Analysis
-
max time kernel
136s -
max time network
156s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
27/08/2023, 15:44
Static task
static1
Behavioral task
behavioral1
Sample
06836b2c03b5d3d3b69d4994b7c0719a504391088cdced3b16149be84b6acf86.exe
Resource
win10-20230703-en
General
-
Target
06836b2c03b5d3d3b69d4994b7c0719a504391088cdced3b16149be84b6acf86.exe
-
Size
1.4MB
-
MD5
634693e0c2a452728996b180e33eeb23
-
SHA1
dc8117d3a29ad1136aa59b7c7b30dbf6537a3260
-
SHA256
06836b2c03b5d3d3b69d4994b7c0719a504391088cdced3b16149be84b6acf86
-
SHA512
5f0cb270848962ae04e1bd3ab61ecea6ec9de89d9ff0ff6036de0f375582e0814e3f48ccff036cc180fae4ac7cfb52d73fc455eaf31e7b48c583f0f785f8f0e9
-
SSDEEP
24576:4ywF0YblCgfy4TSiKGhyve9eZTMufESI+fcOlsXN5BArZkj2XZ1YfJ9sx:/FHgfy4uiKGhyvesZgufdIGc8INP4ZkJ
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
nrava
77.91.124.82:19071
-
auth_value
43fe50e9ee6afb85588e03ac9676e2f7
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/files/0x000600000001b011-38.dat family_redline behavioral1/files/0x000600000001b011-39.dat family_redline behavioral1/memory/4808-40-0x0000000000500000-0x0000000000530000-memory.dmp family_redline -
Executes dropped EXE 9 IoCs
pid Process 5052 y0067418.exe 1472 y1921372.exe 3928 y3663832.exe 4756 l3829381.exe 928 saves.exe 4980 m6872086.exe 4808 n3793436.exe 1352 saves.exe 3268 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 2516 rundll32.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y3663832.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 06836b2c03b5d3d3b69d4994b7c0719a504391088cdced3b16149be84b6acf86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y0067418.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y1921372.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 64 schtasks.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 3396 wrote to memory of 5052 3396 06836b2c03b5d3d3b69d4994b7c0719a504391088cdced3b16149be84b6acf86.exe 70 PID 3396 wrote to memory of 5052 3396 06836b2c03b5d3d3b69d4994b7c0719a504391088cdced3b16149be84b6acf86.exe 70 PID 3396 wrote to memory of 5052 3396 06836b2c03b5d3d3b69d4994b7c0719a504391088cdced3b16149be84b6acf86.exe 70 PID 5052 wrote to memory of 1472 5052 y0067418.exe 71 PID 5052 wrote to memory of 1472 5052 y0067418.exe 71 PID 5052 wrote to memory of 1472 5052 y0067418.exe 71 PID 1472 wrote to memory of 3928 1472 y1921372.exe 72 PID 1472 wrote to memory of 3928 1472 y1921372.exe 72 PID 1472 wrote to memory of 3928 1472 y1921372.exe 72 PID 3928 wrote to memory of 4756 3928 y3663832.exe 73 PID 3928 wrote to memory of 4756 3928 y3663832.exe 73 PID 3928 wrote to memory of 4756 3928 y3663832.exe 73 PID 4756 wrote to memory of 928 4756 l3829381.exe 74 PID 4756 wrote to memory of 928 4756 l3829381.exe 74 PID 4756 wrote to memory of 928 4756 l3829381.exe 74 PID 3928 wrote to memory of 4980 3928 y3663832.exe 75 PID 3928 wrote to memory of 4980 3928 y3663832.exe 75 PID 3928 wrote to memory of 4980 3928 y3663832.exe 75 PID 928 wrote to memory of 64 928 saves.exe 76 PID 928 wrote to memory of 64 928 saves.exe 76 PID 928 wrote to memory of 64 928 saves.exe 76 PID 928 wrote to memory of 1616 928 saves.exe 77 PID 928 wrote to memory of 1616 928 saves.exe 77 PID 928 wrote to memory of 1616 928 saves.exe 77 PID 1616 wrote to memory of 3444 1616 cmd.exe 80 PID 1616 wrote to memory of 3444 1616 cmd.exe 80 PID 1616 wrote to memory of 3444 1616 cmd.exe 80 PID 1616 wrote to memory of 4748 1616 cmd.exe 81 PID 1616 wrote to memory of 4748 1616 cmd.exe 81 PID 1616 wrote to memory of 4748 1616 cmd.exe 81 PID 1616 wrote to memory of 4264 1616 cmd.exe 82 PID 1616 wrote to memory of 4264 1616 cmd.exe 82 PID 1616 wrote to memory of 4264 1616 cmd.exe 82 PID 1616 wrote to memory of 4828 1616 cmd.exe 83 PID 1616 wrote to memory of 