Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2023, 05:27
Static task
static1
Behavioral task
behavioral1
Sample
06004b7c07fb66bc76cdc825cbdac0bd15f4e81b6c65e2a920de702aa14c4d10.exe
Resource
win10v2004-20230703-en
General
-
Target
06004b7c07fb66bc76cdc825cbdac0bd15f4e81b6c65e2a920de702aa14c4d10.exe
-
Size
1.4MB
-
MD5
3522a25d8aeaab3bfd1017697102976b
-
SHA1
babbc10110a61a0feac3b1a6e44bea9cc6c31dcd
-
SHA256
06004b7c07fb66bc76cdc825cbdac0bd15f4e81b6c65e2a920de702aa14c4d10
-
SHA512
57ebb2de7bdc4c453ffdc34600410893a3bf5daa43761e598d232a23fbb24f74e99d2d38728f3d57271f4b6d638fcc89a75bcc0ba0f7e27f9821c357071bc010
-
SSDEEP
24576:JyZgGIr6aNyAAxlhvjEbKmnligDxI7NlXvvuWCScCDvk9xtIVVQCPT0rpYDJ2ZD4:8Z4rrdAxPwKmnligq7X/eCExt2VHPTe6
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
stas
77.91.124.82:19071
-
auth_value
db6d96c4eade05afc28c31d9ad73a73c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 10 IoCs
pid Process 1456 y5273730.exe 1160 y3432498.exe 4552 y6924510.exe 4052 l3760067.exe 1468 saves.exe 2272 m9236637.exe 4348 n6596979.exe 932 saves.exe 568 saves.exe 3868 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 1816 rundll32.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 06004b7c07fb66bc76cdc825cbdac0bd15f4e81b6c65e2a920de702aa14c4d10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y5273730.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y3432498.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y6924510.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1840 schtasks.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 4004 wrote to memory of 1456 4004 06004b7c07fb66bc76cdc825cbdac0bd15f4e81b6c65e2a920de702aa14c4d10.exe 81 PID 4004 wrote to memory of 1456 4004 06004b7c07fb66bc76cdc825cbdac0bd15f4e81b6c65e2a920de702aa14c4d10.exe 81 PID 4004 wrote to memory of 1456 4004 06004b7c07fb66bc76cdc825cbdac0bd15f4e81b6c65e2a920de702aa14c4d10.exe 81 PID 1456 wrote to memory of 1160 1456 y5273730.exe 82 PID 1456 wrote to memory of 1160 1456 y5273730.exe 82 PID 1456 wrote to memory of 1160 1456 y5273730.exe 82 PID 1160 wrote to memory of 4552 1160 y3432498.exe 83 PID 1160 wrote to memory of 4552 1160 y3432498.exe 83 PID 1160 wrote to memory of 4552 1160 y3432498.exe 83 PID 4552 wrote to memory of 4052 4552 y6924510.exe 84 PID 4552 wrote to memory of 4052 4552 y6924510.exe 84 PID 4552 wrote to memory of 4052 4552 y6924510.exe 84 PID 4052 wrote to memory of 1468 4052 l3760067.exe 85 PID 4052 wrote to memory of 1468 4052 l3760067.exe 85 PID 4052 wrote to memory of 1468 4052 l3760067.exe 85 PID 4552 wrote to memory of 2272 4552 y6924510.exe 86 PID 4552 wrote to memory of 2272 4552 y6924510.exe 86 PID 4552 wrote to memory of 2272 4552 y6924510.exe 86 PID 1468 wrote to memory of 1840 1468 saves.exe 87 PID 1468 wrote to memory of 1840 1468 saves.exe 87 PID 1468 wrote to memory of 1840 1468 saves.exe 87 PID 1468 wrote to memory of 460 1468 saves.exe 89 PID 1468 wrote to memory of 460 1468 saves.exe 89 PID 1468 wrote to memory of 460 1468 saves.exe 89 PID 460 wrote to memory of 1100 460 cmd.exe 92 PID 460 wrote to memory of 1100 460 cmd.exe 92 PID 460 wrote to memory of 1100 460 cmd.exe 92 PID 460 wrote to memory of 4956 460 cmd.exe 91 PID 460 wrote to memory of 4956 460 cmd.exe 91 PID 460 wrote to memory of 4956 460 cmd.exe 91 PID 1160 wrote to memory of 4348 1160 y3432498.exe 93 PID 1160 wrote to memory of 4348 1160 y3432498.exe 93 PID 1160 wrote to memory of 4348 1160 y3432498.exe 93 PID 460 wrote to memory of 2092 460 cmd.exe 94 PID 460 wrote to memory of 2092 460 cmd.exe 94 PID 460 wrote to memory of 2092 460 cmd.exe 94 PID 460 wrote to memory of 1616 460 cmd.exe 96 PID 460 wrote to memory of 1616 460 cmd.exe 96 PID 460 wrote to memory of 1616 460 cmd.exe 96 PID 460 wrote to memory of 4736 460 cmd.exe 95 PID 460 wrote to memory of 4736 460 cmd.exe 95 PID 460 wrote to memory of 4736 460 cmd.exe 95 PID 460 wrote to memory of 2736 460 cmd.exe 97 PID 460 wrote to memory of 2736 460 cmd.exe 97 PID 460 wrote to memory of 2736 460 cmd.exe 97 PID 1468 wrote to memory of 1816 1468 saves.exe 107 PID 1468 wrote to memory of 1816 1468 saves.exe 107 PID 1468 wrote to memory of 1816 1468 saves.