Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2023, 14:27
Static task
static1
Behavioral task
behavioral1
Sample
81165bdc8ba1d05c3c643afa323740117cdff787e76a6eba4c6f92baee397329.exe
Resource
win10v2004-20230703-en
General
-
Target
81165bdc8ba1d05c3c643afa323740117cdff787e76a6eba4c6f92baee397329.exe
-
Size
1.4MB
-
MD5
4a28a9df9510fd0a5a5762a56a5f1e99
-
SHA1
372e32f9fa3509feb510e4383dbed73488da8f6e
-
SHA256
81165bdc8ba1d05c3c643afa323740117cdff787e76a6eba4c6f92baee397329
-
SHA512
0e2420210b46ff48a9ad3a12c6b6e5465358277c1eab5afa0f9c88751989891f05a1a18cf36811941b232120a7cadcac9df7251cd6b52eadb73aa63c4a41d4fc
-
SSDEEP
24576:Oyd3WzYqXieYBI6YPMeURk0oXxBFjM1537evyCZ+mNyeGVbnGclPxXBmS:ddmUqGIrPMVNoXxBFjA5LsyA+mMnGn
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
rwan
77.91.124.73:19071
-
auth_value
7c40eda5da4f888d6f61befbf947d9fe
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 4120 y4570720.exe 1360 y1627697.exe 4816 y4431115.exe 1512 l4554733.exe 3192 m0805375.exe 2680 saves.exe 2892 n1266162.exe 828 saves.exe 3296 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 4756 rundll32.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 81165bdc8ba1d05c3c643afa323740117cdff787e76a6eba4c6f92baee397329.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y4570720.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y1627697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y4431115.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2688 schtasks.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2288 wrote to memory of 4120 2288 81165bdc8ba1d05c3c643afa323740117cdff787e76a6eba4c6f92baee397329.exe 82 PID 2288 wrote to memory of 4120 2288 81165bdc8ba1d05c3c643afa323740117cdff787e76a6eba4c6f92baee397329.exe 82 PID 2288 wrote to memory of 4120 2288 81165bdc8ba1d05c3c643afa323740117cdff787e76a6eba4c6f92baee397329.exe 82 PID 4120 wrote to memory of 1360 4120 y4570720.exe 83 PID 4120 wrote to memory of 1360 4120 y4570720.exe 83 PID 4120 wrote to memory of 1360 4120 y4570720.exe 83 PID 1360 wrote to memory of 4816 1360 y1627697.exe 84 PID 1360 wrote to memory of 4816 1360 y1627697.exe 84 PID 1360 wrote to memory of 4816 1360 y1627697.exe 84 PID 4816 wrote to memory of 1512 4816 y4431115.exe 85 PID 4816 wrote to memory of 1512 4816 y4431115.exe 85 PID 4816 wrote to memory of 1512 4816 y4431115.exe 85 PID 4816 wrote to memory of 3192 4816 y4431115.exe 88 PID 4816 wrote to memory of 3192 4816 y4431115.exe 88 PID 4816 wrote to memory of 3192 4816 y4431115.exe 88 PID 3192 wrote to memory of 2680 3192 m0805375.exe 91 PID 3192 wrote to memory of 2680 3192 m0805375.exe 91 PID 3192 wrote to memory of 2680 3192 m0805375.exe 91 PID 1360 wrote to memory of 2892 1360 y1627697.exe 92 PID 1360 wrote to memory of 2892 1360 y1627697.exe 92 PID 1360 wrote to memory of 2892 1360 y1627697.exe 92 PID 2680 wrote to memory of 2688 2680 saves.exe 93 PID 2680 wrote to memory of 2688 2680 saves.exe 93 PID 2680 wrote to memory of 2688 2680 saves.exe 93 PID 2680 wrote to memory of 4580 2680 saves.exe 95 PID 2680 wrote to memory of 4580 2680 saves.exe 95 PID 2680 wrote to memory of 4580 2680 saves.exe 95 PID 4580 wrote to memory of 4508 4580 cmd.exe 98 PID 4580 wrote to memory of 4508 4580 cmd.exe 98 PID 4580 wrote to memory of 4508 4580 cmd.exe 98 PID 4580 wrote to memory of 4992 4580 cmd.exe 97 PID 4580 wrote to memory of 4992 4580 cmd.exe 97 PID 4580 wrote to memory of 4992 4580 cmd.exe 97 PID 4580 wrote to memory of 4668 4580 cmd.exe 99 PID 4580 wrote to memory of 4668 4580 cmd.exe 99 PID 4580 wrote to memory of 4668 4580 cmd.exe 99 PID 4580 wrote to memory of 2612 4580 cmd.exe 100 PID 4580 wrote to memory of 2612 4580 cmd.exe 100 PID 4580 wrote to memory of 2612 4580 cmd.exe 100 PID 4580 wrote to memory of 944 4580 cmd.exe 101 PID 4580 wrote to memory of 944 4580 cmd.exe 101 PID 4580 wrote to memory of 944 4580 cmd.exe 101 PID 4580 wrote to memory of 3952 4580 cmd.exe 102 PID 4580 wrote to memory of 3952 4580 cmd.exe 102 PID 4580 wrote to memory of 3952 4580 cmd.exe 102 PID 2680 wrote to memory of 4756 2680 saves.exe 108 PID 2680 wrote to memory of 4756 2680 saves.exe 108 PID 2680 wrote to memory of 4756 2680 saves.