Analysis
-
max time kernel
135s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
28/08/2023, 07:09
Static task
static1
Behavioral task
behavioral1
Sample
bfdfb73c4c5d39ce289092633e2fd2c9db350788dbc77ac97ac79333e558f4cd.exe
Resource
win10-20230703-en
General
-
Target
bfdfb73c4c5d39ce289092633e2fd2c9db350788dbc77ac97ac79333e558f4cd.exe
-
Size
1.4MB
-
MD5
36bade22dbc24c3a5ba872ec2a5de11c
-
SHA1
f4b05b573a73200ac48fad78b4689bbb6c0b0d12
-
SHA256
bfdfb73c4c5d39ce289092633e2fd2c9db350788dbc77ac97ac79333e558f4cd
-
SHA512
4e505225ad9e86bbdfbda7e7db8f435053ef5d1ac8ad6597ae420168cf4493cad44d44866228a3d582c84e346e41aadfa21ee6a9b4d9981c3581fc4ed2360afc
-
SSDEEP
24576:Syid+zq2k44+/7iiKbZ2pzv1Vg3tFla9GDCCm2Im8NY3FDCntUVuZ4PjPCc:5iIWR+/WiKbZ2pzvrutkuXF1DCnxp
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
stas
77.91.124.82:19071
-
auth_value
db6d96c4eade05afc28c31d9ad73a73c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 2156 y3716378.exe 4292 y9198080.exe 3392 y6862045.exe 3224 l7180187.exe 928 saves.exe 2248 m1770657.exe 3284 n5577407.exe 3964 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 4864 rundll32.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y9198080.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y6862045.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bfdfb73c4c5d39ce289092633e2fd2c9db350788dbc77ac97ac79333e558f4cd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y3716378.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2528 schtasks.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 4928 wrote to memory of 2156 4928 bfdfb73c4c5d39ce289092633e2fd2c9db350788dbc77ac97ac79333e558f4cd.exe 70 PID 4928 wrote to memory of 2156 4928 bfdfb73c4c5d39ce289092633e2fd2c9db350788dbc77ac97ac79333e558f4cd.exe 70 PID 4928 wrote to memory of 2156 4928 bfdfb73c4c5d39ce289092633e2fd2c9db350788dbc77ac97ac79333e558f4cd.exe 70 PID 2156 wrote to memory of 4292 2156 y3716378.exe 71 PID 2156 wrote to memory of 4292 2156 y3716378.exe 71 PID 2156 wrote to memory of 4292 2156 y3716378.exe 71 PID 4292 wrote to memory of 3392 4292 y9198080.exe 72 PID 4292 wrote to memory of 3392 4292 y9198080.exe 72 PID 4292 wrote to memory of 3392 4292 y9198080.exe 72 PID 3392 wrote to memory of 3224 3392 y6862045.exe 73 PID 3392 wrote to memory of 3224 3392 y6862045.exe 73 PID 3392 wrote to memory of 3224 3392 y6862045.exe 73 PID 3224 wrote to memory of 928 3224 l7180187.exe 74 PID 3224 wrote to memory of 928 3224 l7180187.exe 74 PID 3224 wrote to memory of 928 3224 l7180187.exe 74 PID 3392 wrote to memory of 2248 3392 y6862045.exe 75 PID 3392 wrote to memory of 2248 3392 y6862045.exe 75 PID 3392 wrote to memory of 2248 3392 y6862045.exe 75 PID 928 wrote to memory of 2528 928 saves.exe 76 PID 928 wrote to memory of 2528 928 saves.exe 76 PID 928 wrote to memory of 2528 928 saves.exe 76 PID 928 wrote to memory of 4576 928 saves.exe 78 PID 928 wrote to memory of 4576 928 saves.exe 78 PID 928 wrote to memory of 4576 928 saves.exe 78 PID 4292 wrote to memory of 3284 4292 y9198080.exe 80 PID 4292 wrote to memory of 3284 4292 y9198080.exe 80 PID 4292 wrote to memory of 3284 4292 y9198080.exe 80 PID 4576 wrote to memory of 4104 4576 cmd.exe 81 PID 4576 