Analysis
-
max time kernel
136s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
27/08/2023, 02:31
Static task
static1
Behavioral task
behavioral1
Sample
b979e6e031cc15a3bbb6c185dfbbc63478c8a353875e61cbbe99f3ac1b9d4e52.exe
Resource
win10-20230703-en
General
-
Target
b979e6e031cc15a3bbb6c185dfbbc63478c8a353875e61cbbe99f3ac1b9d4e52.exe
-
Size
1.4MB
-
MD5
5ef34b7b5bb93807555d8e5bdbd9404d
-
SHA1
b3d0a742af1fc187b948210dea1350fadb785ab8
-
SHA256
b979e6e031cc15a3bbb6c185dfbbc63478c8a353875e61cbbe99f3ac1b9d4e52
-
SHA512
b659cef46c1591f96e86740426f61931e81922412b5e1b52d51907b19831f107a446d046463e68d55e9919b543363ccc110c65acb22d56ade866c320b4eca4c7
-
SSDEEP
24576:2ymPfvw7sQ2BoE527mVKMezW6i5QcZkcHBdQXs6CJGPv09fO0eJt:FmPfvw7v652SVKMezW5ZdGsCc9fOX
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
nrava
77.91.124.82:19071
-
auth_value
43fe50e9ee6afb85588e03ac9676e2f7
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/files/0x000600000001b005-38.dat family_redline behavioral1/files/0x000600000001b005-39.dat family_redline behavioral1/memory/2260-40-0x00000000007F0000-0x0000000000820000-memory.dmp family_redline -
Executes dropped EXE 9 IoCs
pid Process 3796 y0250873.exe 4316 y0302710.exe 4800 y3886677.exe 428 l2210300.exe 2772 saves.exe 3076 m1502763.exe 2260 n7262510.exe 4940 saves.exe 824 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 3632 rundll32.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y0250873.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y0302710.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y3886677.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b979e6e031cc15a3bbb6c185dfbbc63478c8a353875e61cbbe99f3ac1b9d4e52.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3272 schtasks.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2020 wrote to memory of 3796 2020 b979e6e031cc15a3bbb6c185dfbbc63478c8a353875e61cbbe99f3ac1b9d4e52.exe 70 PID 2020 wrote to memory of 3796 2020 b979e6e031cc15a3bbb6c185dfbbc63478c8a353875e61cbbe99f3ac1b9d4e52.exe 70 PID 2020 wrote to memory of 3796 2020 b979e6e031cc15a3bbb6c185dfbbc63478c8a353875e61cbbe99f3ac1b9d4e52.exe 70 PID 3796 wrote to memory of 4316 3796 y0250873.exe 71 PID 3796 wrote to memory of 4316 3796 y0250873.exe 71 PID 3796 wrote to memory of 4316 3796 y0250873.exe 71 PID 4316 wrote to memory of 4800 4316 y0302710.exe 72 PID 4316 wrote to memory of 4800 4316 y0302710.exe 72 PID 4316 wrote to memory of 4800 4316 y0302710.exe 72 PID 4800 wrote to memory of 428 4800 y3886677.exe 73 PID 4800 wrote to memory of 428 4800 y3886677.exe 73 PID 4800 wrote to memory of 428 4800 y3886677.exe 73 PID 428 wrote to memory of 2772 428 l2210300.exe 74 PID 428 wrote to memory of 2772 428 l2210300.exe 74 PID 428 wrote to memory of 2772 428 l2210300.exe 74 PID 4800 wrote to memory of 3076 4800 y3886677.exe 75 PID 4800 wrote to memory of 3076 4800 y3886677.exe 75 PID 4800 wrote to memory of 3076 4800 y3886677.exe 75 PID 2772 wrote to memory of 3272 2772 saves.exe 76 PID 2772 wrote to memory of 3272 2772 saves.exe 76 PID 2772 wrote to memory of 3272 2772 saves.exe 76 PID 2772 wrote to memory of 4184 2772 saves.exe 78 PID 2772 wrote to memory of 4184 2772 saves.exe 78 PID 2772 wrote to memory of 4184 2772 saves.exe 78 PID 4184 wrote to memory of 4480 4184 cmd.exe 81 PID 4184 wrote to memory of 4480 4184 cmd.exe 81 PID 4184 wrote to memory of 4480 4184 cmd.exe 81 PID 4316 wrote to memory of 2260 4316 y0302710.exe 80 PID 4316 wrote to memory of 2260 4316 y0302710.exe 80 PID 4316 wrote to memory of 2260 4316 y0302710.exe 80 PID 4184 wrote to memory of 2688 4184 cmd.exe 82 PID 4184 wrote to memory of 2688 4184 cmd.exe 82 PID 4184 wrote to memory of 2688 4184 cmd.exe 82 PID 4184 wrote to memory of 2696 4184 cmd.exe 83 PID 4184 