Analysis
-
max time kernel
142s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2023, 17:35
Static task
static1
Behavioral task
behavioral1
Sample
fdcd52bdf608b6ee9c6a0d699ad312865767200e1883b17fdb64a379bc2825c5.exe
Resource
win10v2004-20230703-en
General
-
Target
fdcd52bdf608b6ee9c6a0d699ad312865767200e1883b17fdb64a379bc2825c5.exe
-
Size
1.4MB
-
MD5
a8253c8eb86b87ca39d4e3e0cadfaa7f
-
SHA1
10d5713e1a941e7e31c5d0820fb9e22070480b6a
-
SHA256
fdcd52bdf608b6ee9c6a0d699ad312865767200e1883b17fdb64a379bc2825c5
-
SHA512
8e255cbc3bde43632c4d0250711266bb70ac47ef78234e07dc135dfd4202cb23ce2ad45af35708cde8ea14bf02613720ca8bcda7e9d352c761720d5e2e1fbea9
-
SSDEEP
24576:ryVxog7wX5Vs5wh7w6KyPq196GG5L0bP9UZPuJDwTl97cMkDgqrrzvT+:eVSKeOwhU6KyPqDJG5wbPDJDwTlahgqH
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
vaga
77.91.124.73:19071
-
auth_value
393905212ded984248e8e000e612d4fe
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 5032 y7489489.exe 1684 y0276573.exe 2676 y4654341.exe 4232 l3770545.exe 3388 saves.exe 2428 m9214854.exe 2424 n0005847.exe 4524 saves.exe 400 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 1236 rundll32.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fdcd52bdf608b6ee9c6a0d699ad312865767200e1883b17fdb64a379bc2825c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y7489489.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y0276573.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y4654341.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4740 schtasks.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 316 wrote to memory of 5032 316 fdcd52bdf608b6ee9c6a0d699ad312865767200e1883b17fdb64a379bc2825c5.exe 83 PID 316 wrote to memory of 5032 316 fdcd52bdf608b6ee9c6a0d699ad312865767200e1883b17fdb64a379bc2825c5.exe 83 PID 316 wrote to memory of 5032 316 fdcd52bdf608b6ee9c6a0d699ad312865767200e1883b17fdb64a379bc2825c5.exe 83 PID 5032 wrote to memory of 1684 5032 y7489489.exe 84 PID 5032 wrote to memory of 1684 5032 y7489489.exe 84 PID 5032 wrote to memory of 1684 5032 y7489489.exe 84 PID 1684 wrote to memory of 2676 1684 y0276573.exe 85 PID 1684 wrote to memory of 2676 1684 y0276573.exe 85 PID 1684 wrote to memory of 2676 1684 y0276573.exe 85 PID 2676 wrote to memory of 4232 2676 y4654341.exe 86 PID 2676 wrote to memory of 4232 2676 y4654341.exe 86 PID 2676 wrote to memory of 4232 2676 y4654341.exe 86 PID 4232 wrote to memory of 3388 4232 l3770545.exe 87 PID 4232 wrote to memory of 3388 4232 l3770545.exe 87 PID 4232 wrote to memory of 3388 4232 l3770545.exe 87 PID 2676 wrote to memory of 2428 2676 y4654341.exe 88 PID 2676 wrote to memory of 2428 2676 y4654341.exe 88 PID 2676 wrote to memory of 2428 2676 y4654341.exe 88 PID 3388 wrote to memory of 4740 3388 saves.exe 89 PID 3388 wrote to memory of 4740 3388 saves.exe 89 PID 3388 wrote to memory of 4740 3388 saves.exe 89 PID 3388 wrote to memory of 5044 3388 saves.exe 91 PID 3388 wrote to memory of 5044 3388 saves.exe 91 PID 3388 wrote to memory of 5044 3388 saves.exe 91 PID 5044 wrote to memory of 4576 5044 cmd.exe 93 PID 5044 wrote to memory of 4576 5044 cmd.exe 93 PID 5044 wrote to memory of 4576 5044 cmd.exe 93 PID 5044 wrote to memory of 2188 5044 cmd.exe 94 PID 5044 wrote to memory of 2188 5044 cmd.exe 94 PID 5044 wrote to memory of 2188 5044 cmd.exe 94 PID 1684 wrote to memory of 2424 1684 y0276573.exe 95 PID 1684 wrote to memory of 2424 1684 y0276573.exe 95 PID 1684 wrote to memory of 2424 1684 y0276573.exe 95 PID 5044 wrote to memory of 1632 5044 cmd.exe 96 PID 5044 wrote to memory of 1632 5044 cmd.exe 96 PID 5044 wrote to memory of 1632 5044 cmd.exe 96 PID 5044 wrote to memory of 3380 5044 cmd.exe 97 PID 5044 wrote to memory of 3380 5044 cmd.exe 97 PID 5044 wrote to memory of 3380 5044 cmd.exe 97 PID 5044 wrote to memory of 984 5044 cmd.exe 98 PID 5044 wrote to memory of 984 5044 cmd.exe 98 PID 5044 wrote to memory of 984 5044 cmd.exe 98 PID 5044 wrote to memory of 732 5044 cmd.exe 99 PID 5044 wrote to memory of 732 5044 cmd.exe 99 PID 5044 wrote to memory of 732 5044 cmd.exe 99 PID 3388 wrote to memory of 1236 3388 saves.exe 108 PID 3388 wrote to memory of 1236 3388 saves.exe 108 PID 3388 wrote to memory of 1236 3388 saves.