Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2023, 23:58
Static task
static1
Behavioral task
behavioral1
Sample
5569c823243f95190890eab510aae4546184bf5109494022cfef2154285ac220.exe
Resource
win10v2004-20230703-en
General
-
Target
5569c823243f95190890eab510aae4546184bf5109494022cfef2154285ac220.exe
-
Size
592KB
-
MD5
2665cdc595ce23cc42633b8f0ba0f4e9
-
SHA1
d5ed86ecd8e991f7ed7a4ce7acb05666a4a4aca1
-
SHA256
5569c823243f95190890eab510aae4546184bf5109494022cfef2154285ac220
-
SHA512
dd4776adadf2232788a414346fd5b9a611c8f0351c8b49c1e6a52e407c64de4a5aaa0636fd26c879bfd18163c0cce7d328c6059168c448bfebd2da75e582c691
-
SSDEEP
12288:xMr3y90bVDJiE9dtfWHCsx1kc0U8dEvLjqaMLRMXKTbR3FfvT:SyQVDJH5WHZ1kcZRCFT
Malware Config
Extracted
amadey
S-%lu-
77.91.68.18/nice/index.php
3.87/nice/index.php
Extracted
redline
piter
77.91.124.73:19071
-
auth_value
7f92ff466423bb35edbfbc22f78b0bb9
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 5060 y1755926.exe 1588 y2874971.exe 1552 m7022304.exe 5068 n8579056.exe 5012 saves.exe 3208 o2285642.exe 2496 saves.exe 4780 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 912 rundll32.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y2874971.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5569c823243f95190890eab510aae4546184bf5109494022cfef2154285ac220.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y1755926.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2876 schtasks.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 1104 wrote to memory of 5060 1104 5569c823243f95190890eab510aae4546184bf5109494022cfef2154285ac220.exe 80 PID 1104 wrote to memory of 5060 1104 5569c823243f95190890eab510aae4546184bf5109494022cfef2154285ac220.exe 80 PID 1104 wrote to memory of 5060 1104 5569c823243f95190890eab510aae4546184bf5109494022cfef2154285ac220.exe 80 PID 5060 wrote to memory of 1588 5060 y1755926.exe 81 PID 5060 wrote to memory of 1588 5060 y1755926.exe 81 PID 5060 wrote to memory of 1588 5060 y1755926.exe 81 PID 1588 wrote to memory of 1552 1588 y2874971.exe 82 PID 1588 wrote to memory of 1552 1588 y2874971.exe 82 PID 1588 wrote to memory of 1552 1588 y2874971.exe 82 PID 1588 wrote to memory of 5068 1588 y2874971.exe 83 PID 1588 wrote to memory of 5068 1588 y2874971.exe 83 PID 1588 wrote to memory of 5068 1588 y2874971.exe 83 PID 5068 wrote to memory of 5012 5068 n8579056.exe 84 PID 5068 wrote to memory of 5012 5068 n8579056.exe 84 PID 5068 wrote to memory of 5012 5068 n8579056.exe 84 PID 5060 wrote to memory of 3208 5060 y1755926.exe 85 PID 5060 wrote to memory of 3208 5060 y1755926.exe 85 PID 5060 wrote to memory of 3208 5060 y1755926.exe 85 PID 5012 wrote to memory of 2876 5012 saves.exe 87 PID 5012 wrote to memory of 2876 5012 saves.exe 87 PID 5012 wrote to memory of 2876 5012 saves.exe 87 PID 5012 wrote to memory of 2504 5012 saves.exe 89 PID 5012 wrote to memory of 2504 5012 saves.exe 89 PID 5012 wrote to memory of 2504 5012 saves.exe 89 PID 2504 wrote to memory of 1872 2504 cmd.exe 91 PID 2504 wrote to memory of 1872 2504 cmd.exe 91 PID 2504 wrote to memory of 1872 2504 cmd.exe 91 PID 2504 wrote to memory of 3236 2504 cmd.exe 92 PID 2504 wrote to memory of 3236 2504 cmd.exe 92 PID 2504 wrote to memory of 3236 2504 cmd.exe 92 PID 2504 wrote to memory of 1100 2504 cmd.exe 93 PID 2504 wrote to memory of 1100 2504 cmd.exe 93 PID 2504 wrote to memory of 1100 2504 cmd.exe 93 