Analysis
-
max time kernel
140s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
27/08/2023, 04:26
Static task
static1
Behavioral task
behavioral1
Sample
a38509141c482dd5c93c8b6fd3b3bbb467ba4f4a45511.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
a38509141c482dd5c93c8b6fd3b3bbb467ba4f4a45511.exe
Resource
win10v2004-20230703-en
General
-
Target
a38509141c482dd5c93c8b6fd3b3bbb467ba4f4a45511.exe
-
Size
1.4MB
-
MD5
e9176d40eb4cab3019c8729a7e189248
-
SHA1
ba5d3f7d7fbb7c7a4007bd3893f902e59ed0316e
-
SHA256
a38509141c482dd5c93c8b6fd3b3bbb467ba4f4a45511e9a3408f4c638493faa
-
SHA512
412a467a53f1e3ae7608db52e306e5132155beea66e719b6d185c11a6606518e174ba42da3338bbd842394e9788885033f646a9060740aa87ea5b26db5c8380c
-
SSDEEP
24576:HyMRoM5A1rxWhLNZKAiDwZZ9kFFSo1ohonhhf8kVJyQBzqi6g1dEOZxBN42N:SMRQYTKAiDWZ9kFJhf8kfzqi6grPb
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
nrava
77.91.124.82:19071
-
auth_value
43fe50e9ee6afb85588e03ac9676e2f7
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral2/files/0x00060000000231ee-41.dat family_redline behavioral2/files/0x00060000000231ee-42.dat family_redline behavioral2/memory/2552-43-0x00000000003F0000-0x0000000000420000-memory.dmp family_redline -
Executes dropped EXE 9 IoCs
pid Process 1496 y1559525.exe 2620 y5679740.exe 4820 y7563038.exe 3436 l1040206.exe 660 saves.exe 2076 m7267499.exe 2552 n3046663.exe 1868 saves.exe 2648 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 4292 rundll32.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a38509141c482dd5c93c8b6fd3b3bbb467ba4f4a45511.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y1559525.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y5679740.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y7563038.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1380 schtasks.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 4164 wrote to memory of 1496 4164 a38509141c482dd5c93c8b6fd3b3bbb467ba4f4a45511.exe 82 PID 4164 wrote to memory of 1496 4164 a38509141c482dd5c93c8b6fd3b3bbb467ba4f4a45511.exe 82 PID 4164 wrote to memory of 1496 4164 a38509141c482dd5c93c8b6fd3b3bbb467ba4f4a45511.exe 82 PID 1496 wrote to memory of 2620 1496 y1559525.exe 83 PID 1496 wrote to memory of 2620 1496 y1559525.exe 83 PID 1496 wrote to memory of 2620 1496 y1559525.exe 83 PID 2620 wrote to memory of 4820 2620 y5679740.exe 84 PID 2620 wrote to memory of 4820 2620 y5679740.exe 84 PID 2620 wrote to memory of 4820 2620 y5679740.exe 84 PID 4820 wrote to memory of 3436 4820 y7563038.exe 85 PID 4820 wrote to memory of 3436 4820 y7563038.exe 85 PID 4820 wrote to memory of 3436 4820 y7563038.exe 85 PID 3436 wrote to memory of 660 3436 l1040206.exe 86 PID 3436 wrote to memory of 660 3436 l1040206.exe 86 PID 3436 wrote to memory of 660 3436 l1040206.exe 86 PID 4820 wrote to memory of 2076 4820 y7563038.exe 87 PID 4820 wrote to memory of 2076 4820 y7563038.exe 87 PID 4820 wrote to memory of 2076 4820 y7563038.exe 87 PID 660 wrote to memory of 1380 660 saves.exe 88 PID 660 wrote to memory of 1380 660 saves.exe 88 PID 660 wrote to memory of 1380 660 saves.exe 88 PID 660 wrote to memory of 2316 660 saves.exe 90 PID 660 wrote to memory of 2316 660 saves.exe 90 PID 660 wrote to memory of 2316 660 saves.exe 90 PID 2316 wrote to memory of 1696 2316 cmd.exe 93 PID 2316 wrote to memory of 1696 2316 cmd.exe 93 PID 2316 wrote to memory of 1696 2316 cmd.exe 93 PID 2316 wrote to memory of 2068 2316 cmd.exe 94 PID 2316 wrote to memory of 2068 2316 cmd.exe 94 PID 2316 wrote to memory of 2068 2316 cmd.exe 94 PID 2620 wrote to memory of 2552 2620 y5679740.exe 95 PID 2620 wrote to memory of 2552 2620 y5679740.exe 95 PID 2620 wrote to memory of 2552 2620 y5679740.exe 95 PID 2316 wrote to memory of 2016 2316 cmd.exe 