Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
27/08/2023, 11:41
Static task
static1
Behavioral task
behavioral1
Sample
d85b36b4e1f727f8587c87faef4376d4207d8d967e19cc3e41d956ea8ce8badf.exe
Resource
win10v2004-20230703-en
General
-
Target
d85b36b4e1f727f8587c87faef4376d4207d8d967e19cc3e41d956ea8ce8badf.exe
-
Size
1.4MB
-
MD5
8855384d9e0e706cf69a543ceaff1c91
-
SHA1
bc8495df28a57ec8783201bd4f3ac8dac8a364ad
-
SHA256
d85b36b4e1f727f8587c87faef4376d4207d8d967e19cc3e41d956ea8ce8badf
-
SHA512
29983ae90e1e4132413dd8b9e70cdd74e74ea4f628c69785dfc25bd522fc20447d9845dac9cb9e7123013f22cffec052b5d9d78e109dfd94955c10c4f024a598
-
SSDEEP
24576:UyhQQAaNpG4iIda8KKhVX3mFUHIYFGbCHeMXCj0Kt2c2Jxh4DdMiUQskNkYG:jhAwpUUKKhVNuCHSARJx2BMzQSY
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
nrava
77.91.124.82:19071
-
auth_value
43fe50e9ee6afb85588e03ac9676e2f7
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/files/0x000200000001e6e7-41.dat family_redline behavioral1/files/0x000200000001e6e7-42.dat family_redline behavioral1/memory/3112-44-0x0000000000A00000-0x0000000000A30000-memory.dmp family_redline -
Executes dropped EXE 10 IoCs
pid Process 1408 y1702881.exe 4408 y3799878.exe 4924 y7998060.exe 3800 l5196614.exe 3696 saves.exe 988 m2203924.exe 3112 n4284828.exe 820 saves.exe 1968 saves.exe 2588 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 3752 rundll32.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d85b36b4e1f727f8587c87faef4376d4207d8d967e19cc3e41d956ea8ce8badf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y1702881.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y3799878.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y7998060.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1860 schtasks.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 3272 wrote to memory of 1408 3272 d85b36b4e1f727f8587c87faef4376d4207d8d967e19cc3e41d956ea8ce8badf.exe 82 PID 3272 wrote to memory of 1408 3272 d85b36b4e1f727f8587c87faef4376d4207d8d967e19cc3e41d956ea8ce8badf.exe 82 PID 3272 wrote to memory of 1408 3272 d85b36b4e1f727f8587c87faef4376d4207d8d967e19cc3e41d956ea8ce8badf.exe 82 PID 1408 wrote to memory of 4408 1408 y1702881.exe 83 PID 1408 wrote to memory of 4408 1408 y1702881.exe 83 PID 1408 wrote to memory of 4408 1408 y1702881.exe 83 PID 4408 wrote to memory of 4924 4408 y3799878.exe 84 PID 4408 wrote to memory of 4924 4408 y3799878.exe 84 PID 4408 wrote to memory of 4924 4408 y3799878.exe 84 PID 4924 wrote to memory of 3800 4924 y7998060.exe 85 PID 4924 wrote to memory of 3800 4924 y7998060.exe 85 PID 4924 wrote to memory of 3800 4924 y7998060.exe 85 PID 3800 wrote to memory of 3696 3800 l5196614.exe 86 PID 3800 wrote to memory of 3696 3800 l5196614.exe 86 PID 3800 wrote to memory of 3696 3800 l5196614.exe 86 PID 4924 wrote to memory of 988 4924 y7998060.exe 87 PID 4924 wrote to memory of 988 4924 y7998060.exe 87 PID 4924 wrote to memory