Analysis
-
max time kernel
140s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2023, 03:57
Static task
static1
Behavioral task
behavioral1
Sample
8887ed6afcb734719bbdb27c896daf8fad6053610792dffc3521b8e6c18a4078.exe
Resource
win10v2004-20230703-en
General
-
Target
8887ed6afcb734719bbdb27c896daf8fad6053610792dffc3521b8e6c18a4078.exe
-
Size
1.4MB
-
MD5
ff195a3b66ced613743f5892d1275d2b
-
SHA1
75613125d04a6108396645c31dfe6acb51bfaa92
-
SHA256
8887ed6afcb734719bbdb27c896daf8fad6053610792dffc3521b8e6c18a4078
-
SHA512
e3addf652fa316acb414418bcc92570e888f2a63f48d43b5331fd85c2ea815684324d6311f2792aeb42ef3e43bb7c610595ccb48af034cd8098bb65e02e2484e
-
SSDEEP
24576:Ryy27kNDChwtleXzYUVOKMEhNBQfkd5rJg4sJnRJuUSZA/kGeVS4fRyyqsh3hN57:E78iwtleXzRsKMEhNmcd5rJ6nfKJzHWG
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
stas
77.91.124.82:19071
-
auth_value
db6d96c4eade05afc28c31d9ad73a73c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 3768 y1938265.exe 4884 y6024484.exe 4644 y4257010.exe 4340 l0586353.exe 4648 saves.exe 4640 m3143299.exe 2708 n0284339.exe -
Loads dropped DLL 1 IoCs
pid Process 2276 rundll32.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8887ed6afcb734719bbdb27c896daf8fad6053610792dffc3521b8e6c18a4078.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y1938265.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y6024484.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y4257010.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5116 schtasks.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1412 wrote to memory of 3768 1412 8887ed6afcb734719bbdb27c896daf8fad6053610792dffc3521b8e6c18a4078.exe 80 PID 1412 wrote to memory of 3768 1412 8887ed6afcb734719bbdb27c896daf8fad6053610792dffc3521b8e6c18a4078.exe 80 PID 1412 wrote to memory of 3768 1412 8887ed6afcb734719bbdb27c896daf8fad6053610792dffc3521b8e6c18a4078.exe 80 PID 3768 wrote to memory of 4884 3768 y1938265.exe 81 PID 3768 wrote to memory of 4884 3768 y1938265.exe 81 PID 3768 wrote to memory of 4884 3768 y1938265.exe 81 PID 4884 wrote to memory of 4644 4884 y6024484.exe 82 PID 4884 wrote to memory of 4644 4884 y6024484.exe 82 PID 4884 wrote to memory of 4644 4884 y6024484.exe 82 PID 4644 wrote to memory of 4340 4644 y4257010.exe 83 PID 4644 wrote to memory of 4340 4644 y4257010.exe 83 PID 4644 wrote to memory of 4340 4644 y4257010.exe 83 PID 4340 wrote to memory of 4648 4340 l0586353.exe 84 PID 4340 wrote to memory of 4648 4340 l0586353.exe 84 PID 4340 wrote to memory of 4648 4340 l0586353.exe 84 PID 4644 wrote to memory of 4640 4644 y4257010.exe 85 PID 4644 wrote to memory of 4640 4644 y4257010.exe 85 PID 4644 wrote to memory of 4640 4644 y4257010.exe 85 PID 4648 wrote to memory of 5116 4648 saves.exe 86 PID 4648 wrote to memory of 5116 4648 saves.exe 86 PID 4648 wrote to memory of 5116 4648 saves.exe 86 PID 4648 wrote to memory of 684 4648 saves.exe 88 PID 4648 wrote to memory of 684 4648 saves.exe 88 PID 4648 wrote to memory of 684 4648 saves.exe 88 PID 684 wrote to memory of 924 684 cmd.exe 91 PID 684 wrote to memory of 924 684 cmd.exe 91 PID 684 wrote to memory of 924 684 cmd.exe 91 PID 4884 wrote to memory of 2708 4884 y6024484.exe 90 PID 4884 wrote to memory of 2708 4884 y6024484.exe 90 PID 4884 wrote to memory of 2708 4884 y6024484.exe 90 PID 684 wrote to memory of 728 684 cmd.exe 92 PID 684 wrote to memory of 728 684 cmd.exe 92 PID 684 wrote to memory of 728 684 cmd.exe 92 PID 684 