Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
21/08/2023, 04:05
Static task
static1
Behavioral task
behavioral1
Sample
786714aa56ad68d5d8b940b8e2f8be7beaa750dc1127d76c5ba7904bb8257ced.exe
Resource
win10-20230703-en
General
-
Target
786714aa56ad68d5d8b940b8e2f8be7beaa750dc1127d76c5ba7904bb8257ced.exe
-
Size
822KB
-
MD5
873f20848ddbe4ccac92b26463537c29
-
SHA1
6fa07a2143c8fc7ed2f2363cb6bd815d89ecf7a4
-
SHA256
786714aa56ad68d5d8b940b8e2f8be7beaa750dc1127d76c5ba7904bb8257ced
-
SHA512
631e3b2e2cb125f59cf42bf0f08bf03a7aa6bb1619fecd24fe9be7690cc5e04297f32f75b3732cf2f0df8ade810bac04c119e0ab810fa46d236f98d0b424e830
-
SSDEEP
12288:jMrZy90fDUkB787WHRDtfJ1/qCLSUR7zkvdczM4/mGjoshos9+xAlwxdL5atPeM4:GysHC7KZt3FRPkdZ4/mInhos45L8QM4
Malware Config
Extracted
amadey
S-%lu-
77.91.68.18/nice/index.php
3.87/nice/index.php
Extracted
redline
chang
77.91.124.73:19071
-
auth_value
92b880db64e691d6bb290d1536ce7688
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g0855498.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g0855498.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g0855498.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g0855498.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g0855498.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 4180 x0299255.exe 812 x3151848.exe 828 x8227979.exe 4628 g0855498.exe 4660 h9828595.exe 3476 saves.exe 2144 i8891656.exe 3848 saves.exe 2364 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 1864 rundll32.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features g0855498.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" g0855498.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 786714aa56ad68d5d8b940b8e2f8be7beaa750dc1127d76c5ba7904bb8257ced.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x0299255.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x3151848.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x8227979.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4500 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4628 g0855498.exe 4628 g0855498.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4628 g0855498.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 3224 wrote to memory of 4180 3224 786714aa56ad68d5d8b940b8e2f8be7beaa750dc1127d76c5ba7904bb8257ced.exe 70 PID 3224 wrote to memory of 4180 3224 786714aa56ad68d5d8b940b8e2f8be7beaa750dc1127d76c5ba7904bb8257ced.exe 70 PID 3224 wrote to memory of 4180 3224 786714aa56ad68d5d8b940b8e2f8be7beaa750dc1127d76c5ba7904bb8257ced.exe 70 PID 4180 wrote to memory of 812 4180 x0299255.exe 71 PID 4180 wrote to memory of 812 4180 x0299255.exe 71 PID 4180 wrote to memory of 812 4180 x0299255.exe 71 PID 812 wrote to memory of 828 812 x3151848.exe 72 PID 812 wrote to memory of 828 812 x3151848.exe 72 PID 812 wrote to memory of 828 812 x3151848.exe 72 PID 828 wrote to memory of 4628 828 x8227979.exe 73 PID 828 wrote to memory of 4628 828 x8227979.exe 73 PID 828 wrote to memory of 4628 828 x8227979.exe 73 PID 828 wrote to memory of 4660 828 x8227979.exe 74 PID 828 wrote to memory of 4660 828 x8227979.exe 74 PID 828 wrote to memory of 4660 828 x8227979.exe 74 PID 4660 wrote to memory of 3476 4660 h9828595.exe 75 PID 4660 wrote to memory of 3476 4660 h9828595.exe 75 PID 4660 wrote to memory of 3476 4660 h9828595.exe 75 PID 812 wrote to memory of 2144 812 x3151848.exe 76 PID 812 wrote to memory of 2144 812 x3151848.exe 76 PID 812 wrote to memory of 2144 812 x3151848.exe 76 PID 3476 wrote to memory of 4500 3476 saves.exe 77 PID 3476 wrote to memory of 4500 3476 saves.exe 77 PID 3476 wrote to memory of 4500 3476 saves.exe 77 PID 3476 wrote to memory of 4812 3476 saves.exe 79 PID 3476 wrote to memory of 4812 3476 saves.exe 79 PID 3476 wrote to memory of 4812 3476 saves.exe 79 PID 4812 wrote to memory of 4256 4812 cmd.exe 81 PID 4812 wrote to memory of 4256 4812 cmd.exe 81 PID 4812 wrote to memory of 4256 4812 