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\81165bdc8ba1d05c3c643afa323740117cdff787e76a6eba4c6f92baee397329.exe"C:\Users\Admin\AppData\Local\Temp\81165bdc8ba1d05c3c643afa323740117cdff787e76a6eba4c6f92baee397329.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4570720.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4570720.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y1627697.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y1627697.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y4431115.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y4431115.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l4554733.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l4554733.exe5⤵
- Executes dropped EXE
PID:1512
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m0805375.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m0805375.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:2688
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:4992
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4508
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:4668
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2612
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:944
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:3952
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:4756
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n1266162.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n1266162.exe4⤵
- Executes dropped EXE
PID:2892
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:828
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:3296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5d8b3a4f9da00f62d80ebd0f6a9ea0183
SHA199fe62b0181f6f9a871d736cfb6a49cde7b41374
SHA2565c3b0fbedb4b61e1039ec6db84af754a23d521646b2aa653a1acb3596e99ddf9
SHA51261eb98b339b513ce6efb6b96d281db436520279b4c2b0bc33ae6e85085a8ebb305a8445889659a562c49f93d411a542f8dcbaad1000fc1e576e1659547454ec4
-
Filesize
1.3MB
MD5d8b3a4f9da00f62d80ebd0f6a9ea0183
SHA199fe62b0181f6f9a871d736cfb6a49cde7b41374
SHA2565c3b0fbedb4b61e1039ec6db84af754a23d521646b2aa653a1acb3596e99ddf9
SHA51261eb98b339b513ce6efb6b96d281db436520279b4c2b0bc33ae6e85085a8ebb305a8445889659a562c49f93d411a542f8dcbaad1000fc1e576e1659547454ec4
-
Filesize
476KB
MD5f429c91e7ac933e6085479c428a0d018
SHA1fe8b083bf3600c63c018e9c987ea3baa6c44e100
SHA256c852a100703a36dec3a55f77d316e6a0589b66049c19cdb672e5936c27a2b2d9
SHA5128a9f44d6e19bb8626f5941f061de7816f552097b889916087b3ff42dd2b909d367379b8c7cc81eb56cf3c8af0ab7ca45eac7876189c6c487f24d076d5cc82588
-
Filesize
476KB
MD5f429c91e7ac933e6085479c428a0d018
SHA1fe8b083bf3600c63c018e9c987ea3baa6c44e100
SHA256c852a100703a36dec3a55f77d316e6a0589b66049c19cdb672e5936c27a2b2d9
SHA5128a9f44d6e19bb8626f5941f061de7816f552097b889916087b3ff42dd2b909d367379b8c7cc81eb56cf3c8af0ab7ca45eac7876189c6c487f24d076d5cc82588
-
Filesize
174KB
MD5d9ebaa6868d4b766f5e41896f58a7e62
SHA141bb96248f4032bb50d99229a9e3d81e738b0553
SHA25660433c46a0a802f39a0c766efb4a612c7d335b7b1df39c2130a2e64c6711d536
SHA51249522c24ffd0c7a2b96c3f8eea028a6abb06ae907fb9065a05c07a05bdba7c36f05e7de4ee1ec948089563be40e717c68b1fbe8110c77f8b4024bc979ac4a5f5
-
Filesize
174KB