wrote to memory of 3796 684 cmd.exe 93 PID 684 wrote to memory of 3796 684 cmd.exe 93 PID 684 wrote to memory of 3796 684 cmd.exe 93 PID 684 wrote to memory of 1592 684 cmd.exe 94 PID 684 wrote to memory of 1592 684 cmd.exe 94 PID 684 wrote to memory of 1592 684 cmd.exe 94 PID 684 wrote to memory of 1032 684 cmd.exe 95 PID 684 wrote to memory of 1032 684 cmd.exe 95 PID 684 wrote to memory of 1032 684 cmd.exe 95 PID 684 wrote to memory of 3096 684 cmd.exe 97 PID 684 wrote to memory of 3096 684 cmd.exe 97 PID 684 wrote to memory of 3096 684 cmd.exe 97 PID 4648 wrote to memory of 2276 4648 saves.exe 107 PID 4648 wrote to memory of 2276 4648 saves.exe 107 PID 4648 wrote to memory of 2276 4648 saves.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\8887ed6afcb734719bbdb27c896daf8fad6053610792dffc3521b8e6c18a4078.exe"C:\Users\Admin\AppData\Local\Temp\8887ed6afcb734719bbdb27c896daf8fad6053610792dffc3521b8e6c18a4078.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1938265.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1938265.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6024484.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6024484.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y4257010.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y4257010.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l0586353.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l0586353.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:5116
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:924
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:728
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:3796
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1592
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:1032
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:3096
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:2276
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m3143299.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m3143299.exe5⤵
- Executes dropped EXE
PID:4640
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n0284339.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n0284339.exe4⤵
- Executes dropped EXE
PID:2708
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5ec7a0574128a25db6b2fbc6e2533864c
SHA1c907ce9c1a5bdc73bd076ddafdc5c7cc670e90e8
SHA256e8db60a11afaa9dfb11729063bf49f799803296f952285b41ea05eb1cd43bde2
SHA5121d309ac34f94803554ce0e182b11e626edaff0525a4b6774f7013f8e2b7db1ea43db30901237cb682c420101cf30efe8020d26ac5670efb683562a2269a5ec50
-
Filesize
1.3MB
MD5ec7a0574128a25db6b2fbc6e2533864c
SHA1c907ce9c1a5bdc73bd076ddafdc5c7cc670e90e8
SHA256e8db60a11afaa9dfb11729063bf49f799803296f952285b41ea05eb1cd43bde2
SHA5121d309ac34f94803554ce0e182b11e626edaff0525a4b6774f7013f8e2b7db1ea43db30901237cb682c420101cf30efe8020d26ac5670efb683562a2269a5ec50
-
Filesize
475KB
MD5460630d2e00cde5ccb9fa160892fea9d
SHA17498b0acd8bade267f91fdb2d4f464f2bca54fb4
SHA25676272a793d67e7a7d530e38ca1f4e8084b8fcbfe7140d6137ea9db278651e4d0
SHA512da43640d01facd3a9fb1949eeb7284293f0fdebad357cb86e00f90f54a63302d3a3a5b4e46a84a7203443fa3097791936048bfd727a23a7d0b5dace0036808e5
-
Filesize
475KB
MD5460630d2e00cde5ccb9fa160892fea9d
SHA17498b0acd8bade267f91fdb2d4f464f2bca54fb4
SHA25676272a793d67e7a7d530e38ca1f4e8084b8fcbfe7140d6137ea9db278651e4d0
SHA512da43640d01facd3a9fb1949eeb7284293f0fdebad357cb86e00f90f54a63302d3a3a5b4e46a84a7203443fa3097791936048bfd727a23a7d0b5dace0036808e5