cmd.exe 81 PID 4812 wrote to memory of 1428 4812 cmd.exe 82 PID 4812 wrote to memory of 1428 4812 cmd.exe 82 PID 4812 wrote to memory of 1428 4812 cmd.exe 82 PID 4812 wrote to memory of 2516 4812 cmd.exe 83 PID 4812 wrote to memory of 2516 4812 cmd.exe 83 PID 4812 wrote to memory of 2516 4812 cmd.exe 83 PID 4812 wrote to memory of 4112 4812 cmd.exe 84 PID 4812 wrote to memory of 4112 4812 cmd.exe 84 PID 4812 wrote to memory of 4112 4812 cmd.exe 84 PID 4812 wrote to memory of 3504 4812 cmd.exe 85 PID 4812 wrote to memory of 3504 4812 cmd.exe 85 PID 4812 wrote to memory of 3504 4812 cmd.exe 85 PID 4812 wrote to memory of 4084 4812 cmd.exe 86 PID 4812 wrote to memory of 4084 4812 cmd.exe 86 PID 4812 wrote to memory of 4084 4812 cmd.exe 86 PID 3476 wrote to memory of 1864 3476 saves.exe 88 PID 3476 wrote to memory of 1864 3476 saves.exe 88 PID 3476 wrote to memory of 1864 3476 saves.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\786714aa56ad68d5d8b940b8e2f8be7beaa750dc1127d76c5ba7904bb8257ced.exe"C:\Users\Admin\AppData\Local\Temp\786714aa56ad68d5d8b940b8e2f8be7beaa750dc1127d76c5ba7904bb8257ced.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0299255.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0299255.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3151848.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3151848.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8227979.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8227979.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0855498.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0855498.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4628
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h9828595.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h9828595.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:4500
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4256
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:1428
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:2516
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4112
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:3504
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:4084
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:1864
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i8891656.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i8891656.exe4⤵
- Executes dropped EXE
PID:2144
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:3848
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2364
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706KB
MD568118c2c09ee11b4f696a72bf2879045
SHA1d8ffe4529270dbe011815428440534e6a4e3e73a
SHA25664682c3fb53a6a48e5d3610a0bdadfe48439a0a140828b76520f66cae8b6b025
SHA512810a8733f0a35d6194b286942b6813777ec9075a413954657688a150cb21e76141729f810112ce87d6f2143624962834b449d4fe1735ba3a1094c92f5b60d687
-
Filesize
706KB
MD568118c2c09ee11b4f696a72bf2879045
SHA1d8ffe4529270dbe011815428440534e6a4e3e73a
SHA25664682c3fb53a6a48e5d3610a0bdadfe48439a0a140828b76520f66cae8b6b025
SHA512810a8733f0a35d6194b286942b6813777ec9075a413954657688a150cb21e76141729f810112ce87d6f2143624962834b449d4fe1735ba3a1094c92f5b60d687
-
Filesize
540KB
MD5a86afbfc17b4a2e43d3a3319bcfa1edd
SHA14ac202e566b6f1eae890329234c112e05631df51
SHA256ccf6292b4dc48e49035486fb88cb2b29c13cc580aef242105b9727c4a27f55cd
SHA5123a1328ff8f3d95ac3d0feefb2fa94a88f64944f833a1ecca7305d3bd48fa9126f4ccc9792ea936457a69a8e61293252735eed7affc93a699d41bc8125f3fa13b
-
Filesize
540KB
MD5a86afbfc17b4a2e43d3a3319bcfa1edd
SHA14ac202e566b6f1eae890329234c112e05631df51
SHA256ccf6292b4dc48e49035486fb88cb2b29c13cc580aef242105b9727c4a27f55cd
SHA5123a1328ff8f3d95ac3d0feefb2fa94a88f64944f833a1ecca7305d3bd48fa9126f4ccc9792ea936457a69a8e61293252735eed7affc93a699d41bc8125f3fa13b
-
Filesize
174KB
MD5d3c2645e81be05aa4e3d7a1b3c3c2399
SHA1c61b5603d76be60271356df9b4f53e2e47514070