wrote to memory of 4104 4576 cmd.exe 81 PID 4576 wrote to memory of 4104 4576 cmd.exe 81 PID 4576 wrote to memory of 4164 4576 cmd.exe 82 PID 4576 wrote to memory of 4164 4576 cmd.exe 82 PID 4576 wrote to memory of 4164 4576 cmd.exe 82 PID 4576 wrote to memory of 4648 4576 cmd.exe 83 PID 4576 wrote to memory of 4648 4576 cmd.exe 83 PID 4576 wrote to memory of 4648 4576 cmd.exe 83 PID 4576 wrote to memory of 3064 4576 cmd.exe 84 PID 4576 wrote to memory of 3064 4576 cmd.exe 84 PID 4576 wrote to memory of 3064 4576 cmd.exe 84 PID 4576 wrote to memory of 3448 4576 cmd.exe 85 PID 4576 wrote to memory of 3448 4576 cmd.exe 85 PID 4576 wrote to memory of 3448 4576 cmd.exe 85 PID 4576 wrote to memory of 5096 4576 cmd.exe 86 PID 4576 wrote to memory of 5096 4576 cmd.exe 86 PID 4576 wrote to memory of 5096 4576 cmd.exe 86 PID 928 wrote to memory of 4864 928 saves.exe 88 PID 928 wrote to memory of 4864 928 saves.exe 88 PID 928 wrote to memory of 4864 928 saves.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfdfb73c4c5d39ce289092633e2fd2c9db350788dbc77ac97ac79333e558f4cd.exe"C:\Users\Admin\AppData\Local\Temp\bfdfb73c4c5d39ce289092633e2fd2c9db350788dbc77ac97ac79333e558f4cd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3716378.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3716378.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9198080.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9198080.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y6862045.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y6862045.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l7180187.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l7180187.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:2528
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4104
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:4164
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:4648
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3064
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:3448
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:5096
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:4864
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m1770657.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m1770657.exe5⤵
- Executes dropped EXE
PID:2248
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n5577407.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n5577407.exe4⤵
- Executes dropped EXE
PID:3284
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:3964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD51c9fc401df0746ddf7e03d3a0222b8d2
SHA15901ced5a01e7fc5dcbfc4a970bc9c25d49539e0
SHA25603740feebf056e34836e4ff3bc563b73914047784db5b296950d21f3bf50c1bd
SHA5128eaee5f9619d937175df26e303faf716c70cfed44e2ffdcfc372e47a28523097e08fe3a4f357c2c981d6edcd1c9086bc22a34b3b43df4f0426cc7f4c23d1549c
-
Filesize
1.3MB
MD51c9fc401df0746ddf7e03d3a0222b8d2
SHA15901ced5a01e7fc5dcbfc4a970bc9c25d49539e0
SHA25603740feebf056e34836e4ff3bc563b73914047784db5b296950d21f3bf50c1bd
SHA5128eaee5f9619d937175df26e303faf716c70cfed44e2ffdcfc372e47a28523097e08fe3a4f357c2c981d6edcd1c9086bc22a34b3b43df4f0426cc7f4c23d1549c
-
Filesize
475KB