wrote to memory of 2696 4184 cmd.exe 83 PID 4184 wrote to memory of 2696 4184 cmd.exe 83 PID 4184 wrote to memory of 2820 4184 cmd.exe 84 PID 4184 wrote to memory of 2820 4184 cmd.exe 84 PID 4184 wrote to memory of 2820 4184 cmd.exe 84 PID 4184 wrote to memory of 2112 4184 cmd.exe 85 PID 4184 wrote to memory of 2112 4184 cmd.exe 85 PID 4184 wrote to memory of 2112 4184 cmd.exe 85 PID 4184 wrote to memory of 4084 4184 cmd.exe 86 PID 4184 wrote to memory of 4084 4184 cmd.exe 86 PID 4184 wrote to memory of 4084 4184 cmd.exe 86 PID 2772 wrote to memory of 3632 2772 saves.exe 88 PID 2772 wrote to memory of 3632 2772 saves.exe 88 PID 2772 wrote to memory of 3632 2772 saves.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\b979e6e031cc15a3bbb6c185dfbbc63478c8a353875e61cbbe99f3ac1b9d4e52.exe"C:\Users\Admin\AppData\Local\Temp\b979e6e031cc15a3bbb6c185dfbbc63478c8a353875e61cbbe99f3ac1b9d4e52.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0250873.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0250873.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0302710.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0302710.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y3886677.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y3886677.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l2210300.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l2210300.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:3272
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4480
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:2688
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:2696
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2820
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:2112
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:4084
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:3632
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m1502763.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m1502763.exe5⤵
- Executes dropped EXE
PID:3076
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n7262510.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n7262510.exe4⤵
- Executes dropped EXE
PID:2260
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4940
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5549ca35df1da03c6797306d212a1465a
SHA1a04d28a5569cb21b688f419e94b6e4fc253ea836
SHA256bc30e1f9b19ccf983b8a9d199f3cfe01a79276b5965464fd45658f100c2fcb9e
SHA51272f0064ba8a985c41b29d43831b6fe6ad5d9b417d44283f3bdfbfec82c0ea19047f00a3096fd2135ee1628b5651337f9697e99bd7cd2c83bfc896e6d1b10a80c
-
Filesize
1.3MB
MD5549ca35df1da03c6797306d212a1465a
SHA1a04d28a5569cb21b688f419e94b6e4fc253ea836
SHA256bc30e1f9b19ccf983b8a9d199f3cfe01a79276b5965464fd45658f100c2fcb9e
SHA51272f0064ba8a985c41b29d43831b6fe6ad5d9b417d44283f3bdfbfec82c0ea19047f00a3096fd2135ee1628b5651337f9697e99bd7cd2c83bfc896e6d1b10a80c
-
Filesize
476KB
MD5a43df5775839851063044a80b42735af
SHA10d0b67841666da2571fbf7723549f1093376530c
SHA256019065adc0e345a553f056e39a50d45715e7bb330d64770a114291b29055f66e
SHA512c51a61e573beda6046495a945cca648ee5d276618303eda8cce9ac205a8848845520b0c2079b1354887e3c97e71916ba028dd7f1ec080d7a202f05db3dec83dd
-
Filesize
476KB
MD5a43df5775839851063044a80b42735af
SHA10d0b67841666da2571fbf7723549f1093376530c
SHA256019065adc0e345a553f056e39a50d45715e7bb330d64770a114291b29055f66e
SHA512c51a61e573beda6046495a945cca648ee5d276618303eda8cce9ac205a8848845520b0c2079b1354887e3c97e71916ba028dd7f1ec080d7a202f05db3dec83dd
-
Filesize
173KB
MD55f4774dc140bc6601bbabf31d98599cb
SHA1bd3d834a3df9a6e2ad18bbaf8e4b945a8967fb45
SHA256104d62f505e4258126ad892a4f0f6e908f075a76b9fc9b174d74f18072284a6a
SHA512779759c27fadb72d63f83076dbf2fd1da82429bf551013600d614040f194d9333b6f7265a059fc31b80b47d81fda3e7ab6323217c42685190fe25c0a7774bf4d