4828 1616 cmd.exe 83 PID 1616 wrote to memory of 4828 1616 cmd.exe 83 PID 1616 wrote to memory of 4764 1616 cmd.exe 84 PID 1616 wrote to memory of 4764 1616 cmd.exe 84 PID 1616 wrote to memory of 4764 1616 cmd.exe 84 PID 1616 wrote to memory of 4744 1616 cmd.exe 85 PID 1616 wrote to memory of 4744 1616 cmd.exe 85 PID 1616 wrote to memory of 4744 1616 cmd.exe 85 PID 1472 wrote to memory of 4808 1472 y1921372.exe 86 PID 1472 wrote to memory of 4808 1472 y1921372.exe 86 PID 1472 wrote to memory of 4808 1472 y1921372.exe 86 PID 928 wrote to memory of 2516 928 saves.exe 88 PID 928 wrote to memory of 2516 928 saves.exe 88 PID 928 wrote to memory of 2516 928 saves.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\06836b2c03b5d3d3b69d4994b7c0719a504391088cdced3b16149be84b6acf86.exe"C:\Users\Admin\AppData\Local\Temp\06836b2c03b5d3d3b69d4994b7c0719a504391088cdced3b16149be84b6acf86.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0067418.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0067418.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y1921372.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y1921372.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y3663832.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y3663832.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3829381.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3829381.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:64
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3444
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:4748
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:4264
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4828
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:4764
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:4744
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:2516
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m6872086.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m6872086.exe5⤵
- Executes dropped EXE
PID:4980
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n3793436.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n3793436.exe4⤵
- Executes dropped EXE
PID:4808
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:1352
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:3268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5f62765168c16aec05c082ecdd4c215cc
SHA1720a3ee10dc7b227934eb7b72c915c65fa581499
SHA2563cf83938870345b478ad52dd98619c76920b9d48c89c3b7619f98547e20e449d
SHA51262210e1caf83513879609408af4fe951c51780499090fff9caa0f911542ea1de61c666d2a47d7673961967cfc536c087dca7730045a3915594d1ff6c1016a079
-
Filesize
1.3MB
MD5f62765168c16aec05c082ecdd4c215cc
SHA1720a3ee10dc7b227934eb7b72c915c65fa581499
SHA2563cf83938870345b478ad52dd98619c76920b9d48c89c3b7619f98547e20e449d
SHA51262210e1caf83513879609408af4fe951c51780499090fff9caa0f911542ea1de61c666d2a47d7673961967cfc536c087dca7730045a3915594d1ff6c1016a079
-
Filesize
475KB
MD518b2882812b6213cf74a8dc66f42fbea
SHA1530e08727a5b63b0eebd7345a109f1ab194836bf
SHA256f5f3c01cb6a0c645c56925bf0b21968e937942ae961b0fbfd52d559190e8b8f4
SHA512eedb72a600dc899dba291fc56a64badb9126a0a1d95f3d6f6e007777d6831cffca030e499f9b27fd6b0aa8fedd340ec8890419f33c303089de6a7c919f9181dd
-
Filesize
475KB
MD518b2882812b6213cf74a8dc66f42fbea
SHA1530e08727a5b63b0eebd7345a109f1ab194836bf
SHA256f5f3c01cb6a0c645c56925bf0b21968e937942ae961b0fbfd52d559190e8b8f4
SHA512eedb72a600dc899dba291fc56a64badb9126a0a1d95f3d6f6e007777d6831cffca030e499f9b27fd6b0aa8fedd340ec8890419f33c303089de6a7c919f9181dd
-
Filesize
174KB
MD50348b00e004f4d4ec2568841dc93bbf5
SHA1953b0cb07dc5bffc5800b615f5fffe49e0819507
SHA2561c66859650ff0f6172f9642318493831b1d2fa16332e68a042051dc83143cba1