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdcd52bdf608b6ee9c6a0d699ad312865767200e1883b17fdb64a379bc2825c5.exe"C:\Users\Admin\AppData\Local\Temp\fdcd52bdf608b6ee9c6a0d699ad312865767200e1883b17fdb64a379bc2825c5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7489489.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7489489.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0276573.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0276573.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y4654341.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y4654341.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3770545.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3770545.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:4740
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4576
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:2188
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:1632
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3380
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:984
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:732
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:1236
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m9214854.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m9214854.exe5⤵
- Executes dropped EXE
PID:2428
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n0005847.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n0005847.exe4⤵
- Executes dropped EXE
PID:2424
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4524
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD58e0d02549f6366dee1c882976a52b6c6
SHA11609c70e137fb1865d332c90832ce7bf8c61eecb
SHA2561cfc7cf6482bf8227c906dd34a26ced61c244ba66ee65f64dd5cf05f85f78d0b
SHA51254fdb4261a8cadfde8fc3ca7149e3a4bdbfbaaf67b4b26c28a77a3830d6a3d17e0b3dd6c8a7b16c1a18e7997ba67bd6d81687d2d09fc034c53ed2bd856352ba6
-
Filesize
1.3MB
MD58e0d02549f6366dee1c882976a52b6c6
SHA11609c70e137fb1865d332c90832ce7bf8c61eecb
SHA2561cfc7cf6482bf8227c906dd34a26ced61c244ba66ee65f64dd5cf05f85f78d0b
SHA51254fdb4261a8cadfde8fc3ca7149e3a4bdbfbaaf67b4b26c28a77a3830d6a3d17e0b3dd6c8a7b16c1a18e7997ba67bd6d81687d2d09fc034c53ed2bd856352ba6
-
Filesize
475KB
MD5b6fb2de897889e778f7a2fd9adc69e08
SHA18144facc1b9f9a28d5b0a15f110f090acd19d23c
SHA25641ac8abc98c2076043a116febcd1c8f645480229548b4f72567b3dd189ab1efd
SHA5123e701692ad3476b37e12d5b43e1e183ebeeee67eebdc7bb8669e27518c26b05600fe57aead13315c2d3e14cbb87bf7ed5b3f11b29be1e132f2a4779d678035da
-
Filesize
475KB
MD5b6fb2de897889e778f7a2fd9adc69e08
SHA18144facc1b9f9a28d5b0a15f110f090acd19d23c
SHA25641ac8abc98c2076043a116febcd1c8f645480229548b4f72567b3dd189ab1efd
SHA5123e701692ad3476b37e12d5b43e1e183ebeeee67eebdc7bb8669e27518c26b05600fe57aead13315c2d3e14cbb87bf7ed5b3f11b29be1e132f2a4779d678035da
-
Filesize
174KB
MD563e681eb5020348bbc4041e9ca7d171b
SHA18132ff4962857237c5bbbe0d53fcd1bf41b3de3e
SHA256fd966702d9e7b229fd3e370b89d52c9806261d95e7e816587a4eddb3574b8f28
SHA512a541ca168387c6da682cc40713e75e5dc087a4ce04a000a16cdf95ae5f10267237b1359b7d1018a75634a5db2bed6e817758549b9cc136d88072d98f748e909d
-
Filesize
174KB
