Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2023, 12:41
Static task
static1
Behavioral task
behavioral1
Sample
e0278fcc8247115a9f514b88a940bf71657cd4f412d49718e560eceaab089c8b.exe
Resource
win10v2004-20230703-en
General
-
Target
e0278fcc8247115a9f514b88a940bf71657cd4f412d49718e560eceaab089c8b.exe
-
Size
591KB
-
MD5
a8f8b5fc749b3efc4a9e82c72329fe3f
-
SHA1
08d4fe4b385310498098995cef03759a0e64cb53
-
SHA256
e0278fcc8247115a9f514b88a940bf71657cd4f412d49718e560eceaab089c8b
-
SHA512
20415d6b9dd52617eaf60e174ef314081cd32bfe473c518ae910a850c185963a5ccb29eb8b9dbc152c01bacc22ddad9b3a9ba5e12d4ba2b04097f5d9ecbbb20e
-
SSDEEP
12288:iMrYy902AOKFzQwwCP7O5vRzDOtR9vJ3xdtSUInl5JxO:OyDApCwwCPSvItPNRSUIO
Malware Config
Extracted
amadey
S-%lu-
77.91.68.18/nice/index.php
3.87/nice/index.php
Extracted
redline
chang
77.91.124.73:19071
-
auth_value
92b880db64e691d6bb290d1536ce7688
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 4560 y0199913.exe 3364 y1373618.exe 2016 m6458299.exe 3304 n1630045.exe 4412 saves.exe 5100 o3408191.exe 2272 saves.exe 1364 saves.exe 4200 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 1664 rundll32.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e0278fcc8247115a9f514b88a940bf71657cd4f412d49718e560eceaab089c8b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y0199913.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y1373618.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4208 schtasks.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 216 wrote to memory of 4560 216 e0278fcc8247115a9f514b88a940bf71657cd4f412d49718e560eceaab089c8b.exe 83 PID 216 wrote to memory of 4560 216 e0278fcc8247115a9f514b88a940bf71657cd4f412d49718e560eceaab089c8b.exe 83 PID 216 wrote to memory of 4560 216 e0278fcc8247115a9f514b88a940bf71657cd4f412d49718e560eceaab089c8b.exe 83 PID 4560 wrote to memory of 3364 4560 y0199913.exe 84 PID 4560 wrote to memory of 3364 4560 y0199913.exe 84 PID 4560 wrote to memory of 3364 4560 y0199913.exe 84 PID 3364 wrote to memory of 2016 3364 y1373618.exe 85 PID 3364 wrote to memory of 2016 3364 y1373618.exe 85 PID 3364 wrote to memory of 2016 3364 y1373618.exe 85 PID 3364 wrote to memory of 3304 3364 y1373618.exe 86 PID 3364 wrote to memory of 3304 3364 y1373618.exe 86 PID 3364 wrote to memory of 3304 3364 y1373618.exe 86 PID 3304 wrote to memory of 4412 3304 n1630045.exe 87 PID 3304 wrote to memory of 4412 3304 n1630045.exe 87 PID 3304 wrote to memory of 4412 3304 n1630045.exe 87 PID 4560 wrote to memory of 5100 4560 y0199913.exe 88 PID 4560 wrote to memory of 5100 4560 y0199913.exe 88 PID 4560 wrote to memory of 5100 4560 y0199913.exe 88 PID 4412 wrote to memory of 4208 4412 saves.exe 89 PID 4412 wrote to memory of 4208 4412 saves.exe 89 PID 4412 wrote to memory of 4208 4412 saves.exe 89 PID 4412 wrote to memory of 860 4412 saves.exe 91 PID 4412 wrote to memory of 860 4412 saves.exe 91 PID 4412 wrote to memory of 860 4412 saves.exe 91 PID 860 wrote to memory of 4508 860 cmd.exe 93 PID 860 wrote to memory of 4508 860 cmd.exe 93 PID 860 wrote to memory of 4508 860 cmd.exe 93 PID 860 wrote to memory of 2680 860 cmd.exe 94 PID 860 wrote to memory of 2680 860 cmd.exe 94 PID 860 wrote to memory of 2680 860 cmd.exe 94 PID 860 wrote to memory of 1580 860 cmd.exe 95 PID 860 wrote to memory of 1580 860 cmd.exe 95 PID 860 wrote to memory of 1580 860 cmd.exe 95 PID 860 wrote to memory of 4104 860 cmd.exe 96 PID 860 wrote to memory of 4104 860 cmd.exe 96 PID 860 wrote to memory of 4104 860 cmd.exe 96 PID 860 wrote to memory of 1424 860 cmd.exe 97 PID 860 wrote to memory of 1424 860 cmd.exe 97 PID 860 wrote to memory of 1424 860 cmd.exe 97 PID 860 wrote to memory of 1284 860 cmd.exe 98 PID 860 wrote to memory of 1284 860 cmd.exe 98 PID 860 wrote to memory of 1284 860 cmd.exe 98 PID 4412 wrote to memory of 1664 4412 saves.exe 108 PID 4412 wrote to memory of 1664 4412 saves.exe 108 PID 4412 wrote to memory of 1664 4412 saves.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0278fcc8247115a9f514b88a940bf71657cd4f412d49718e560eceaab089c8b.exe"C:\Users\Admin\AppData\Local\Temp\e0278fcc8247115a9f514b88a940bf71657cd4f412d49718e560eceaab089c8b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0199913.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0199913.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y1373618.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y1373618.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\m6458299.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\m6458299.exe4⤵