96 PID 2316 wrote to memory of 2016 2316 cmd.exe 96 PID 2316 wrote to memory of 2016 2316 cmd.exe 96 PID 2316 wrote to memory of 4756 2316 cmd.exe 97 PID 2316 wrote to memory of 4756 2316 cmd.exe 97 PID 2316 wrote to memory of 4756 2316 cmd.exe 97 PID 2316 wrote to memory of 4552 2316 cmd.exe 98 PID 2316 wrote to memory of 4552 2316 cmd.exe 98 PID 2316 wrote to memory of 4552 2316 cmd.exe 98 PID 2316 wrote to memory of 116 2316 cmd.exe 99 PID 2316 wrote to memory of 116 2316 cmd.exe 99 PID 2316 wrote to memory of 116 2316 cmd.exe 99 PID 660 wrote to memory of 4292 660 saves.exe 109 PID 660 wrote to memory of 4292 660 saves.exe 109 PID 660 wrote to memory of 4292 660 saves.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\a38509141c482dd5c93c8b6fd3b3bbb467ba4f4a45511.exe"C:\Users\Admin\AppData\Local\Temp\a38509141c482dd5c93c8b6fd3b3bbb467ba4f4a45511.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1559525.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1559525.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5679740.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5679740.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y7563038.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y7563038.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l1040206.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l1040206.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:1380
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1696
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:2068
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:2016
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4756
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:4552
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:116
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:4292
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m7267499.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m7267499.exe5⤵
- Executes dropped EXE
PID:2076
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n3046663.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n3046663.exe4⤵
- Executes dropped EXE
PID:2552
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:1868
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD51d9b38e48e32612d9dd8090267f276f8
SHA1ac4881b97ca48f0241ee20aab65160abfc0ffaf4
SHA25627cd643e5a78baf1ac517a516a9c8adb409c836c317218f049aa7c2a4382183d
SHA512681e6a55d2f39edd748816b6c1febbf2b918bab3cb92c8daa32ad995c183151b2c3ddd9d8d3dffd565fd1489fd1f4cc565bd6a57bf6cc8905c4bb0ef5b66c40d
-
Filesize
1.3MB
MD51d9b38e48e32612d9dd8090267f276f8
SHA1ac4881b97ca48f0241ee20aab65160abfc0ffaf4
SHA25627cd643e5a78baf1ac517a516a9c8adb409c836c317218f049aa7c2a4382183d
SHA512681e6a55d2f39edd748816b6c1febbf2b918bab3cb92c8daa32ad995c183151b2c3ddd9d8d3dffd565fd1489fd1f4cc565bd6a57bf6cc8905c4bb0ef5b66c40d
-
Filesize
475KB
MD52301d0ccf400be0a5e3aa8d09fb6c053
SHA117966c4039e0120834a2b2aaeb48ad8f5c32421c
SHA256a48bdea77383807cb6477e6dbe0b8387a21ae96224cf0d809fb2c962d4447b07
SHA51283a09e2323cc17b7a4970d64628e11bba019ca0e77635d4ec951e8f16582882532061690e18f700c9853e5a322a85449443e0dfe4f6532bb12108e147b0ca865
-
Filesize
475KB
MD52301d0ccf400be0a5e3aa8d09fb6c053
SHA117966c4039e0120834a2b2aaeb48ad8f5c32421c
SHA256a48bdea77383807cb6477e6dbe0b8387a21ae96224cf0d809fb2c962d4447b07
SHA51283a09e2323cc17b7a4970d64628e11bba019ca0e77635d4ec951e8f16582882532061690e18f700c9853e5a322a85449443e0dfe4f6532bb12108e147b0ca865
-
Filesize
173KB
MD5f2ba35443f7422e9c4068b156abd38c1
SHA1333a78da960c6a7b05a22f09b10cbdd90c238659
SHA256d8406b590b27e75b5b5fbc58e260d32654bbe2f3474397c75cf0f8866d8ae051
SHA5123fb71c9e056d6dcec447b1938a488580695053d3fc4f545fadbfbbbe2e811f297346448cbe12841892acb41425f3ef821c98edd39ea8df9bad95c1aac134f121
