Analysis
-
max time kernel
136s -
max time network
154s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
26/08/2023, 20:42
Static task
static1
Behavioral task
behavioral1
Sample
418caa8650260525b49a158bca132009f1eb895264450b0aa4c98496b0cdc505.exe
Resource
win10-20230703-en
General
-
Target
418caa8650260525b49a158bca132009f1eb895264450b0aa4c98496b0cdc505.exe
-
Size
1.4MB
-
MD5
6d478bf096759a3fea0c78ba4bf27182
-
SHA1
06ae6d079f3ba0c0fde4943a0d45b27453c4b04e
-
SHA256
418caa8650260525b49a158bca132009f1eb895264450b0aa4c98496b0cdc505
-
SHA512
db50cffe67e521848d96245cc8bd94334c1be3679be1762690ea1e6c400cfff891afbc16c690da18890c52f1fb142718713ca356bd814cf1410ec21bb0bf5099
-
SSDEEP
24576:qyx578wcUm4E9t7D3HKJSbJAUI+gwqHNY4N52jOW70yRHI6Ztx1ZT21:xx5okEjrKJSbT4rMH0yRHZZT2
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
jaja
77.91.124.73:19071
-
auth_value
3670179d176ca399ed08e7914610b43c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 4984 y5920691.exe 2336 y4541743.exe 2184 y5680360.exe 2384 l8084260.exe 4356 saves.exe 2260 m6772316.exe 1304 n4211792.exe 1240 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 4688 rundll32.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 418caa8650260525b49a158bca132009f1eb895264450b0aa4c98496b0cdc505.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y5920691.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y4541743.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y5680360.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4392 schtasks.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1356 wrote to memory of 4984 1356 418caa8650260525b49a158bca132009f1eb895264450b0aa4c98496b0cdc505.exe 70 PID 1356 wrote to memory of 4984 1356 418caa8650260525b49a158bca132009f1eb895264450b0aa4c98496b0cdc505.exe 70 PID 1356 wrote to memory of 4984 1356 418caa8650260525b49a158bca132009f1eb895264450b0aa4c98496b0cdc505.exe 70 PID 4984 wrote to memory of 2336 4984 y5920691.exe 71 PID 4984 wrote to memory of 2336 4984 y5920691.exe 71 PID 4984 wrote to memory of 2336 4984 y5920691.exe 71 PID 2336 wrote to memory of 2184 2336 y4541743.exe 72 PID 2336 wrote to memory of 2184 2336 y4541743.exe 72 PID 2336 wrote to memory of 2184 2336 y4541743.exe 72 PID 2184 wrote to memory of 2384 2184 y5680360.exe 73 PID 2184 wrote to memory of 2384 2184 y5680360.exe 73 PID 2184 wrote to memory of 2384 2184 y5680360.exe 73 PID 2384 wrote to memory of 4356 2384 l8084260.exe 74 PID 2384 wrote to memory of 4356 2384 l8084260.exe 74 PID 2384 wrote to memory of 4356 2384 l8084260.exe 74 PID 2184 wrote to memory of 2260 2184 y5680360.exe 75 PID 2184 wrote to memory of 2260 2184 y5680360.exe 75 PID 2184 wrote to memory of 2260 2184 y5680360.exe 75 PID 4356 wrote to memory of 4392 4356 saves.exe 76 PID 4356 wrote to memory of 4392 4356 saves.exe 76 PID 4356 wrote to memory of 4392 4356 saves.exe 76 PID 4356 wrote to memory of 4568 4356 saves.exe 78 PID 4356 wrote to memory of 4568 4356 saves.exe 78 PID 4356 wrote to memory of 4568 4356 saves.exe 78 PID 4568 wrote to memory of 4368 4568 cmd.exe 80 PID 4568 wrote to memory of 4368 4568 cmd.exe 80 PID 4568 wrote to memory of 4368 4568 cmd.exe 80 PID 4568 wrote to memory of 4128 4568 cmd.exe 81 PID 4568 wrote to memory of 4128 4568 cmd.exe 81 PID 4568 wrote to memory of 4128 4568 cmd.exe 81 PID 4568 wrote to memory of 4572 4568 cmd.exe 82 PID 4568 wrote to memory of 4572 4568 cmd.exe 82 PID 4568 wrote to memory of 4572 4568 cmd.exe 82 PID 4568 wrote to memory of 4912 4568 cmd.exe 83 PID 4568 wrote to memory of 4912 4568 cmd.exe 83 PID 4568 wrote to