MD5d9ebaa6868d4b766f5e41896f58a7e62
SHA141bb96248f4032bb50d99229a9e3d81e738b0553
SHA25660433c46a0a802f39a0c766efb4a612c7d335b7b1df39c2130a2e64c6711d536
SHA51249522c24ffd0c7a2b96c3f8eea028a6abb06ae907fb9065a05c07a05bdba7c36f05e7de4ee1ec948089563be40e717c68b1fbe8110c77f8b4024bc979ac4a5f5
-
Filesize
320KB
MD533809c0e369e7a5e0a6d9bb2e3520963
SHA131c80032bf3dc7f29363280542510a7cc7423744
SHA256abaca4d26c08a94e465e6fa747837172590e666291e12d60e404d412732de2a2
SHA5122c55ccd6baca3779278be976e35bdcc77708d7d45ca45301444ecca6578549a3db3df391625068d17a95f2a47672e4f90a944879b3ad8f931397b4eb4a9d3d52
-
Filesize
320KB
MD533809c0e369e7a5e0a6d9bb2e3520963
SHA131c80032bf3dc7f29363280542510a7cc7423744
SHA256abaca4d26c08a94e465e6fa747837172590e666291e12d60e404d412732de2a2
SHA5122c55ccd6baca3779278be976e35bdcc77708d7d45ca45301444ecca6578549a3db3df391625068d17a95f2a47672e4f90a944879b3ad8f931397b4eb4a9d3d52
-
Filesize
140KB
MD5ac48905a5655574c1d4a8363881c4c8b
SHA1ae96d602392505f3f53f61b4b287a2e05f451544
SHA256362a77cd832c7f5e14d0e8747553653548ca9ef6fede2c32c64675f02b6ab5a7
SHA5129ce8ef0aa21d09510976793b0d69b46277719dd3a2b628d39d3111d3f772ee13f3fcb546f8a6e13a802fbe18c0498747b09d688d9627f80998a7cc5dfe168203
-
Filesize
140KB
MD5ac48905a5655574c1d4a8363881c4c8b
SHA1ae96d602392505f3f53f61b4b287a2e05f451544
SHA256362a77cd832c7f5e14d0e8747553653548ca9ef6fede2c32c64675f02b6ab5a7
SHA5129ce8ef0aa21d09510976793b0d69b46277719dd3a2b628d39d3111d3f772ee13f3fcb546f8a6e13a802fbe18c0498747b09d688d9627f80998a7cc5dfe168203
-
Filesize
318KB
MD53123a9c14961a06d5247535c10fa9fad
SHA1404c4bd0affa28d5ba9919f17604dfc0c3f57778
SHA256c251521eed684a34c4e7df4ef18324d4b28a93ff0cc8cfd448c8c71b3fecadad
SHA5127f08eaaea1f24932626ab33c62b7a90a3574ca52c9ad06d8422e800039178641b88737d4e879e23528c74632f5cb4a85512bafde5555adf8f1a460a86f7c850b
-
Filesize
318KB
MD53123a9c14961a06d5247535c10fa9fad
SHA1404c4bd0affa28d5ba9919f17604dfc0c3f57778
SHA256c251521eed684a34c4e7df4ef18324d4b28a93ff0cc8cfd448c8c71b3fecadad
SHA5127f08eaaea1f24932626ab33c62b7a90a3574ca52c9ad06d8422e800039178641b88737d4e879e23528c74632f5cb4a85512bafde5555adf8f1a460a86f7c850b
-
Filesize
318KB
MD53123a9c14961a06d5247535c10fa9fad
SHA1404c4bd0affa28d5ba9919f17604dfc0c3f57778
SHA256c251521eed684a34c4e7df4ef18324d4b28a93ff0cc8cfd448c8c71b3fecadad
SHA5127f08eaaea1f24932626ab33c62b7a90a3574ca52c9ad06d8422e800039178641b88737d4e879e23528c74632f5cb4a85512bafde5555adf8f1a460a86f7c850b
-
Filesize
318KB
MD53123a9c14961a06d5247535c10fa9fad
SHA1404c4bd0affa28d5ba9919f17604dfc0c3f57778
SHA256c251521eed684a34c4e7df4ef18324d4b28a93ff0cc8cfd448c8c71b3fecadad
SHA5127f08eaaea1f24932626ab33c62b7a90a3574ca52c9ad06d8422e800039178641b88737d4e879e23528c74632f5cb4a85512bafde5555adf8f1a460a86f7c850b
-
Filesize
318KB
MD53123a9c14961a06d5247535c10fa9fad
SHA1404c4bd0affa28d5ba9919f17604dfc0c3f57778
SHA256c251521eed684a34c4e7df4ef18324d4b28a93ff0cc8cfd448c8c71b3fecadad
SHA5127f08eaaea1f24932626ab33c62b7a90a3574ca52c9ad06d8422e800039178641b88737d4e879e23528c74632f5cb4a85512bafde5555adf8f1a460a86f7c850b
-
Filesize
318KB
MD53123a9c14961a06d5247535c10fa9fad
SHA1404c4bd0affa28d5ba9919f17604dfc0c3f57778
SHA256c251521eed684a34c4e7df4ef18324d4b28a93ff0cc8cfd448c8c71b3fecadad
SHA5127f08eaaea1f24932626ab33c62b7a90a3574ca52c9ad06d8422e800039178641b88737d4e879e23528c74632f5cb4a85512bafde5555adf8f1a460a86f7c850b
-
Filesize
318KB
MD53123a9c14961a06d5247535c10fa9fad
SHA1404c4bd0affa28d5ba9919f17604dfc0c3f57778
SHA256c251521eed684a34c4e7df4ef18324d4b28a93ff0cc8cfd448c8c71b3fecadad
SHA5127f08eaaea1f24932626ab33c62b7a90a3574ca52c9ad06d8422e800039178641b88737d4e879e23528c74632f5cb4a85512bafde5555adf8f1a460a86f7c850b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7