MD563e681eb5020348bbc4041e9ca7d171b
SHA18132ff4962857237c5bbbe0d53fcd1bf41b3de3e
SHA256fd966702d9e7b229fd3e370b89d52c9806261d95e7e816587a4eddb3574b8f28
SHA512a541ca168387c6da682cc40713e75e5dc087a4ce04a000a16cdf95ae5f10267237b1359b7d1018a75634a5db2bed6e817758549b9cc136d88072d98f748e909d
-
Filesize
319KB
MD5ef48697aa97d43b71eb350c86b835499
SHA11ae0fbecdaea495b61c743792a0d965126168def
SHA2560bb7e18a08f95c98b8594163a3199913b2decd01186783c2bebc85b9756f572f
SHA51293b9419f339449fe6bce3d1d6bbccc1263fd600f6159b49bdf4aa0be2155aa46ccb8938d4f47ae1c19fa14639bf3cdb0072fdc21ab2e959d1b0605cf08d87185
-
Filesize
319KB
MD5ef48697aa97d43b71eb350c86b835499
SHA11ae0fbecdaea495b61c743792a0d965126168def
SHA2560bb7e18a08f95c98b8594163a3199913b2decd01186783c2bebc85b9756f572f
SHA51293b9419f339449fe6bce3d1d6bbccc1263fd600f6159b49bdf4aa0be2155aa46ccb8938d4f47ae1c19fa14639bf3cdb0072fdc21ab2e959d1b0605cf08d87185
-
Filesize
319KB
MD519132d6c9e8625a03b26f8533e5b235b
SHA159ba55a2731869f81bfc998a05b1f6a03aab43dc
SHA256d62d4d56d50cadfd38f49cbd35c820099161cbabc29439a365065100283b4515
SHA512ffba9a58687b433334284e838073085cb3623e228a7ad70e963b9fbb2299cb320c0e515c0897c3be81b26cde30218ed6876d7b2ddf0ed045e6fda84dc9a6c2fa
-
Filesize
319KB
MD519132d6c9e8625a03b26f8533e5b235b
SHA159ba55a2731869f81bfc998a05b1f6a03aab43dc
SHA256d62d4d56d50cadfd38f49cbd35c820099161cbabc29439a365065100283b4515
SHA512ffba9a58687b433334284e838073085cb3623e228a7ad70e963b9fbb2299cb320c0e515c0897c3be81b26cde30218ed6876d7b2ddf0ed045e6fda84dc9a6c2fa
-
Filesize
140KB
MD5e98c02c7c4f9ac7d8119da1347cec988
SHA1b2df1c8f21fe65e823b7a3fb8ca6052924f16308
SHA256ddc46fdfe00e57b47bb5771cf2a09df4cfd2b350b8ee969419be821ef65db875
SHA5120f123bb65d38f5cc60adc7b93a8fe5be0118fa2efe65f43dcfeef6d6d08072549027b3d760ded57d11c7d60eab01ef33e213867a84fc76829e8358b15bc8f781
-
Filesize
140KB
MD5e98c02c7c4f9ac7d8119da1347cec988
SHA1b2df1c8f21fe65e823b7a3fb8ca6052924f16308
SHA256ddc46fdfe00e57b47bb5771cf2a09df4cfd2b350b8ee969419be821ef65db875
SHA5120f123bb65d38f5cc60adc7b93a8fe5be0118fa2efe65f43dcfeef6d6d08072549027b3d760ded57d11c7d60eab01ef33e213867a84fc76829e8358b15bc8f781
-
Filesize
319KB
MD519132d6c9e8625a03b26f8533e5b235b
SHA159ba55a2731869f81bfc998a05b1f6a03aab43dc
SHA256d62d4d56d50cadfd38f49cbd35c820099161cbabc29439a365065100283b4515
SHA512ffba9a58687b433334284e838073085cb3623e228a7ad70e963b9fbb2299cb320c0e515c0897c3be81b26cde30218ed6876d7b2ddf0ed045e6fda84dc9a6c2fa
-
Filesize
319KB
MD519132d6c9e8625a03b26f8533e5b235b
SHA159ba55a2731869f81bfc998a05b1f6a03aab43dc
SHA256d62d4d56d50cadfd38f49cbd35c820099161cbabc29439a365065100283b4515
SHA512ffba9a58687b433334284e838073085cb3623e228a7ad70e963b9fbb2299cb320c0e515c0897c3be81b26cde30218ed6876d7b2ddf0ed045e6fda84dc9a6c2fa
-
Filesize
319KB
MD519132d6c9e8625a03b26f8533e5b235b
SHA159ba55a2731869f81bfc998a05b1f6a03aab43dc
SHA256d62d4d56d50cadfd38f49cbd35c820099161cbabc29439a365065100283b4515
SHA512ffba9a58687b433334284e838073085cb3623e228a7ad70e963b9fbb2299cb320c0e515c0897c3be81b26cde30218ed6876d7b2ddf0ed045e6fda84dc9a6c2fa
-
Filesize
319KB
MD519132d6c9e8625a03b26f8533e5b235b
SHA159ba55a2731869f81bfc998a05b1f6a03aab43dc
SHA256d62d4d56d50cadfd38f49cbd35c820099161cbabc29439a365065100283b4515
SHA512ffba9a58687b433334284e838073085cb3623e228a7ad70e963b9fbb2299cb320c0e515c0897c3be81b26cde30218ed6876d7b2ddf0ed045e6fda84dc9a6c2fa
-
Filesize
319KB
MD519132d6c9e8625a03b26f8533e5b235b
SHA159ba55a2731869f81bfc998a05b1f6a03aab43dc
SHA256d62d4d56d50cadfd38f49cbd35c820099161cbabc29439a365065100283b4515
SHA512ffba9a58687b433334284e838073085cb3623e228a7ad70e963b9fbb2299cb320c0e515c0897c3be81b26cde30218ed6876d7b2ddf0ed045e6fda84dc9a6c2fa
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7