memory of 4912 4568 cmd.exe 83 PID 4568 wrote to memory of 952 4568 cmd.exe 84 PID 4568 wrote to memory of 952 4568 cmd.exe 84 PID 4568 wrote to memory of 952 4568 cmd.exe 84 PID 4568 wrote to memory of 1408 4568 cmd.exe 85 PID 4568 wrote to memory of 1408 4568 cmd.exe 85 PID 4568 wrote to memory of 1408 4568 cmd.exe 85 PID 2336 wrote to memory of 1304 2336 y4541743.exe 86 PID 2336 wrote to memory of 1304 2336 y4541743.exe 86 PID 2336 wrote to memory of 1304 2336 y4541743.exe 86 PID 4356 wrote to memory of 4688 4356 saves.exe 88 PID 4356 wrote to memory of 4688 4356 saves.exe 88 PID 4356 wrote to memory of 4688 4356 saves.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\418caa8650260525b49a158bca132009f1eb895264450b0aa4c98496b0cdc505.exe"C:\Users\Admin\AppData\Local\Temp\418caa8650260525b49a158bca132009f1eb895264450b0aa4c98496b0cdc505.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5920691.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5920691.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4541743.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4541743.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y5680360.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y5680360.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l8084260.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l8084260.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:4392
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4368
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:4128
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:4572
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4912
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:952
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:1408
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:4688
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m6772316.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m6772316.exe5⤵
- Executes dropped EXE
PID:2260
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n4211792.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n4211792.exe4⤵
- Executes dropped EXE
PID:1304
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:1240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5cb8abd9906901c38a86ff7f2ac03b633
SHA1980660dd56db26b7d1aa7658cd7a1bdb41d58a96
SHA25654f63a40bd190c59ac22da22a9a72ed43365c9ce9fb49c31d8acfe5afb5367d3
SHA5126184bab16c2ce760e6e4834e57ec04c1d7e7e21b52dfb513182100b01ca3d5b8a708e6477446f2ddf90f5ea857b8dbdb26644024b18335fe08be85e15edbcd47
-
Filesize
1.3MB
MD5cb8abd9906901c38a86ff7f2ac03b633
SHA1980660dd56db26b7d1aa7658cd7a1bdb41d58a96
SHA25654f63a40bd190c59ac22da22a9a72ed43365c9ce9fb49c31d8acfe5afb5367d3
SHA5126184bab16c2ce760e6e4834e57ec04c1d7e7e21b52dfb513182100b01ca3d5b8a708e6477446f2ddf90f5ea857b8dbdb26644024b18335fe08be85e15edbcd47
-
Filesize
475KB
MD51b476b9ee48699b12d36aa9ad49ae4b6
SHA1798590a2f5e1edeeefcb9a038f57d9b5685fe23b
SHA25684f365bf842790ad9addc90484feb52d71a131e8316634002032effc4541bde3
SHA512806c1c0b81a88f827bea71f8b02b19bd1cc102c9b0dfee93a65fecf9c61a8935bcc2f86a0574fc348f7eda8efc220203d30b5a1b8bab85ede6a08faafe5a885d
-
Filesize
475KB
MD51b476b9ee48699b12d36aa9ad49ae4b6
SHA1798590a2f5e1edeeefcb9a038f57d9b5685fe23b
SHA25684f365bf842790ad9addc90484feb52d71a131e8316634002032effc4541bde3
SHA512806c1c0b81a88f827bea71f8b02b19bd1cc102c9b0dfee93a65fecf9c61a8935bcc2f86a0574fc348f7eda8efc220203d30b5a1b8bab85ede6a08faafe5a885d
-
Filesize
175KB
MD50465c34650e0ab82bee7fcc527a3c542
SHA1363552d9dd1f59363545e6146e1e0eb0b73a419d