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\06004b7c07fb66bc76cdc825cbdac0bd15f4e81b6c65e2a920de702aa14c4d10.exe"C:\Users\Admin\AppData\Local\Temp\06004b7c07fb66bc76cdc825cbdac0bd15f4e81b6c65e2a920de702aa14c4d10.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5273730.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5273730.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3432498.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3432498.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y6924510.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y6924510.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3760067.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3760067.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:1840
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:4956
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1100
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:2092
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:4736
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1616
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:2736
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:1816
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m9236637.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m9236637.exe5⤵
- Executes dropped EXE
PID:2272
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n6596979.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n6596979.exe4⤵
- Executes dropped EXE
PID:4348
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:932
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:568
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:3868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD54ff483a3eff8e7faece36d10132547a3
SHA1c6ca6f042c5915832b3153a4b8c9b9d2749f6abc
SHA256ba08455fa16e7fc4b4dbffa120fd3050d18837411bcb2f0c49ce93b038e913ba
SHA5120673f8844d1e1453f4527d1f95b01733ccca1368980d42579cb21ac87e4a152066a1ffbb1e0277169568ae0bab59362f84233f6aaef3b0e20d60ca60d9fe5c95
-
Filesize
1.3MB
MD54ff483a3eff8e7faece36d10132547a3
SHA1c6ca6f042c5915832b3153a4b8c9b9d2749f6abc
SHA256ba08455fa16e7fc4b4dbffa120fd3050d18837411bcb2f0c49ce93b038e913ba
SHA5120673f8844d1e1453f4527d1f95b01733ccca1368980d42579cb21ac87e4a152066a1ffbb1e0277169568ae0bab59362f84233f6aaef3b0e20d60ca60d9fe5c95
-
Filesize
476KB
MD5e802452355df29ecce80c46b108444d6
SHA1a82c9d575d100d4686906c3c1a0d0b816312303b
SHA2563db38bd4c0c4be5d7285070eaeb787494276d2e39ad18b4377d9bd9231bc57d7
SHA512d2f13facfa779a21cb8bad153f1e32c0bac06905549696624fc1c67d288eef85bb529e38648b8ed28d13c3ec2fd5ce5e769e086e9b3e12c67fe8053398021dab
-
Filesize
476KB
MD5e802452355df29ecce80c46b108444d6
SHA1a82c9d575d100d4686906c3c1a0d0b816312303b
SHA2563db38bd4c0c4be5d7285070eaeb787494276d2e39ad18b4377d9bd9231bc57d7
SHA512d2f13facfa779a21cb8bad153f1e32c0bac06905549696624fc1c67d288eef85bb529e38648b8ed28d13c3ec2fd5ce5e769e086e9b3e12c67fe8053398021dab
-
Filesize
174KB
MD5487d1cc9f295404c0f343a6b08d07b3c
SHA18509ee2ac74dc54d4a1ccaa363f34cdfac696531
SHA2564b9ec0954837ef53b07118d324965d8ce19f8bed630ef954aa94d9f9a0ce21ec
SHA51214c0b80163851aaa0e7ae366e53d879472dcd46c727c4f0fb21f832ec0e8c7815a03dd5816c6b68d3dddce0cdece4ce12b8226805574dc79345787277ba9ea3f
-
Filesize
174KB
MD5487d1cc9f295404c0f343a6b08d07b3c
SHA18509ee2ac74dc54d4a1ccaa363f34cdfac696531
SHA2564b9ec0954837ef53b07118d324965d8ce19f8bed630ef954aa94d9f9a0ce21ec