of 988 4924 y7998060.exe 87 PID 3696 wrote to memory of 1860 3696 saves.exe 89 PID 3696 wrote to memory of 1860 3696 saves.exe 89 PID 3696 wrote to memory of 1860 3696 saves.exe 89 PID 3696 wrote to memory of 3168 3696 saves.exe 91 PID 3696 wrote to memory of 3168 3696 saves.exe 91 PID 3696 wrote to memory of 3168 3696 saves.exe 91 PID 3168 wrote to memory of 5108 3168 cmd.exe 93 PID 3168 wrote to memory of 5108 3168 cmd.exe 93 PID 3168 wrote to memory of 5108 3168 cmd.exe 93 PID 3168 wrote to memory of 3716 3168 cmd.exe 94 PID 3168 wrote to memory of 3716 3168 cmd.exe 94 PID 3168 wrote to memory of 3716 3168 cmd.exe 94 PID 3168 wrote to memory of 412 3168 cmd.exe 95 PID 3168 wrote to memory of 412 3168 cmd.exe 95 PID 3168 wrote to memory of 412 3168 cmd.exe 95 PID 3168 wrote to memory of 3316 3168 cmd.exe 96 PID 3168 wrote to memory of 3316 3168 cmd.exe 96 PID 3168 wrote to memory of 3316 3168 cmd.exe 96 PID 3168 wrote to memory of 3668 3168 cmd.exe 97 PID 3168 wrote to memory of 3668 3168 cmd.exe 97 PID 3168 wrote to memory of 3668 3168 cmd.exe 97 PID 3168 wrote to memory of 348 3168 cmd.exe 98 PID 3168 wrote to memory of 348 3168 cmd.exe 98 PID 3168 wrote to memory of 348 3168 cmd.exe 98 PID 4408 wrote to memory of 3112 4408 y3799878.exe 99 PID 4408 wrote to memory of 3112 4408 y3799878.exe 99 PID 4408 wrote to memory of 3112 4408 y3799878.exe 99 PID 3696 wrote to memory of 3752 3696 saves.exe 109 PID 3696 wrote to memory of 3752 3696 saves.exe 109 PID 3696 wrote to memory of 3752 3696 saves.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\d85b36b4e1f727f8587c87faef4376d4207d8d967e19cc3e41d956ea8ce8badf.exe"C:\Users\Admin\AppData\Local\Temp\d85b36b4e1f727f8587c87faef4376d4207d8d967e19cc3e41d956ea8ce8badf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1702881.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1702881.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3799878.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3799878.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y7998060.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y7998060.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l5196614.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l5196614.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:1860
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:5108
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:3716
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:412
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3316
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:3668
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:348
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:3752
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m2203924.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m2203924.exe5⤵
- Executes dropped EXE
PID:988
