088 4708 y7255338.exe 71 PID 4088 wrote to memory of 3948 4088 y7311178.exe 72 PID 4088 wrote to memory of 3948 4088 y7311178.exe 72 PID 4088 wrote to memory of 3948 4088 y7311178.exe 72 PID 4088 wrote to memory of 3712 4088 y7311178.exe 73 PID 4088 wrote to memory of 3712 4088 y7311178.exe 73 PID 4088 wrote to memory of 3712 4088 y7311178.exe 73 PID 3712 wrote to memory of 4476 3712 n6909720.exe 74 PID 3712 wrote to memory of 4476 3712 n6909720.exe 74 PID 3712 wrote to memory of 4476 3712 n6909720.exe 74 PID 4708 wrote to memory of 5088 4708 y7255338.exe 75 PID 4708 wrote to memory of 5088 4708 y7255338.exe 75 PID 4708 wrote to memory of 5088 4708 y7255338.exe 75 PID 4476 wrote to memory of 4884 4476 saves.exe 76 PID 4476 wrote to memory of 4884 4476 saves.exe 76 PID 4476 wrote to memory of 4884 4476 saves.exe 76 PID 4476 wrote to memory of 1400 4476 saves.exe 78 PID 4476 wrote to memory of 1400 4476 saves.exe 78 PID 4476 wrote to memory of 1400 4476 saves.exe 78 PID 1400 wrote to memory of 1056 1400 cmd.exe 80 PID 1400 wrote to memory of 1056 1400 cmd.exe 80 PID 1400 wrote to memory of 1056 1400 cmd.exe 80 PID 1400 wrote to memory of 4612 1400 cmd.exe 81 PID 1400 wrote to memory of 4612 1400 cmd.exe 81 PID 1400 wrote to memory of 4612 1400 cmd.exe 81 PID 1400 wrote to memory of 4172 1400 cmd.exe 82 PID 1400 wrote to memory of 4172 1400 cmd.exe 82 PID 1400 wrote to memory of 4172 1400 cmd.exe 82 PID 1400 wrote to memory of 3064 1400 cmd.exe 83 PID 1400 wrote to memory of 3064 1400 cmd.exe 83 PID 1400 wrote to memory of 3064 1400 cmd.exe 83 PID 1400 wrote to memory of 4956 1400 cmd.exe 84 PID 1400 wrote to memory of 4956 1400 cmd.exe 84 PID 1400 wrote to memory of 4956 1400 cmd.exe 84 PID 1400 wrote to memory of 4516 1400 cmd.exe 85 PID 1400 wrote to memory of 4516 1400 cmd.exe 85 PID 1400 wrote to memory of 4516 1400 cmd.exe 85 PID 4476 wrote to memory of 2620 4476 saves.exe 87 PID 4476 wrote to memory of 2620 4476 saves.exe 87 PID 4476 wrote to memory of 2620 4476 saves.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c695ad3072a4b741093cab6a0441cc485098a463e2506bac83e58eb445c7896.exe"C:\Users\Admin\AppData\Local\Temp\0c695ad3072a4b741093cab6a0441cc485098a463e2506bac83e58eb445c7896.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7255338.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7255338.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7311178.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7311178.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\m4912579.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\m4912579.exe4⤵
- Executes dropped EXE
PID:3948
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n6909720.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n6909720.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F6⤵
- Creates scheduled task(s)
PID:4884
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1056
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"7⤵PID:4612
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E7⤵PID:4172
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3064
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"7⤵PID:4956
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E7⤵PID:4516
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:2620
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o4658231.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o4658231.exe3⤵
- Executes dropped EXE
PID:5088
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:3268
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:3628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
476KB
MD5e005ebe615e5c498489e37c96073006b
SHA1c1fad3ef3f8eec82b8596e6b8b07850fa9d19f1d
SHA2565061d80bbf1ed98efa948a51b6abbee32f6ecdeba81f3a86db275f2a4c69eb92
SHA5128f510fd710a0a5407a6b661acdfb20bb2b708a65956676d610854eca9a458e867b9fe4d080cd98f9b896239c733c0e93d03d8d877e2f6adbcecc35b25f2f07e3
-
Filesize
476KB
MD5e005ebe615e5c498489e37c96073006b
SHA1c1fad3ef3f8eec82b8596e6b8b07850fa9d19f1d
SHA2565061d80bbf1ed98efa948a51b6abbee32f6ecdeba81f3a86db275f2a4c69eb92
SHA5128f510fd710a0a5407a6b661acdfb20bb2b708a65956676d610854eca9a458e867b9fe4d080cd98f9b896239c733c0e93d03d8d877e2f6adbcecc35b25f2f07e3
-
Filesize
174KB
MD53fd6c525aba0501d7a2e8101fe942d64
SHA10f5e80956d247a4708411362e905676cce330d1c
SHA256728ab03efb26e9496fe9267b489839bec701962915f9cecdca1e89ec412d0877
SHA512d582790795b707313e272ebbab2386fb45baa620f9249458551cfea09756c9e73f218690b9f44ba770088a5787cc83900af9244bbb0839eb7f0586c39038a645
-
Filesize
174KB
MD53fd6c525aba0501d7a2e8101fe942d64
SHA10f5e80956d247a4708411362e905676cce330d1c
SHA256728ab03efb26e9496fe9267b489839bec701962915f9cecdca1e89ec412d0877
SHA512d582790795b707313e272ebbab2386fb45baa620f9249458551cfea09756c9e73f218690b9f44ba770088a5787cc83900af9244bbb0839eb7f0586c39038a645
-
Filesize
320KB
MD5e33287e3b6e7944188fe37b7e50dd752
SHA196b07838ceb0d1daef8f63633388de6da5db0b4b
SHA256df1a7f6abb2b9da6d730baa9d15028befcd180c590b1f80bfb6204bd310499ec
SHA5124f62ef198f0be8d478ef1bc1b66db20f81554969a8104d7aebe6435a87081adcdbaf3759c51195dc9fe67970ed3f557232a6a7171f698c1a35533db2cf023b36
-
Filesize
320KB
MD5e33287e3b6e7944188fe37b7e50dd752
SHA196b07838ceb0d1daef8f63633388de6da5db0b4b
SHA256df1a7f6abb2b9da6d730baa9d15028befcd180c590b1f80bfb6204bd310499ec
SHA5124f62ef198f0be8d478ef1bc1b66db20f81554969a8104d7aebe6435a87081adcdbaf3759c51195dc9fe67970ed3f557232a6a7171f698c1a35533db2cf023b36
-
Filesize
140KB
MD58d5f17011509ea2a6f1334430c6fa664
SHA1dcae78973384c3b600af0f4c045b61cf62310907
SHA256566508cf56b529db924eeb1f99e33d7281088ec66655242fd5136ce4a25892ea
SHA5126e8f05ae41a27e865281819981aca8f5d2af9d4f86c089ca413db88bb4811504f19c7a2ed87698c91b8ba77aeb3752172064757591efed097f4ff250d18e27da
-
Filesize
140KB
MD58d5f17011509ea2a6f1334430c6fa664
SHA1dcae78973384c3b600af0f4c045b61cf62310907
SHA256566508cf56b529db924eeb1f99e33d7281088ec66655242fd5136ce4a25892ea
SHA5126e8f05ae41a27e865281819981aca8f5d2af9d4f86c089ca413db88bb4811504f19c7a2ed87698c91b8ba77aeb3752172064757591efed097f4ff250d18e27da
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b