SHA25680e1a68f726d4d33dc860ced693780d3fa347711337c57e927a6bc1d8e791976
SHA5129658ab0e71f21e15ca901bccf9846cf32b202d12d9303de4761048a3553fade35310ec09f7cd907314af46d334335c66793912aa4153abb11be0b02394e0ac1a
-
Filesize
175KB
MD50465c34650e0ab82bee7fcc527a3c542
SHA1363552d9dd1f59363545e6146e1e0eb0b73a419d
SHA25680e1a68f726d4d33dc860ced693780d3fa347711337c57e927a6bc1d8e791976
SHA5129658ab0e71f21e15ca901bccf9846cf32b202d12d9303de4761048a3553fade35310ec09f7cd907314af46d334335c66793912aa4153abb11be0b02394e0ac1a
-
Filesize
319KB
MD5dc0040ea567088e3dc57029725cb7373
SHA192fcb2cb88d68d58fe28f8e3ed939bcc4cd4b658
SHA2568152aa8fd7dd034f57624dc6410b7b5ec5bdbd15b8bfd24ac6bc312e25571544
SHA512dbbb960562328982ca4f41efe590f88fac77423503ac81f6a1db0ce57eb544a5e982c581a3d818fcabc6e2464d5714e1f1e827d7b004038826c71e2f6da899f2
-
Filesize
319KB
MD5dc0040ea567088e3dc57029725cb7373
SHA192fcb2cb88d68d58fe28f8e3ed939bcc4cd4b658
SHA2568152aa8fd7dd034f57624dc6410b7b5ec5bdbd15b8bfd24ac6bc312e25571544
SHA512dbbb960562328982ca4f41efe590f88fac77423503ac81f6a1db0ce57eb544a5e982c581a3d818fcabc6e2464d5714e1f1e827d7b004038826c71e2f6da899f2
-
Filesize
321KB
MD58d5c45be8d87fd7aad11d01b71d94eee
SHA11a122ce41a782caadb51d47265f80800930e563d
SHA256f82465e0b1e6e99ad6a13d33bd32ffd17cd5e6673111f83e037ab83e8a0c6028
SHA51286ad48405696b9cc684369858e3c10ee01f538dd93863385cf09d89a8482b4717fe84efc5d6e29d5781df53f67f450fecab6d492c5592cfc1f07da4c672cdfd9
-
Filesize
321KB
MD58d5c45be8d87fd7aad11d01b71d94eee
SHA11a122ce41a782caadb51d47265f80800930e563d
SHA256f82465e0b1e6e99ad6a13d33bd32ffd17cd5e6673111f83e037ab83e8a0c6028
SHA51286ad48405696b9cc684369858e3c10ee01f538dd93863385cf09d89a8482b4717fe84efc5d6e29d5781df53f67f450fecab6d492c5592cfc1f07da4c672cdfd9
-
Filesize
141KB
MD57ba6be9ce30b49b743e1e34f9541116c
SHA1aaa6027ea9ab76409673b3169652f99127d53868
SHA25665654ba5240d3d665737f9a209e63c91c6e145f28fdecdf24dae82d4db29a593
SHA512dcd3d28fd41e06de7b39405c73edb91ef9cec77b7c5f92885b21c4bc8de7b63b5546296ede49fadfbca2e93f18f24f0716b1019bbb630d4503185ee6a4d768fa
-
Filesize
141KB
MD57ba6be9ce30b49b743e1e34f9541116c
SHA1aaa6027ea9ab76409673b3169652f99127d53868
SHA25665654ba5240d3d665737f9a209e63c91c6e145f28fdecdf24dae82d4db29a593
SHA512dcd3d28fd41e06de7b39405c73edb91ef9cec77b7c5f92885b21c4bc8de7b63b5546296ede49fadfbca2e93f18f24f0716b1019bbb630d4503185ee6a4d768fa
-
Filesize
321KB
MD58d5c45be8d87fd7aad11d01b71d94eee
SHA11a122ce41a782caadb51d47265f80800930e563d
SHA256f82465e0b1e6e99ad6a13d33bd32ffd17cd5e6673111f83e037ab83e8a0c6028
SHA51286ad48405696b9cc684369858e3c10ee01f538dd93863385cf09d89a8482b4717fe84efc5d6e29d5781df53f67f450fecab6d492c5592cfc1f07da4c672cdfd9
-
Filesize
321KB
MD58d5c45be8d87fd7aad11d01b71d94eee
SHA11a122ce41a782caadb51d47265f80800930e563d
SHA256f82465e0b1e6e99ad6a13d33bd32ffd17cd5e6673111f83e037ab83e8a0c6028
SHA51286ad48405696b9cc684369858e3c10ee01f538dd93863385cf09d89a8482b4717fe84efc5d6e29d5781df53f67f450fecab6d492c5592cfc1f07da4c672cdfd9
-
Filesize
321KB
MD58d5c45be8d87fd7aad11d01b71d94eee
SHA11a122ce41a782caadb51d47265f80800930e563d
SHA256f82465e0b1e6e99ad6a13d33bd32ffd17cd5e6673111f83e037ab83e8a0c6028
SHA51286ad48405696b9cc684369858e3c10ee01f538dd93863385cf09d89a8482b4717fe84efc5d6e29d5781df53f67f450fecab6d492c5592cfc1f07da4c672cdfd9
-
Filesize
321KB
MD58d5c45be8d87fd7aad11d01b71d94eee
SHA11a122ce41a782caadb51d47265f80800930e563d
SHA256f82465e0b1e6e99ad6a13d33bd32ffd17cd5e6673111f83e037ab83e8a0c6028
SHA51286ad48405696b9cc684369858e3c10ee01f538dd93863385cf09d89a8482b4717fe84efc5d6e29d5781df53f67f450fecab6d492c5592cfc1f07da4c672cdfd9
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b