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n4284828.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n4284828.exe4⤵
- Executes dropped EXE
PID:3112
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:820
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:1968
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5b2d15f05387e5c33e75a9edc999c44c1
SHA1cbcc5d5120001f4954e7868c4565f4127f8d5232
SHA256b65de615713729d2116ca42ebdb27dd24f1767b1de7c3f744ab3330a0df75b8f
SHA512113d36821a055188ed31fcdc9954913ff44ce7a7b60bf71baaf2e28a664d41fa0163a99b73cee58a2c38aaa020be2569a8f76d206f87374d219205a121328ff2
-
Filesize
1.3MB
MD5b2d15f05387e5c33e75a9edc999c44c1
SHA1cbcc5d5120001f4954e7868c4565f4127f8d5232
SHA256b65de615713729d2116ca42ebdb27dd24f1767b1de7c3f744ab3330a0df75b8f
SHA512113d36821a055188ed31fcdc9954913ff44ce7a7b60bf71baaf2e28a664d41fa0163a99b73cee58a2c38aaa020be2569a8f76d206f87374d219205a121328ff2
-
Filesize
476KB
MD576b4b475e309e60a39e055773bf4e5e2
SHA196a98f283d65bda5640fde4836e5cca8430a69c5
SHA2561f9f27bc73b19605fc973ba2d08ff4dc054fc4985c6c5fe024c4c41f470decc2
SHA51206700b0a75b9d1ee99b94b195ea468395b8fb42db8eab00f8688099e6950dfb0394866594f06524c33c50bf4502182b5d04b8c93d72b87bb59a930d077b45291
-
Filesize
476KB
MD576b4b475e309e60a39e055773bf4e5e2
SHA196a98f283d65bda5640fde4836e5cca8430a69c5
SHA2561f9f27bc73b19605fc973ba2d08ff4dc054fc4985c6c5fe024c4c41f470decc2
SHA51206700b0a75b9d1ee99b94b195ea468395b8fb42db8eab00f8688099e6950dfb0394866594f06524c33c50bf4502182b5d04b8c93d72b87bb59a930d077b45291
-
Filesize
173KB
MD5fe2bc370582b8c68ef1ca9e735a35bbe
SHA199b4e9d136be4837ed89f3faca68c5acdf582938
SHA256e6b07d7f8d7dc647f70bf959af5dd79770d37c092b89ebd2150f5c5a7100c265
SHA512c6acb19246a3377264c260acf31fe633164d6087eda9e133ac78e52ed780e7e36d8202e546710aa2090db5b6d7031957c5ab1220eee4ecf15bd32c7dc3654099
-
Filesize
173KB
MD5fe2bc370582b8c68ef1ca9e735a35bbe
SHA199b4e9d136be4837ed89f3faca68c5acdf582938
SHA256e6b07d7f8d7dc647f70bf959af5dd79770d37c092b89ebd2150f5c5a7100c265
SHA512c6acb19246a3377264c260acf31fe633164d6087eda9e133ac78e52ed780e7e36d8202e546710aa2090db5b6d7031957c5ab1220eee4ecf15bd32c7dc3654099
-
Filesize
320KB
MD591535195f1b719c91d579ae86116a093
SHA173fa7e41e9e3b4377680b291642ed1e3de07ce7f
SHA256ebde086405902f01d29777baaa23cbd5f3ea993af7a07bb36a4f2a0b904d72ec
SHA51255af790aa72fdefb3230b683df2f46de604e28243ea63f148ef1c36ed456486abe73011e4ad8c2e02bebba00a2c1e97020afce9bdc3d65a704e82fd0ce63bad4
-
Filesize
320KB
MD591535195f1b719c91d579ae86116a093
SHA173fa7e41e9e3b4377680b291642ed1e3de07ce7f
SHA256ebde086405902f01d29777baaa23cbd5f3ea993af7a07bb36a4f2a0b904d72ec
SHA51255af790aa72fdefb3230b683df2f46de604e28243ea63f148ef1c36ed456486abe73011e4ad8c2e02bebba00a2c1e97020afce9bdc3d65a704e82fd0ce63bad4
-
Filesize
322KB
MD58eb06a677c89b31eed7d48dd02b1e670
SHA163d855b50b8e1353b92e063cfebb79b8a4af68b4
SHA25673b633df3d76103eeb6b271b6969c469d9e1c56498e5c35dd98e9fb07ecc35e9