PID 2504 wrote to memory of 3712 2504 cmd.exe 94 PID 2504 wrote to memory of 3712 2504 cmd.exe 94 PID 2504 wrote to memory of 3712 2504 cmd.exe 94 PID 2504 wrote to memory of 2816 2504 cmd.exe 95 PID 2504 wrote to memory of 2816 2504 cmd.exe 95 PID 2504 wrote to memory of 2816 2504 cmd.exe 95 PID 2504 wrote to memory of 3864 2504 cmd.exe 96 PID 2504 wrote to memory of 3864 2504 cmd.exe 96 PID 2504 wrote to memory of 3864 2504 cmd.exe 96 PID 5012 wrote to memory of 912 5012 saves.exe 106 PID 5012 wrote to memory of 912 5012 saves.exe 106 PID 5012 wrote to memory of 912 5012 saves.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\5569c823243f95190890eab510aae4546184bf5109494022cfef2154285ac220.exe"C:\Users\Admin\AppData\Local\Temp\5569c823243f95190890eab510aae4546184bf5109494022cfef2154285ac220.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1755926.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1755926.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y2874971.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y2874971.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\m7022304.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\m7022304.exe4⤵
- Executes dropped EXE
PID:1552
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n8579056.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n8579056.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F6⤵
- Creates scheduled task(s)
PID:2876
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1872
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"7⤵PID:3236
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E7⤵PID:1100
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3712
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"7⤵PID:2816
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E7⤵PID:3864
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:912
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o2285642.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o2285642.exe3⤵
- Executes dropped EXE
PID:3208
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2496
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
476KB
MD512755fa4d6674ca7061743cb12264cad
SHA17c4ff2098979e1585503aa5eda0bd9d24ee5d6f3
SHA256b91573362277467f17ff330747256a5be8f6cab4795df6a50f1dd595cfbaca0d
SHA512e7ab41ae6a8f2dfa4da779ae780bc64ee842541be311e1fd94859b6b32c2c2c1d5a71db937c7447b248b785fd0962b25b6433b55cb76498c1d7c5b138a877aeb
-
Filesize
476KB
MD512755fa4d6674ca7061743cb12264cad
SHA17c4ff2098979e1585503aa5eda0bd9d24ee5d6f3
SHA256b91573362277467f17ff330747256a5be8f6cab4795df6a50f1dd595cfbaca0d
SHA512e7ab41ae6a8f2dfa4da779ae780bc64ee842541be311e1fd94859b6b32c2c2c1d5a71db937c7447b248b785fd0962b25b6433b55cb76498c1d7c5b138a877aeb
-
Filesize
174KB
MD52329f2a93247fde0de10f075e036e24d
SHA10c3baaee8262cb232561e091843b81d4c6b1e7b3
SHA2562f14051499c59284dc298e6e1c944d4e5d74035bdfcc7504e1258ee26b3a0d88
SHA5120cff7241930b1ef3608f349e7a4d16ec732be8de289e250bf079edfd41d2041819f46c16e24608064621428d28223187d7120cb2a05d1db2ff2dcdfe712ac51e
-
Filesize
174KB
MD52329f2a93247fde0de10f075e036e24d
SHA10c3baaee8262cb232561e091843b81d4c6b1e7b3
SHA2562f14051499c59284dc298e6e1c944d4e5d74035bdfcc7504e1258ee26b3a0d88
SHA5120cff7241930b1ef3608f349e7a4d16ec732be8de289e250bf079edfd41d2041819f46c16e24608064621428d28223187d7120cb2a05d1db2ff2dcdfe712ac51e
-
Filesize
320KB
