Analysis
-
max time kernel
135s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
21/08/2023, 01:31
Static task
static1
Behavioral task
behavioral1
Sample
c027d40997ae053ec2265848d2aaefaccba43a375e6477ad34f310450f28366f.exe
Resource
win10-20230703-en
General
-
Target
c027d40997ae053ec2265848d2aaefaccba43a375e6477ad34f310450f28366f.exe
-
Size
591KB
-
MD5
84d9418571b1bc0eac473042f8151684
-
SHA1
ff3b9add7b8e69cbd54a7815aee2e32f58a9e642
-
SHA256
c027d40997ae053ec2265848d2aaefaccba43a375e6477ad34f310450f28366f
-
SHA512
707b88a318ead9c3fd52e95ca7e888c20ff966f76b6e1b774939dc06514710727705a80f430169811276a29af1bcf807d01331ece8da044a5ef565940646d7fc
-
SSDEEP
12288:7Mr8y90R+KMFBt0s/ARmc0y5ZsgT64nwuWxRyzH:fy/KGboeyTTb1Fz
Malware Config
Extracted
amadey
S-%lu-
77.91.68.18/nice/index.php
3.87/nice/index.php
Extracted
redline
chang
77.91.124.73:19071
-
auth_value
92b880db64e691d6bb290d1536ce7688
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 1328 y8612716.exe 3868 y0154153.exe 2392 m3940533.exe 2400 n4463116.exe 1224 saves.exe 2124 o5416220.exe 4860 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 4136 rundll32.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y8612716.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y0154153.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c027d40997ae053ec2265848d2aaefaccba43a375e6477ad34f310450f28366f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2480 schtasks.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 4312 wrote to memory of 1328 4312 c027d40997ae053ec2265848d2aaefaccba43a375e6477ad34f310450f28366f.exe 70 PID 4312 wrote to memory of 1328 4312 c027d40997ae053ec2265848d2aaefaccba43a375e6477ad34f310450f28366f.exe 70 PID 4312 wrote to memory of 1328 4312 c027d40997ae053ec2265848d2aaefaccba43a375e6477ad34f310450f28366f.exe 70 PID 1328 wrote to memory of 3868 1328 y8612716.exe 71 PID 1328 wrote to memory of 3868 1328 y8612716.exe 71 PID 1328 wrote to memory of 3868 1328 y8612716.exe 71 PID 3868 wrote to memory of 2392 3868 y0154153.exe 72 PID 3868 wrote to memory of 2392 3868 y0154153.exe 72 PID 3868 wrote to memory of 2392 3868 y0154153.exe 72 PID 3868 wrote to memory of 2400 3868 y0154153.exe 73 PID 3868 wrote to memory of 2400 3868 y0154153.exe 73 PID 3868 wrote to memory of 2400 3868 y0154153.exe 73 PID 2400 wrote to memory of 1224 2400 n4463116.exe 74 PID 2400 wrote to memory of 1224 2400 n4463116.exe 74 PID 2400 wrote to memory of 1224 2400 n4463116.exe 74 PID 1328 wrote to memory of 2124 1328 y8612716.exe 75 PID 1328 wrote to memory of 2124 1328 y8612716.exe 75 PID 1328 wrote to memory of 2124 1328 y8612716.exe 75 PID 1224 wrote to memory of 2480 1224 saves.exe 76 PID 1224 wrote to memory of 2480 1224 saves.exe 76 PID 1224 wrote to memory of 2480 1224 saves.exe 76 PID 1224 wrote to memory of 4308 1224 saves.exe 78 PID 1224 wrote to memory of 4308 1224 saves.exe 78 PID 1224 wrote to memory of 4308 1224 saves.exe 78 PID 4308 wrote to memory of 4560 4308 cmd.exe 80 PID 4308 wrote to memory of 4560 4308 cmd.exe 80 PID 4308 wrote to memory of 4560 4308 cmd.exe 80 PID 4308 wrote to memory of 3012 4308 cmd.exe 81 PID 4308 wrote to memory of 3012 4308 cmd.exe 81 PID 4308 wrote to memory of 3012 4308 cmd.exe 81 PID 4308 wrote to memory