SHA51293cff6e85311a324dad5a25c5697dffd7eee2ef44add6d89990bb57b088e5b0d22d82f82b4394526ca26878be378bcd10f5629dcbaa67d390aef950b26d897b1
-
Filesize
322KB
MD58eb06a677c89b31eed7d48dd02b1e670
SHA163d855b50b8e1353b92e063cfebb79b8a4af68b4
SHA25673b633df3d76103eeb6b271b6969c469d9e1c56498e5c35dd98e9fb07ecc35e9
SHA51293cff6e85311a324dad5a25c5697dffd7eee2ef44add6d89990bb57b088e5b0d22d82f82b4394526ca26878be378bcd10f5629dcbaa67d390aef950b26d897b1
-
Filesize
140KB
MD594490c84e5258bc7bd90b5142e511ade
SHA17700adbf2eecdabd0558471b37d7aa2b5578d494
SHA256c868390476e014736b806e4c644287c9a8114b775525cac4f776560f871c7593
SHA512a660f01d95332cbec1a9adac63533b563aa0ef7546a64e8dbabcc553a1230accae4f8a6863383179ca2231ec94b629361f48cbccfcec3b5ca352db541074efcf
-
Filesize
140KB
MD594490c84e5258bc7bd90b5142e511ade
SHA17700adbf2eecdabd0558471b37d7aa2b5578d494
SHA256c868390476e014736b806e4c644287c9a8114b775525cac4f776560f871c7593
SHA512a660f01d95332cbec1a9adac63533b563aa0ef7546a64e8dbabcc553a1230accae4f8a6863383179ca2231ec94b629361f48cbccfcec3b5ca352db541074efcf
-
Filesize
322KB
MD58eb06a677c89b31eed7d48dd02b1e670
SHA163d855b50b8e1353b92e063cfebb79b8a4af68b4
SHA25673b633df3d76103eeb6b271b6969c469d9e1c56498e5c35dd98e9fb07ecc35e9
SHA51293cff6e85311a324dad5a25c5697dffd7eee2ef44add6d89990bb57b088e5b0d22d82f82b4394526ca26878be378bcd10f5629dcbaa67d390aef950b26d897b1
-
Filesize
322KB
MD58eb06a677c89b31eed7d48dd02b1e670
SHA163d855b50b8e1353b92e063cfebb79b8a4af68b4
SHA25673b633df3d76103eeb6b271b6969c469d9e1c56498e5c35dd98e9fb07ecc35e9
SHA51293cff6e85311a324dad5a25c5697dffd7eee2ef44add6d89990bb57b088e5b0d22d82f82b4394526ca26878be378bcd10f5629dcbaa67d390aef950b26d897b1
-
Filesize
322KB
MD58eb06a677c89b31eed7d48dd02b1e670
SHA163d855b50b8e1353b92e063cfebb79b8a4af68b4
SHA25673b633df3d76103eeb6b271b6969c469d9e1c56498e5c35dd98e9fb07ecc35e9
SHA51293cff6e85311a324dad5a25c5697dffd7eee2ef44add6d89990bb57b088e5b0d22d82f82b4394526ca26878be378bcd10f5629dcbaa67d390aef950b26d897b1
-
Filesize
322KB
MD58eb06a677c89b31eed7d48dd02b1e670
SHA163d855b50b8e1353b92e063cfebb79b8a4af68b4
SHA25673b633df3d76103eeb6b271b6969c469d9e1c56498e5c35dd98e9fb07ecc35e9
SHA51293cff6e85311a324dad5a25c5697dffd7eee2ef44add6d89990bb57b088e5b0d22d82f82b4394526ca26878be378bcd10f5629dcbaa67d390aef950b26d897b1
-
Filesize
322KB
MD58eb06a677c89b31eed7d48dd02b1e670
SHA163d855b50b8e1353b92e063cfebb79b8a4af68b4
SHA25673b633df3d76103eeb6b271b6969c469d9e1c56498e5c35dd98e9fb07ecc35e9
SHA51293cff6e85311a324dad5a25c5697dffd7eee2ef44add6d89990bb57b088e5b0d22d82f82b4394526ca26878be378bcd10f5629dcbaa67d390aef950b26d897b1
-
Filesize
322KB
MD58eb06a677c89b31eed7d48dd02b1e670
SHA163d855b50b8e1353b92e063cfebb79b8a4af68b4
SHA25673b633df3d76103eeb6b271b6969c469d9e1c56498e5c35dd98e9fb07ecc35e9
SHA51293cff6e85311a324dad5a25c5697dffd7eee2ef44add6d89990bb57b088e5b0d22d82f82b4394526ca26878be378bcd10f5629dcbaa67d390aef950b26d897b1
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7