MD5ce19b799a52ec1964f29e2b20a4015fc
SHA12a3e5382f819f6aa0d1dcfa3bf2d012e3a3e0d4a
SHA2568f589508537cb9f408b0aad5a3f5b2592b778d3222c49445cea5b8d6d24a3db8
SHA51218d5188302fd1f00539568e3b53253333886f6999bf177b9827a1470fdb12319089ebcc058e411c35556c1d443c0e49fab9452cf3743893c152de02f247121bb
-
Filesize
320KB
MD5ce19b799a52ec1964f29e2b20a4015fc
SHA12a3e5382f819f6aa0d1dcfa3bf2d012e3a3e0d4a
SHA2568f589508537cb9f408b0aad5a3f5b2592b778d3222c49445cea5b8d6d24a3db8
SHA51218d5188302fd1f00539568e3b53253333886f6999bf177b9827a1470fdb12319089ebcc058e411c35556c1d443c0e49fab9452cf3743893c152de02f247121bb
-
Filesize
140KB
MD573b1abee5658d2bfea048f7f5986f957
SHA1bf4452e91e2dbc233e5da83b663aba098e9ce3bb
SHA2561a41ace5bf261f24ab04b4bbbebaf4357c4298919acd1a3f9088e3ef8dca88e7
SHA5121eb516edbf16ee78ff1aade4021b1ca235de415e5a1ecd0880751305f2bc394f149b328b0557ad7d9255d07bd09dac50973e7332fb2b6f62e6bd2cdd340bc067
-
Filesize
140KB
MD573b1abee5658d2bfea048f7f5986f957
SHA1bf4452e91e2dbc233e5da83b663aba098e9ce3bb
SHA2561a41ace5bf261f24ab04b4bbbebaf4357c4298919acd1a3f9088e3ef8dca88e7
SHA5121eb516edbf16ee78ff1aade4021b1ca235de415e5a1ecd0880751305f2bc394f149b328b0557ad7d9255d07bd09dac50973e7332fb2b6f62e6bd2cdd340bc067
-
Filesize
314KB
MD50397006d75d7fb79b62712897573acdb
SHA191750de25ca169ebaa22bfa3eac6a8cbd63240c7
SHA256b8f60835e99c0b29d10cc34c6bba52d24c472b06c875fcc782b5fcda8835c777
SHA51297449bacdb954e3769bcc5334fc2b7875a5a6b35daec713df00b9a588dfef7bc6de5b7908c274f5be463b36224b41da9a9f56ec89c601be3b425e2461bace095
-
Filesize
314KB
MD50397006d75d7fb79b62712897573acdb
SHA191750de25ca169ebaa22bfa3eac6a8cbd63240c7
SHA256b8f60835e99c0b29d10cc34c6bba52d24c472b06c875fcc782b5fcda8835c777
SHA51297449bacdb954e3769bcc5334fc2b7875a5a6b35daec713df00b9a588dfef7bc6de5b7908c274f5be463b36224b41da9a9f56ec89c601be3b425e2461bace095
-
Filesize
314KB
MD50397006d75d7fb79b62712897573acdb
SHA191750de25ca169ebaa22bfa3eac6a8cbd63240c7
SHA256b8f60835e99c0b29d10cc34c6bba52d24c472b06c875fcc782b5fcda8835c777
SHA51297449bacdb954e3769bcc5334fc2b7875a5a6b35daec713df00b9a588dfef7bc6de5b7908c274f5be463b36224b41da9a9f56ec89c601be3b425e2461bace095
-
Filesize
314KB
MD50397006d75d7fb79b62712897573acdb
SHA191750de25ca169ebaa22bfa3eac6a8cbd63240c7
SHA256b8f60835e99c0b29d10cc34c6bba52d24c472b06c875fcc782b5fcda8835c777
SHA51297449bacdb954e3769bcc5334fc2b7875a5a6b35daec713df00b9a588dfef7bc6de5b7908c274f5be463b36224b41da9a9f56ec89c601be3b425e2461bace095
-
Filesize
314KB
MD50397006d75d7fb79b62712897573acdb
SHA191750de25ca169ebaa22bfa3eac6a8cbd63240c7
SHA256b8f60835e99c0b29d10cc34c6bba52d24c472b06c875fcc782b5fcda8835c777
SHA51297449bacdb954e3769bcc5334fc2b7875a5a6b35daec713df00b9a588dfef7bc6de5b7908c274f5be463b36224b41da9a9f56ec89c601be3b425e2461bace095
-
Filesize
314KB
MD50397006d75d7fb79b62712897573acdb
SHA191750de25ca169ebaa22bfa3eac6a8cbd63240c7
SHA256b8f60835e99c0b29d10cc34c6bba52d24c472b06c875fcc782b5fcda8835c777
SHA51297449bacdb954e3769bcc5334fc2b7875a5a6b35daec713df00b9a588dfef7bc6de5b7908c274f5be463b36224b41da9a9f56ec89c601be3b425e2461bace095
-
Filesize
314KB
MD50397006d75d7fb79b62712897573acdb
SHA191750de25ca169ebaa22bfa3eac6a8cbd63240c7
SHA256b8f60835e99c0b29d10cc34c6bba52d24c472b06c875fcc782b5fcda8835c777
SHA51297449bacdb954e3769bcc5334fc2b7875a5a6b35daec713df00b9a588dfef7bc6de5b7908c274f5be463b36224b41da9a9f56ec89c601be3b425e2461bace095
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7