- Executes dropped EXE
PID:2016
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n1630045.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n1630045.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F6⤵
- Creates scheduled task(s)
PID:4208
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4508
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"7⤵PID:2680
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E7⤵PID:1580
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4104
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"7⤵PID:1424
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E7⤵PID:1284
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:1664
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o3408191.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o3408191.exe3⤵
- Executes dropped EXE
PID:5100
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2272
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:1364
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
476KB
MD587e67aba18c482162b704928a1098065
SHA12d0d5eaf5b704df712ad1592aa333ae1f6b7884b
SHA256e796c91f7e567d74ff1d375e6a5474ad9c4f68e1fb1d4894cd9da84880cfee4c
SHA512052ecac9fffdfce4163de5eae9ed4aa92b83c5c50876ea37cff14857689bc7bfacf2a0432073c456375bc2a0fbfb97229ac1f19b09c9159989017e779f00f4a7
-
Filesize
476KB
MD587e67aba18c482162b704928a1098065
SHA12d0d5eaf5b704df712ad1592aa333ae1f6b7884b
SHA256e796c91f7e567d74ff1d375e6a5474ad9c4f68e1fb1d4894cd9da84880cfee4c
SHA512052ecac9fffdfce4163de5eae9ed4aa92b83c5c50876ea37cff14857689bc7bfacf2a0432073c456375bc2a0fbfb97229ac1f19b09c9159989017e779f00f4a7
-
Filesize
174KB
MD59125aa4f4c95c06f123a0ed66a836686
SHA122e885a1f83c5485c9e595915dc22935440ccbf1
SHA2566874d932ceee106ed81fcc24ed7cb3678a8e5f88e6fbedf1b393aa32e434732e
SHA51289ca2e810c1cf46695c4678831fe00f8bcce5317862ab3c34dbe77008e597d4919d93d65f8b806c9f15f8a016f2022f93bc9ab6df6677580c1a833496efabf76
-
Filesize
174KB
MD59125aa4f4c95c06f123a0ed66a836686
SHA122e885a1f83c5485c9e595915dc22935440ccbf1
SHA2566874d932ceee106ed81fcc24ed7cb3678a8e5f88e6fbedf1b393aa32e434732e
SHA51289ca2e810c1cf46695c4678831fe00f8bcce5317862ab3c34dbe77008e597d4919d93d65f8b806c9f15f8a016f2022f93bc9ab6df6677580c1a833496efabf76
-
Filesize
320KB
MD5b7eafdd7ba8c46520fdd2f927eb68960
SHA1fdb38d1ce8d4923e5ab49c77f198ca0e9a7f7fcc
SHA2560203d0b191e91922fb0e6130e659f6ccb880af129cfabf55d46c35fc010e8b9d
SHA512407bf5f4b643aeaacf3940660f7c6a6596c773464fae964470b6502f099bd31b80648fa8af3243bf4c549359a3fdcf795858cd9ad6fc0dea904d4bd832330179
-
Filesize
320KB
MD5b7eafdd7ba8c46520fdd2f927eb68960
SHA1fdb38d1ce8d4923e5ab49c77f198ca0e9a7f7fcc
SHA2560203d0b191e91922fb0e6130e659f6ccb880af129cfabf55d46c35fc010e8b9d
SHA512407bf5f4b643aeaacf3940660f7c6a6596c773464fae964470b6502f099bd31b80648fa8af3243bf4c549359a3fdcf795858cd9ad6fc0dea904d4bd832330179
-
Filesize
140KB
MD504e54b20f2288875f129b2aa2852d11a
SHA155bab3e9fb5c2915e2800bdc677ea3faf4a2995d
SHA256634cf5cf315542200f5fcd6b81a90eb67904fd7c45d8398efc5041ee60537270
SHA512dadb03f8142d0d32f44254d74d772efa189b721c19e85792bc07bc64fc505cd54135805b8a90ec9caab63954bae6bc517d2b069e826a460d1ff71017d8f6b66e
-
Filesize
140KB
MD504e54b20f2288875f129b2aa2852d11a
SHA155bab3e9fb5c2915e2800bdc677ea3faf4a2995d
SHA256634cf5cf315542200f5fcd6b81a90eb67904fd7c45d8398efc5041ee60537270
SHA512dadb03f8142d0d32f44254d74d772efa189b721c19e85792bc07bc64fc505cd54135805b8a90ec9caab63954bae6bc517d2b069e826a460d1ff71017d8f6b66e
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7