-
Filesize
173KB
MD55f4774dc140bc6601bbabf31d98599cb
SHA1bd3d834a3df9a6e2ad18bbaf8e4b945a8967fb45
SHA256104d62f505e4258126ad892a4f0f6e908f075a76b9fc9b174d74f18072284a6a
SHA512779759c27fadb72d63f83076dbf2fd1da82429bf551013600d614040f194d9333b6f7265a059fc31b80b47d81fda3e7ab6323217c42685190fe25c0a7774bf4d
-
Filesize
320KB
MD5fc981889666fdd0bd3063b727ec46b6e
SHA147ac2308a7ea3104390aab6bf2d71abf9b5e2844
SHA256914d1d2708bd5403ab7117744b88fc21b2810e314af4d3ff352e7c804c8e0e1a
SHA512f417a8c4a47c823f1301acbf7a2481904eb474b831b336255a68ca20e1b4ef30ef69583683371fdba5e133b1a83cdbebb31138501c6a6097b87ebdd33f44d8be
-
Filesize
320KB
MD5fc981889666fdd0bd3063b727ec46b6e
SHA147ac2308a7ea3104390aab6bf2d71abf9b5e2844
SHA256914d1d2708bd5403ab7117744b88fc21b2810e314af4d3ff352e7c804c8e0e1a
SHA512f417a8c4a47c823f1301acbf7a2481904eb474b831b336255a68ca20e1b4ef30ef69583683371fdba5e133b1a83cdbebb31138501c6a6097b87ebdd33f44d8be
-
Filesize
321KB
MD5e683327a185fcacc9ac9e2ceeecfde27
SHA124e13b5a9f954f8750898b708cdb45902ac64a1c
SHA256dbb60608d140c893669e951077e4998bce324cb23e8db7d4e3b2a075cddbdd07
SHA512c54ac00bf88eb25e2ab16e2d861d15ab29ca7bfcdc2abc66209bbdfc3e1c8cb0d8e7d40fa8920b698717a01643b53c54b9e6822e09183a30875cefbb24c6e423
-
Filesize
321KB
MD5e683327a185fcacc9ac9e2ceeecfde27
SHA124e13b5a9f954f8750898b708cdb45902ac64a1c
SHA256dbb60608d140c893669e951077e4998bce324cb23e8db7d4e3b2a075cddbdd07
SHA512c54ac00bf88eb25e2ab16e2d861d15ab29ca7bfcdc2abc66209bbdfc3e1c8cb0d8e7d40fa8920b698717a01643b53c54b9e6822e09183a30875cefbb24c6e423
-
Filesize
140KB
MD59dedd57f911db9e3e83faa1654257e1b
SHA1ae894991d82d3d0a4c1a1ce39016620f23d6a9e2
SHA256f7aa60c86f3e082c1f4b62ab3fb4eba4b7e434bac68a06832e74a9dca81a425f
SHA512943a656421581a983fac669c807608a7abbf3feb61d160a7ad3d9a955ad36b09ccee7de82be1cfa85f65c33917212739c7c82911347c85cd07d9c63e0b92dbd5
-
Filesize
140KB
MD59dedd57f911db9e3e83faa1654257e1b
SHA1ae894991d82d3d0a4c1a1ce39016620f23d6a9e2
SHA256f7aa60c86f3e082c1f4b62ab3fb4eba4b7e434bac68a06832e74a9dca81a425f
SHA512943a656421581a983fac669c807608a7abbf3feb61d160a7ad3d9a955ad36b09ccee7de82be1cfa85f65c33917212739c7c82911347c85cd07d9c63e0b92dbd5
-
Filesize
321KB
MD5e683327a185fcacc9ac9e2ceeecfde27
SHA124e13b5a9f954f8750898b708cdb45902ac64a1c
SHA256dbb60608d140c893669e951077e4998bce324cb23e8db7d4e3b2a075cddbdd07
SHA512c54ac00bf88eb25e2ab16e2d861d15ab29ca7bfcdc2abc66209bbdfc3e1c8cb0d8e7d40fa8920b698717a01643b53c54b9e6822e09183a30875cefbb24c6e423
-
Filesize
321KB
MD5e683327a185fcacc9ac9e2ceeecfde27
SHA124e13b5a9f954f8750898b708cdb45902ac64a1c
SHA256dbb60608d140c893669e951077e4998bce324cb23e8db7d4e3b2a075cddbdd07
SHA512c54ac00bf88eb25e2ab16e2d861d15ab29ca7bfcdc2abc66209bbdfc3e1c8cb0d8e7d40fa8920b698717a01643b53c54b9e6822e09183a30875cefbb24c6e423
-
Filesize
321KB
MD5e683327a185fcacc9ac9e2ceeecfde27
SHA124e13b5a9f954f8750898b708cdb45902ac64a1c
SHA256dbb60608d140c893669e951077e4998bce324cb23e8db7d4e3b2a075cddbdd07
SHA512c54ac00bf88eb25e2ab16e2d861d15ab29ca7bfcdc2abc66209bbdfc3e1c8cb0d8e7d40fa8920b698717a01643b53c54b9e6822e09183a30875cefbb24c6e423
-
Filesize
321KB
MD5e683327a185fcacc9ac9e2ceeecfde27
SHA124e13b5a9f954f8750898b708cdb45902ac64a1c
SHA256dbb60608d140c893669e951077e4998bce324cb23e8db7d4e3b2a075cddbdd07
SHA512c54ac00bf88eb25e2ab16e2d861d15ab29ca7bfcdc2abc66209bbdfc3e1c8cb0d8e7d40fa8920b698717a01643b53c54b9e6822e09183a30875cefbb24c6e423
-
Filesize
321KB
MD5e683327a185fcacc9ac9e2ceeecfde27
SHA124e13b5a9f954f8750898b708cdb45902ac64a1c
SHA256dbb60608d140c893669e951077e4998bce324cb23e8db7d4e3b2a075cddbdd07
SHA512c54ac00bf88eb25e2ab16e2d861d15ab29ca7bfcdc2abc66209bbdfc3e1c8cb0d8e7d40fa8920b698717a01643b53c54b9e6822e09183a30875cefbb24c6e423
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b