of 2844 4308 cmd.exe 82 PID 4308 wrote to memory of 2844 4308 cmd.exe 82 PID 4308 wrote to memory of 2844 4308 cmd.exe 82 PID 4308 wrote to memory of 4520 4308 cmd.exe 83 PID 4308 wrote to memory of 4520 4308 cmd.exe 83 PID 4308 wrote to memory of 4520 4308 cmd.exe 83 PID 4308 wrote to memory of 3968 4308 cmd.exe 84 PID 4308 wrote to memory of 3968 4308 cmd.exe 84 PID 4308 wrote to memory of 3968 4308 cmd.exe 84 PID 4308 wrote to memory of 4932 4308 cmd.exe 85 PID 4308 wrote to memory of 4932 4308 cmd.exe 85 PID 4308 wrote to memory of 4932 4308 cmd.exe 85 PID 1224 wrote to memory of 4136 1224 saves.exe 86 PID 1224 wrote to memory of 4136 1224 saves.exe 86 PID 1224 wrote to memory of 4136 1224 saves.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\c027d40997ae053ec2265848d2aaefaccba43a375e6477ad34f310450f28366f.exe"C:\Users\Admin\AppData\Local\Temp\c027d40997ae053ec2265848d2aaefaccba43a375e6477ad34f310450f28366f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8612716.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8612716.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0154153.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0154153.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\m3940533.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\m3940533.exe4⤵
- Executes dropped EXE
PID:2392
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n4463116.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n4463116.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F6⤵
- Creates scheduled task(s)
PID:2480
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4560
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"7⤵PID:3012
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E7⤵PID:2844
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4520
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"7⤵PID:3968
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E7⤵PID:4932
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:4136
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o5416220.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o5416220.exe3⤵
- Executes dropped EXE
PID:2124
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
476KB
MD57aceb16b645b768accec60d0cdb3dcec
SHA19a6592b5e555bf749fc598f34600861d2aae87d1
SHA2564bb47264b911dd5e59de7c6ea000c90822e5c4638e0a86ea05ec90f0fcae81de
SHA5123e1b315f14a1a9bae38a201e02af7bcb7ede6db22a5f6674ba327cab7d58fa203b267fccda3f1509f9078d1b7aada78ab44ee6c14edd9a011141e1ac72fdb198
-
Filesize
476KB
MD57aceb16b645b768accec60d0cdb3dcec
SHA19a6592b5e555bf749fc598f34600861d2aae87d1
SHA2564bb47264b911dd5e59de7c6ea000c90822e5c4638e0a86ea05ec90f0fcae81de
SHA5123e1b315f14a1a9bae38a201e02af7bcb7ede6db22a5f6674ba327cab7d58fa203b267fccda3f1509f9078d1b7aada78ab44ee6c14edd9a011141e1ac72fdb198
-
Filesize
174KB
MD5cbe983ce8f989c0d390f4d007a576bd8
SHA1c09c92e04bffa8f51bdf9717dae0b9d164681d65
SHA25683c89719a44804c565c4ec57f315bb97fe6bdd283b7ce2e741e4bb450aa16099
SHA512e5fe28a9c25bf57a54cdea7d6e217c5fb2d2699e4c99aeb6e8d5587adffd97d2b804496e25fac46290a0ef43272b1f0edcea4a03e820116899d786fd98c2322f
-
Filesize
174KB
MD5cbe983ce8f989c0d390f4d007a576bd8
SHA1c09c92e04bffa8f51bdf9717dae0b9d164681d65
SHA25683c89719a44804c565c4ec57f315bb97fe6bdd283b7ce2e741e4bb450aa16099