-
Filesize
173KB
MD5f2ba35443f7422e9c4068b156abd38c1
SHA1333a78da960c6a7b05a22f09b10cbdd90c238659
SHA256d8406b590b27e75b5b5fbc58e260d32654bbe2f3474397c75cf0f8866d8ae051
SHA5123fb71c9e056d6dcec447b1938a488580695053d3fc4f545fadbfbbbe2e811f297346448cbe12841892acb41425f3ef821c98edd39ea8df9bad95c1aac134f121
-
Filesize
320KB
MD5f5ecbe8b65636f4c81c334711c6786dd
SHA13e585fe147ba77c332be0c6848eff24e6ab2744e
SHA256b04cc0d8ef56b3130c64e0380022bd9dfc18ebff4c756175c8e71a5071fc8b46
SHA5124f8c3c7f2bcdd40366d0609fb484088b0e6aae2f99b0967473d6a9da75bb28319d0ad46f2ac1d92fe54cd1a16e1828be6612ee48051faf7ac726165e7fa7709a
-
Filesize
320KB
MD5f5ecbe8b65636f4c81c334711c6786dd
SHA13e585fe147ba77c332be0c6848eff24e6ab2744e
SHA256b04cc0d8ef56b3130c64e0380022bd9dfc18ebff4c756175c8e71a5071fc8b46
SHA5124f8c3c7f2bcdd40366d0609fb484088b0e6aae2f99b0967473d6a9da75bb28319d0ad46f2ac1d92fe54cd1a16e1828be6612ee48051faf7ac726165e7fa7709a
-
Filesize
321KB
MD55f0e763ba600c58eaf31d109dc2d2334
SHA172781eaa623df2d9e6be66a9496e2fc50b17e662
SHA256d9ba2e2b4ebfab83565ae0c66599e2b48e892662c0bc5749d4790244e5ac31f5
SHA512ec1f8688ef65ca18bacacd9a623109a21292574abff5f342f8c47cdba002be412a5c491d68572025e10b4f5d60570027fa38f5e0cb7efe031d2660639312ed30
-
Filesize
321KB
MD55f0e763ba600c58eaf31d109dc2d2334
SHA172781eaa623df2d9e6be66a9496e2fc50b17e662
SHA256d9ba2e2b4ebfab83565ae0c66599e2b48e892662c0bc5749d4790244e5ac31f5
SHA512ec1f8688ef65ca18bacacd9a623109a21292574abff5f342f8c47cdba002be412a5c491d68572025e10b4f5d60570027fa38f5e0cb7efe031d2660639312ed30
-
Filesize
140KB
MD582b01a3b3a833c54d615eba75048da93
SHA18ef9f6d31480f9cebb79ee35881ebab68bf7aa8b
SHA2563799366e58efc76046ccd5a73726f86897c038803cc9c4ac548cf20e9f995e84
SHA512517af773b3beed9702f481cd0a98a25bac6a87eaad7a65b1ae79e3af61a52b809d5e3d641de4a0615f3b43b9bdf89e09824da65f623e71f6fe90c7a262045845
-
Filesize
140KB
MD582b01a3b3a833c54d615eba75048da93
SHA18ef9f6d31480f9cebb79ee35881ebab68bf7aa8b
SHA2563799366e58efc76046ccd5a73726f86897c038803cc9c4ac548cf20e9f995e84
SHA512517af773b3beed9702f481cd0a98a25bac6a87eaad7a65b1ae79e3af61a52b809d5e3d641de4a0615f3b43b9bdf89e09824da65f623e71f6fe90c7a262045845
-
Filesize
321KB
MD55f0e763ba600c58eaf31d109dc2d2334
SHA172781eaa623df2d9e6be66a9496e2fc50b17e662
SHA256d9ba2e2b4ebfab83565ae0c66599e2b48e892662c0bc5749d4790244e5ac31f5
SHA512ec1f8688ef65ca18bacacd9a623109a21292574abff5f342f8c47cdba002be412a5c491d68572025e10b4f5d60570027fa38f5e0cb7efe031d2660639312ed30
-
Filesize
321KB
MD55f0e763ba600c58eaf31d109dc2d2334
SHA172781eaa623df2d9e6be66a9496e2fc50b17e662
SHA256d9ba2e2b4ebfab83565ae0c66599e2b48e892662c0bc5749d4790244e5ac31f5
SHA512ec1f8688ef65ca18bacacd9a623109a21292574abff5f342f8c47cdba002be412a5c491d68572025e10b4f5d60570027fa38f5e0cb7efe031d2660639312ed30
-
Filesize
321KB
MD55f0e763ba600c58eaf31d109dc2d2334
SHA172781eaa623df2d9e6be66a9496e2fc50b17e662
SHA256d9ba2e2b4ebfab83565ae0c66599e2b48e892662c0bc5749d4790244e5ac31f5
SHA512ec1f8688ef65ca18bacacd9a623109a21292574abff5f342f8c47cdba002be412a5c491d68572025e10b4f5d60570027fa38f5e0cb7efe031d2660639312ed30
-
Filesize
321KB
MD55f0e763ba600c58eaf31d109dc2d2334
SHA172781eaa623df2d9e6be66a9496e2fc50b17e662
SHA256d9ba2e2b4ebfab83565ae0c66599e2b48e892662c0bc5749d4790244e5ac31f5
SHA512ec1f8688ef65ca18bacacd9a623109a21292574abff5f342f8c47cdba002be412a5c491d68572025e10b4f5d60570027fa38f5e0cb7efe031d2660639312ed30
-
Filesize
321KB
MD55f0e763ba600c58eaf31d109dc2d2334
SHA172781eaa623df2d9e6be66a9496e2fc50b17e662
SHA256d9ba2e2b4ebfab83565ae0c66599e2b48e892662c0bc5749d4790244e5ac31f5
SHA512ec1f8688ef65ca18bacacd9a623109a21292574abff5f342f8c47cdba002be412a5c491d68572025e10b4f5d60570027fa38f5e0cb7efe031d2660639312ed30
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7