SHA256aa2922c67ed9fbe166e31be7b45489d4aa301ffc19231cd105bd42fdfa5100f2
SHA512f830e589eaf98d7ac9ea391a91a338645b92155987eb3cf162dee9bf34cc7806366b4be9bd75e7b910e4ce74fd7875a089749fce3bf8e20ab10dbdb951045da9
-
Filesize
174KB
MD5d3c2645e81be05aa4e3d7a1b3c3c2399
SHA1c61b5603d76be60271356df9b4f53e2e47514070
SHA256aa2922c67ed9fbe166e31be7b45489d4aa301ffc19231cd105bd42fdfa5100f2
SHA512f830e589eaf98d7ac9ea391a91a338645b92155987eb3cf162dee9bf34cc7806366b4be9bd75e7b910e4ce74fd7875a089749fce3bf8e20ab10dbdb951045da9
-
Filesize
384KB
MD5c2c3007128677ec460812fc94578f1d3
SHA1699676fa2e1b554f4e08f339e3761d32769e653d
SHA256ad1d12168aa610060905b57c4a1e3e8e6e2bd0e0ae0cb35fe2b265ffbc55531d
SHA51262a3e406da912e981c8e8ea4d634e379d4e6d9aaf5d92528d24bdea8adc73fd9dcd11bc1b73cf69388f369993a0e9f02cb5ab9deef42920f3a4cc3319f7e7382
-
Filesize
384KB
MD5c2c3007128677ec460812fc94578f1d3
SHA1699676fa2e1b554f4e08f339e3761d32769e653d
SHA256ad1d12168aa610060905b57c4a1e3e8e6e2bd0e0ae0cb35fe2b265ffbc55531d
SHA51262a3e406da912e981c8e8ea4d634e379d4e6d9aaf5d92528d24bdea8adc73fd9dcd11bc1b73cf69388f369993a0e9f02cb5ab9deef42920f3a4cc3319f7e7382
-
Filesize
184KB
MD56c66ee490b48b1419e8a4ddfbe9b9429
SHA1434a2b34aa91df9a7213de6c1898b52baf469650
SHA25605ab58240d404faa469be9dff4a5d656cc9a95a93e81c7df78a20276723534fb
SHA5129364ff647e8abbc91889f71fca41a3a09fdab428508f48ed1cacc7c93b88eb7271149e246d7f0947a73d6e0d91b95eab68de52fb8123eb5d65bb0b4a98be8471
-
Filesize
184KB
MD56c66ee490b48b1419e8a4ddfbe9b9429
SHA1434a2b34aa91df9a7213de6c1898b52baf469650
SHA25605ab58240d404faa469be9dff4a5d656cc9a95a93e81c7df78a20276723534fb
SHA5129364ff647e8abbc91889f71fca41a3a09fdab428508f48ed1cacc7c93b88eb7271149e246d7f0947a73d6e0d91b95eab68de52fb8123eb5d65bb0b4a98be8471
-
Filesize
313KB
MD5a6ccf113956e580338e2558afe302790
SHA19828616948ade79a47f22286e6a07ec96fffac98
SHA25657086543dcb94bed3652c255a0e552d105602eb56316c2333ff8b53feac49d5d
SHA51285b9acc404ad1ccfaae777ebc689f0c6509a8158b4fdc14f4b3a7392bcce82315c08e5fe6af565979802bdb517a2ad6b27a84b284b5bf4d6e792bffb5dbb62dc
-
Filesize
313KB
MD5a6ccf113956e580338e2558afe302790
SHA19828616948ade79a47f22286e6a07ec96fffac98
SHA25657086543dcb94bed3652c255a0e552d105602eb56316c2333ff8b53feac49d5d
SHA51285b9acc404ad1ccfaae777ebc689f0c6509a8158b4fdc14f4b3a7392bcce82315c08e5fe6af565979802bdb517a2ad6b27a84b284b5bf4d6e792bffb5dbb62dc
-
Filesize
313KB
MD5a6ccf113956e580338e2558afe302790
SHA19828616948ade79a47f22286e6a07ec96fffac98
SHA25657086543dcb94bed3652c255a0e552d105602eb56316c2333ff8b53feac49d5d
SHA51285b9acc404ad1ccfaae777ebc689f0c6509a8158b4fdc14f4b3a7392bcce82315c08e5fe6af565979802bdb517a2ad6b27a84b284b5bf4d6e792bffb5dbb62dc
-
Filesize
313KB
MD5a6ccf113956e580338e2558afe302790
SHA19828616948ade79a47f22286e6a07ec96fffac98
SHA25657086543dcb94bed3652c255a0e552d105602eb56316c2333ff8b53feac49d5d
SHA51285b9acc404ad1ccfaae777ebc689f0c6509a8158b4fdc14f4b3a7392bcce82315c08e5fe6af565979802bdb517a2ad6b27a84b284b5bf4d6e792bffb5dbb62dc
-
Filesize
313KB
MD5a6ccf113956e580338e2558afe302790
SHA19828616948ade79a47f22286e6a07ec96fffac98
SHA25657086543dcb94bed3652c255a0e552d105602eb56316c2333ff8b53feac49d5d
SHA51285b9acc404ad1ccfaae777ebc689f0c6509a8158b4fdc14f4b3a7392bcce82315c08e5fe6af565979802bdb517a2ad6b27a84b284b5bf4d6e792bffb5dbb62dc
-
Filesize
313KB
MD5a6ccf113956e580338e2558afe302790
SHA19828616948ade79a47f22286e6a07ec96fffac98
SHA25657086543dcb94bed3652c255a0e552d105602eb56316c2333ff8b53feac49d5d
SHA51285b9acc404ad1ccfaae777ebc689f0c6509a8158b4fdc14f4b3a7392bcce82315c08e5fe6af565979802bdb517a2ad6b27a84b284b5bf4d6e792bffb5dbb62dc
-
Filesize
313KB
MD5a6ccf113956e580338e2558afe302790
SHA19828616948ade79a47f22286e6a07ec96fffac98
SHA25657086543dcb94bed3652c255a0e552d105602eb56316c2333ff8b53feac49d5d
SHA51285b9acc404ad1ccfaae777ebc689f0c6509a8158b4fdc14f4b3a7392bcce82315c08e5fe6af565979802bdb517a2ad6b27a84b284b5bf4d6e792bffb5dbb62dc
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b