-
Filesize
174KB
MD5d397d18d0890addd72ef8c55ecde6fcf
SHA117dcd92f8b92e49531c25356a4fd08ffba234a26
SHA256f8b5328054fcc136596967bf880a33aef8a3a6b1f04e2797ad84cd9d21b9c1af
SHA512ecffeff61f8490115494b10c99b5aef9c7bfd1ce8324b172bfa09a9e082723fb3a937601aba48f33023f929d4dd84661550435f001ef10e00421abe27c939b9c
-
Filesize
174KB
MD5d397d18d0890addd72ef8c55ecde6fcf
SHA117dcd92f8b92e49531c25356a4fd08ffba234a26
SHA256f8b5328054fcc136596967bf880a33aef8a3a6b1f04e2797ad84cd9d21b9c1af
SHA512ecffeff61f8490115494b10c99b5aef9c7bfd1ce8324b172bfa09a9e082723fb3a937601aba48f33023f929d4dd84661550435f001ef10e00421abe27c939b9c
-
Filesize
320KB
MD53742401f7622a93eff8be323a0312b03
SHA13aad3e179d7f8d1c70a8c1c6ca21e81b500aea14
SHA2566d6754577604fb65647703e79134440b228bb607487c2dc0a5e4ddbf2b3c8c6f
SHA512264449766d73687ace459bf5db79e9dbad58363553679607aa4d1f30d0ff61496160ffaebe097fd0ad0662902900cd56c7607dbd749dedac33306d4852f99ce9
-
Filesize
320KB
MD53742401f7622a93eff8be323a0312b03
SHA13aad3e179d7f8d1c70a8c1c6ca21e81b500aea14
SHA2566d6754577604fb65647703e79134440b228bb607487c2dc0a5e4ddbf2b3c8c6f
SHA512264449766d73687ace459bf5db79e9dbad58363553679607aa4d1f30d0ff61496160ffaebe097fd0ad0662902900cd56c7607dbd749dedac33306d4852f99ce9
-
Filesize
323KB
MD5a86d39de07e0c8e1b4f24f1c4b1b8cfb
SHA18ddaceb33b1c3d175b9bd7c98408491a683c843c
SHA256bf45124895f6fec0155252c5e22d7f7578d308c4949ff8680f92c5e1a9ee61f9
SHA512f70f2e66dabab9fa193c544b51f1922161b0a6746a6e84146e7f9af67234dab52943088219eb75e0716c9fd282e82c9f887739755bfff4d8780b9ba043f3c4e2
-
Filesize
323KB
MD5a86d39de07e0c8e1b4f24f1c4b1b8cfb
SHA18ddaceb33b1c3d175b9bd7c98408491a683c843c
SHA256bf45124895f6fec0155252c5e22d7f7578d308c4949ff8680f92c5e1a9ee61f9
SHA512f70f2e66dabab9fa193c544b51f1922161b0a6746a6e84146e7f9af67234dab52943088219eb75e0716c9fd282e82c9f887739755bfff4d8780b9ba043f3c4e2
-
Filesize
140KB
MD5ec8593c38de90cd605c47576eeae76da
SHA17d6613303815903e1f8290cf6e7138435381ef84
SHA25616d82a7ec3a762af5a95506c067adcf76896a5ffa3d57c48af9a6df2b06c08aa
SHA512ad753bf2c5782e5039023238bdff23031c0c3644c330039b5934e6b0efbef8858e4005b45078cddafd935c886c918af7a1d1141a0176fc6fde1297457966c0c3
-
Filesize
140KB
MD5ec8593c38de90cd605c47576eeae76da
SHA17d6613303815903e1f8290cf6e7138435381ef84
SHA25616d82a7ec3a762af5a95506c067adcf76896a5ffa3d57c48af9a6df2b06c08aa
SHA512ad753bf2c5782e5039023238bdff23031c0c3644c330039b5934e6b0efbef8858e4005b45078cddafd935c886c918af7a1d1141a0176fc6fde1297457966c0c3
-
Filesize
323KB
MD5a86d39de07e0c8e1b4f24f1c4b1b8cfb
SHA18ddaceb33b1c3d175b9bd7c98408491a683c843c
SHA256bf45124895f6fec0155252c5e22d7f7578d308c4949ff8680f92c5e1a9ee61f9
SHA512f70f2e66dabab9fa193c544b51f1922161b0a6746a6e84146e7f9af67234dab52943088219eb75e0716c9fd282e82c9f887739755bfff4d8780b9ba043f3c4e2
-
Filesize
323KB
MD5a86d39de07e0c8e1b4f24f1c4b1b8cfb
SHA18ddaceb33b1c3d175b9bd7c98408491a683c843c
SHA256bf45124895f6fec0155252c5e22d7f7578d308c4949ff8680f92c5e1a9ee61f9
SHA512f70f2e66dabab9fa193c544b51f1922161b0a6746a6e84146e7f9af67234dab52943088219eb75e0716c9fd282e82c9f887739755bfff4d8780b9ba043f3c4e2
-
Filesize
323KB
MD5a86d39de07e0c8e1b4f24f1c4b1b8cfb
SHA18ddaceb33b1c3d175b9bd7c98408491a683c843c
SHA256bf45124895f6fec0155252c5e22d7f7578d308c4949ff8680f92c5e1a9ee61f9
SHA512f70f2e66dabab9fa193c544b51f1922161b0a6746a6e84146e7f9af67234dab52943088219eb75e0716c9fd282e82c9f887739755bfff4d8780b9ba043f3c4e2
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7