SHA512019e4e2f175974103ca972f60a645f6636028a98d3c454605e8be7c70cd80933ea5c4a9e66af45705de221a2a52861f8e45545c6325f5c0ce5647e94f87dcc4c
-
Filesize
174KB
MD50348b00e004f4d4ec2568841dc93bbf5
SHA1953b0cb07dc5bffc5800b615f5fffe49e0819507
SHA2561c66859650ff0f6172f9642318493831b1d2fa16332e68a042051dc83143cba1
SHA512019e4e2f175974103ca972f60a645f6636028a98d3c454605e8be7c70cd80933ea5c4a9e66af45705de221a2a52861f8e45545c6325f5c0ce5647e94f87dcc4c
-
Filesize
319KB
MD584101162ae977a23e125ae98738c761f
SHA1f38d2cd923bacb391d937d2ff0ba60765a77bc4b
SHA2568f87630a5df1d9b8e0eb54e6acdcf2f76d00a2f727cc7d5af38c763c5b1c22a9
SHA5126667535ea672e00f3c991c084f1927f0c804189b72704d8356d0945507c2f29376240c7fcec4b9e081d84010fecde31ab148fab637a81e2f457d3a83699ab55f
-
Filesize
319KB
MD584101162ae977a23e125ae98738c761f
SHA1f38d2cd923bacb391d937d2ff0ba60765a77bc4b
SHA2568f87630a5df1d9b8e0eb54e6acdcf2f76d00a2f727cc7d5af38c763c5b1c22a9
SHA5126667535ea672e00f3c991c084f1927f0c804189b72704d8356d0945507c2f29376240c7fcec4b9e081d84010fecde31ab148fab637a81e2f457d3a83699ab55f
-
Filesize
322KB
MD5bff6d23aa2b901c8074670c009388900
SHA1848585cd0d5abae71bde4bc019d41320afd61d05
SHA256c3a3f661384822fa286fa847b569c021eb2dd7edeb5c4be2935eed4fd28de9e0
SHA51242af833c67f9f1c4bcc3c8d95c3781303cce2f5eecb51ec13d5b807de19f4d24465d9bbafa13386493c2f51fc41b1a0c4db85b23ffd5a22e632aecdcaffc1b2e
-
Filesize
322KB
MD5bff6d23aa2b901c8074670c009388900
SHA1848585cd0d5abae71bde4bc019d41320afd61d05
SHA256c3a3f661384822fa286fa847b569c021eb2dd7edeb5c4be2935eed4fd28de9e0
SHA51242af833c67f9f1c4bcc3c8d95c3781303cce2f5eecb51ec13d5b807de19f4d24465d9bbafa13386493c2f51fc41b1a0c4db85b23ffd5a22e632aecdcaffc1b2e
-
Filesize
140KB
MD500fccba6f569c5510922a4b64e9c1e13
SHA127c4ed461fedc5474f857e3797fe8603a094622f
SHA2567f90f64b33b4cd7e164d775a3e0e57a05e6e453a40d882e6e05e485331c075c7
SHA512a9a279f6677e346adc7ceff84603d95f80baa5cffb849473999386db8a2baa8780a95b5c712bfe9342a7cb85d60fb5be52e9697740ff50ac155f6ea31b704a4b
-
Filesize
140KB
MD500fccba6f569c5510922a4b64e9c1e13
SHA127c4ed461fedc5474f857e3797fe8603a094622f
SHA2567f90f64b33b4cd7e164d775a3e0e57a05e6e453a40d882e6e05e485331c075c7
SHA512a9a279f6677e346adc7ceff84603d95f80baa5cffb849473999386db8a2baa8780a95b5c712bfe9342a7cb85d60fb5be52e9697740ff50ac155f6ea31b704a4b
-
Filesize
322KB
MD5bff6d23aa2b901c8074670c009388900
SHA1848585cd0d5abae71bde4bc019d41320afd61d05
SHA256c3a3f661384822fa286fa847b569c021eb2dd7edeb5c4be2935eed4fd28de9e0
SHA51242af833c67f9f1c4bcc3c8d95c3781303cce2f5eecb51ec13d5b807de19f4d24465d9bbafa13386493c2f51fc41b1a0c4db85b23ffd5a22e632aecdcaffc1b2e
-
Filesize
322KB
MD5bff6d23aa2b901c8074670c009388900
SHA1848585cd0d5abae71bde4bc019d41320afd61d05
SHA256c3a3f661384822fa286fa847b569c021eb2dd7edeb5c4be2935eed4fd28de9e0
SHA51242af833c67f9f1c4bcc3c8d95c3781303cce2f5eecb51ec13d5b807de19f4d24465d9bbafa13386493c2f51fc41b1a0c4db85b23ffd5a22e632aecdcaffc1b2e
-
Filesize
322KB
MD5bff6d23aa2b901c8074670c009388900
SHA1848585cd0d5abae71bde4bc019d41320afd61d05
SHA256c3a3f661384822fa286fa847b569c021eb2dd7edeb5c4be2935eed4fd28de9e0
SHA51242af833c67f9f1c4bcc3c8d95c3781303cce2f5eecb51ec13d5b807de19f4d24465d9bbafa13386493c2f51fc41b1a0c4db85b23ffd5a22e632aecdcaffc1b2e
-
Filesize
322KB
MD5bff6d23aa2b901c8074670c009388900
SHA1848585cd0d5abae71bde4bc019d41320afd61d05
SHA256c3a3f661384822fa286fa847b569c021eb2dd7edeb5c4be2935eed4fd28de9e0
SHA51242af833c67f9f1c4bcc3c8d95c3781303cce2f5eecb51ec13d5b807de19f4d24465d9bbafa13386493c2f51fc41b1a0c4db85b23ffd5a22e632aecdcaffc1b2e
-
Filesize
322KB
MD5bff6d23aa2b901c8074670c009388900
SHA1848585cd0d5abae71bde4bc019d41320afd61d05
SHA256c3a3f661384822fa286fa847b569c021eb2dd7edeb5c4be2935eed4fd28de9e0
SHA51242af833c67f9f1c4bcc3c8d95c3781303cce2f5eecb51ec13d5b807de19f4d24465d9bbafa13386493c2f51fc41b1a0c4db85b23ffd5a22e632aecdcaffc1b2e
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b