SHA51214c0b80163851aaa0e7ae366e53d879472dcd46c727c4f0fb21f832ec0e8c7815a03dd5816c6b68d3dddce0cdece4ce12b8226805574dc79345787277ba9ea3f
-
Filesize
320KB
MD53ab6c39c38f6f337b6bc5d9b982932c1
SHA1a575456a6c598d3400a1268f51a5e0c1a06355d2
SHA2560b151626939812b48b3f03074383a51d88be259a42356b0b48d5ebe9d542ca12
SHA512a68a9e5954b49ab57be7c33d4afd4816192fd8b72263070258f431ec0e49ef10f9dd4631c76a37a41ac82666bd159f71737f0ca63ff3b265850646c2c69f4d4b
-
Filesize
320KB
MD53ab6c39c38f6f337b6bc5d9b982932c1
SHA1a575456a6c598d3400a1268f51a5e0c1a06355d2
SHA2560b151626939812b48b3f03074383a51d88be259a42356b0b48d5ebe9d542ca12
SHA512a68a9e5954b49ab57be7c33d4afd4816192fd8b72263070258f431ec0e49ef10f9dd4631c76a37a41ac82666bd159f71737f0ca63ff3b265850646c2c69f4d4b
-
Filesize
323KB
MD5235d2ef36ae00cadee8ebece4c03b973
SHA17ba1ec8e09797a15bc6748f6bfb18f615b0805d3
SHA256a12da2a660a15c0953dc75766a458d2d37cb0905e4d6fdbbded9218ce97d8cc8
SHA512d24a0d8c36a7eb421ca70eb1a38be35a794644fab2bf270107c2511f806dfcaa5846af09668538e7c171d0e4e186c898158e7193638153a284dcd7f2f86d58a8
-
Filesize
323KB
MD5235d2ef36ae00cadee8ebece4c03b973
SHA17ba1ec8e09797a15bc6748f6bfb18f615b0805d3
SHA256a12da2a660a15c0953dc75766a458d2d37cb0905e4d6fdbbded9218ce97d8cc8
SHA512d24a0d8c36a7eb421ca70eb1a38be35a794644fab2bf270107c2511f806dfcaa5846af09668538e7c171d0e4e186c898158e7193638153a284dcd7f2f86d58a8
-
Filesize
140KB
MD575b0ba5964fd8446e0a06bd2405bf44f
SHA16cb5db551092b9a9578cca36fcee001a86f74498
SHA2562e5bf554271806a4ed486d6b6853861fe3c4c29724022791c45d80f8da61a610
SHA512e12aaed4b5ae76a8265daad43778fb629b215bb3be5407e93e6f332d2afe2efbffb3f1b6325d42b5fdcdaf793c23b4d1661c651122c46c03de877f71e2c6ef70
-
Filesize
140KB
MD575b0ba5964fd8446e0a06bd2405bf44f
SHA16cb5db551092b9a9578cca36fcee001a86f74498
SHA2562e5bf554271806a4ed486d6b6853861fe3c4c29724022791c45d80f8da61a610
SHA512e12aaed4b5ae76a8265daad43778fb629b215bb3be5407e93e6f332d2afe2efbffb3f1b6325d42b5fdcdaf793c23b4d1661c651122c46c03de877f71e2c6ef70
-
Filesize
323KB
MD5235d2ef36ae00cadee8ebece4c03b973
SHA17ba1ec8e09797a15bc6748f6bfb18f615b0805d3
SHA256a12da2a660a15c0953dc75766a458d2d37cb0905e4d6fdbbded9218ce97d8cc8
SHA512d24a0d8c36a7eb421ca70eb1a38be35a794644fab2bf270107c2511f806dfcaa5846af09668538e7c171d0e4e186c898158e7193638153a284dcd7f2f86d58a8
-
Filesize
323KB
MD5235d2ef36ae00cadee8ebece4c03b973
SHA17ba1ec8e09797a15bc6748f6bfb18f615b0805d3
SHA256a12da2a660a15c0953dc75766a458d2d37cb0905e4d6fdbbded9218ce97d8cc8
SHA512d24a0d8c36a7eb421ca70eb1a38be35a794644fab2bf270107c2511f806dfcaa5846af09668538e7c171d0e4e186c898158e7193638153a284dcd7f2f86d58a8
-
Filesize
323KB
MD5235d2ef36ae00cadee8ebece4c03b973
SHA17ba1ec8e09797a15bc6748f6bfb18f615b0805d3
SHA256a12da2a660a15c0953dc75766a458d2d37cb0905e4d6fdbbded9218ce97d8cc8
SHA512d24a0d8c36a7eb421ca70eb1a38be35a794644fab2bf270107c2511f806dfcaa5846af09668538e7c171d0e4e186c898158e7193638153a284dcd7f2f86d58a8
-
Filesize
323KB
MD5235d2ef36ae00cadee8ebece4c03b973
SHA17ba1ec8e09797a15bc6748f6bfb18f615b0805d3
SHA256a12da2a660a15c0953dc75766a458d2d37cb0905e4d6fdbbded9218ce97d8cc8
SHA512d24a0d8c36a7eb421ca70eb1a38be35a794644fab2bf270107c2511f806dfcaa5846af09668538e7c171d0e4e186c898158e7193638153a284dcd7f2f86d58a8
-
Filesize
323KB
MD5235d2ef36ae00cadee8ebece4c03b973
SHA17ba1ec8e09797a15bc6748f6bfb18f615b0805d3
SHA256a12da2a660a15c0953dc75766a458d2d37cb0905e4d6fdbbded9218ce97d8cc8
SHA512d24a0d8c36a7eb421ca70eb1a38be35a794644fab2bf270107c2511f806dfcaa5846af09668538e7c171d0e4e186c898158e7193638153a284dcd7f2f86d58a8
-
Filesize
323KB
MD5235d2ef36ae00cadee8ebece4c03b973
SHA17ba1ec8e09797a15bc6748f6bfb18f615b0805d3
SHA256a12da2a660a15c0953dc75766a458d2d37cb0905e4d6fdbbded9218ce97d8cc8
SHA512d24a0d8c36a7eb421ca70eb1a38be35a794644fab2bf270107c2511f806dfcaa5846af09668538e7c171d0e4e186c898158e7193638153a284dcd7f2f86d58a8
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7