SHA512e5fe28a9c25bf57a54cdea7d6e217c5fb2d2699e4c99aeb6e8d5587adffd97d2b804496e25fac46290a0ef43272b1f0edcea4a03e820116899d786fd98c2322f
-
Filesize
320KB
MD50e8cfacc7d267ad1d25c1ece1e2e4046
SHA1c237c6abc910eb718a37db13fd225689503b0917
SHA25654b3efb42b4eea0e1cb3be2c1d28580f89362806a49cced058bce47df3ec81e2
SHA5120f60fb14596dfc98d205ac2da946cf9a5efc2dd6f0c7a3bff36e3b237d36185db03a1b05bc55b4d526bbbccda2c40d174e19992649f12a1b9169ca51cddbd194
-
Filesize
320KB
MD50e8cfacc7d267ad1d25c1ece1e2e4046
SHA1c237c6abc910eb718a37db13fd225689503b0917
SHA25654b3efb42b4eea0e1cb3be2c1d28580f89362806a49cced058bce47df3ec81e2
SHA5120f60fb14596dfc98d205ac2da946cf9a5efc2dd6f0c7a3bff36e3b237d36185db03a1b05bc55b4d526bbbccda2c40d174e19992649f12a1b9169ca51cddbd194
-
Filesize
140KB
MD5129693bab83d2e7dd860410a3af4763f
SHA14dda06d8a4fd3030d41ab191ff4439c63db49f07
SHA2563947c497abe4e268711ac5043ed14db7484048d175690c14f52035518bc5027b
SHA51211b5015567dc782066d320a78b0542d5cfc03a85caeaa998578c7b827ed684bbb47133916003fd6ed797505262450f55b74ba7f1984d354ea5bde79902f5033e
-
Filesize
140KB
MD5129693bab83d2e7dd860410a3af4763f
SHA14dda06d8a4fd3030d41ab191ff4439c63db49f07
SHA2563947c497abe4e268711ac5043ed14db7484048d175690c14f52035518bc5027b
SHA51211b5015567dc782066d320a78b0542d5cfc03a85caeaa998578c7b827ed684bbb47133916003fd6ed797505262450f55b74ba7f1984d354ea5bde79902f5033e
-
Filesize
313KB
MD57f456821947f484acaba4959d541aa76
SHA1ce39417bab0ec9477542612afe22c423f01e51d5
SHA2569237129f4b7de0d4ee456ecede2bab442db4a9453ebe1d7eb57605d18a2fe7e8
SHA5126512cca21aaf11f15b6052d5bfce936109740e27faf61b4bbc061d1e80bd9c4b03df1b650ac52a7cd9f8b28b5d4700b6d233eb9c1007a0afc34db63d17214f04
-
Filesize
313KB
MD57f456821947f484acaba4959d541aa76
SHA1ce39417bab0ec9477542612afe22c423f01e51d5
SHA2569237129f4b7de0d4ee456ecede2bab442db4a9453ebe1d7eb57605d18a2fe7e8
SHA5126512cca21aaf11f15b6052d5bfce936109740e27faf61b4bbc061d1e80bd9c4b03df1b650ac52a7cd9f8b28b5d4700b6d233eb9c1007a0afc34db63d17214f04
-
Filesize
313KB
MD57f456821947f484acaba4959d541aa76
SHA1ce39417bab0ec9477542612afe22c423f01e51d5
SHA2569237129f4b7de0d4ee456ecede2bab442db4a9453ebe1d7eb57605d18a2fe7e8
SHA5126512cca21aaf11f15b6052d5bfce936109740e27faf61b4bbc061d1e80bd9c4b03df1b650ac52a7cd9f8b28b5d4700b6d233eb9c1007a0afc34db63d17214f04
-
Filesize
313KB
MD57f456821947f484acaba4959d541aa76
SHA1ce39417bab0ec9477542612afe22c423f01e51d5
SHA2569237129f4b7de0d4ee456ecede2bab442db4a9453ebe1d7eb57605d18a2fe7e8
SHA5126512cca21aaf11f15b6052d5bfce936109740e27faf61b4bbc061d1e80bd9c4b03df1b650ac52a7cd9f8b28b5d4700b6d233eb9c1007a0afc34db63d17214f04
-
Filesize
313KB
MD57f456821947f484acaba4959d541aa76
SHA1ce39417bab0ec9477542612afe22c423f01e51d5
SHA2569237129f4b7de0d4ee456ecede2bab442db4a9453ebe1d7eb57605d18a2fe7e8
SHA5126512cca21aaf11f15b6052d5bfce936109740e27faf61b4bbc061d1e80bd9c4b03df1b650ac52a7cd9f8b28b5d4700b6d233eb9c1007a0afc34db63d17214f04
-
Filesize
313KB
MD57f456821947f484acaba4959d541aa76
SHA1ce39417bab0ec9477542612afe22c423f01e51d5
SHA2569237129f4b7de0d4ee456ecede2bab442db4a9453ebe1d7eb57605d18a2fe7e8
SHA5126512cca21aaf11f15b6052d5bfce936109740e27faf61b4bbc061d1e80bd9c4b03df1b650ac52a7cd9f8b28b5d4700b6d233eb9c1007a0afc34db63d17214f04
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b