MD5aa1f086ae6f5e790c2bca6ee1538a90b
SHA1377ce96a9bed74daccd6bbc5e6218bf598add42a
SHA256ea9b232bfc2789ec00f410ab6d1f788230d4d7bd9fc5592b16e2ee737ea1c563
SHA5129cad7baf521c4feef59446f1915318bf89d37e01689925f20714739ece43514cf55daf555bf2e6e063e120cc423beb3dee8c8718198ac9533c819c5cbc9e5c7d
-
Filesize
475KB
MD5aa1f086ae6f5e790c2bca6ee1538a90b
SHA1377ce96a9bed74daccd6bbc5e6218bf598add42a
SHA256ea9b232bfc2789ec00f410ab6d1f788230d4d7bd9fc5592b16e2ee737ea1c563
SHA5129cad7baf521c4feef59446f1915318bf89d37e01689925f20714739ece43514cf55daf555bf2e6e063e120cc423beb3dee8c8718198ac9533c819c5cbc9e5c7d
-
Filesize
174KB
MD54815e5540636cc448e20d7d82e1ff3d9
SHA124926f0e7f0aa3aaa3c5da50a817130a54517221
SHA256b336ead224391ebbcb411e36162595f0e31e80e79ea94ecd54016d0865bfe246
SHA51240307d43ff1744122b5c00b0b8004a31903a195c01047d64685c6fb5400dbac2f67d9d22d241c3b4d124a0b0aa9c885c4715c1e1e1921946704798c28b70416b
-
Filesize
174KB
MD54815e5540636cc448e20d7d82e1ff3d9
SHA124926f0e7f0aa3aaa3c5da50a817130a54517221
SHA256b336ead224391ebbcb411e36162595f0e31e80e79ea94ecd54016d0865bfe246
SHA51240307d43ff1744122b5c00b0b8004a31903a195c01047d64685c6fb5400dbac2f67d9d22d241c3b4d124a0b0aa9c885c4715c1e1e1921946704798c28b70416b
-
Filesize
319KB
MD58b40a971e640c31c484430a4da5ea399
SHA1c3d550ae59179406ba7bf00406759276f681637d
SHA256191b80d913dc0ee381dcdbf8aaa4fed2eaba8cf4ce1b01a3519b507ffb80c00c
SHA512e2f44382601c9af410cb608639afa0cb1c4394a372243c9dca1fb05e7bae4173e7b969a82e7e1e643ec9312e58c8769e58b322fd080b795c7410708b1cb9f2d7
-
Filesize
319KB
MD58b40a971e640c31c484430a4da5ea399
SHA1c3d550ae59179406ba7bf00406759276f681637d
SHA256191b80d913dc0ee381dcdbf8aaa4fed2eaba8cf4ce1b01a3519b507ffb80c00c
SHA512e2f44382601c9af410cb608639afa0cb1c4394a372243c9dca1fb05e7bae4173e7b969a82e7e1e643ec9312e58c8769e58b322fd080b795c7410708b1cb9f2d7
-
Filesize
323KB
MD5a6917e5072f5ee5232769e602dd66251
SHA1c4abe12a58ff46a1f1d4a025156c9f595d64e1ac
SHA25654f2137c52f1a3293dd643e75be5bd7a806791544960006a1e90cfcef0ce9d3e
SHA512b4adc27ab12b3ca511c53bb807cb70d9243fa8f4fdeaa4f5942be71065e48f38429dcbb09b559cf4331189023ba6f0d14a47f49bb3d8c7d553d441e9912a6c9a
-
Filesize
323KB
MD5a6917e5072f5ee5232769e602dd66251
SHA1c4abe12a58ff46a1f1d4a025156c9f595d64e1ac
SHA25654f2137c52f1a3293dd643e75be5bd7a806791544960006a1e90cfcef0ce9d3e
SHA512b4adc27ab12b3ca511c53bb807cb70d9243fa8f4fdeaa4f5942be71065e48f38429dcbb09b559cf4331189023ba6f0d14a47f49bb3d8c7d553d441e9912a6c9a
-
Filesize
141KB
MD551e4ee0d283c51d49a3a7e7b414ba22f
SHA1952f39ae2d05c9801e145da8bb64eedee6e5e275
SHA256012a28a296187b46d89c9f0676e6f3078c7d194959e6b0e3ad7d7f444e8c4e76
SHA512a5e958ec967657ae3f4ed5d4369907b707f0f494796832197560543dcc80382eb0a466ad5e6779e4f3bd2fb05cb82f03b80623191f8d8b940934540e0de1f31e
-
Filesize
141KB
MD551e4ee0d283c51d49a3a7e7b414ba22f
SHA1952f39ae2d05c9801e145da8bb64eedee6e5e275
SHA256012a28a296187b46d89c9f0676e6f3078c7d194959e6b0e3ad7d7f444e8c4e76
SHA512a5e958ec967657ae3f4ed5d4369907b707f0f494796832197560543dcc80382eb0a466ad5e6779e4f3bd2fb05cb82f03b80623191f8d8b940934540e0de1f31e
-
Filesize
323KB
MD5a6917e5072f5ee5232769e602dd66251
SHA1c4abe12a58ff46a1f1d4a025156c9f595d64e1ac
SHA25654f2137c52f1a3293dd643e75be5bd7a806791544960006a1e90cfcef0ce9d3e
SHA512b4adc27ab12b3ca511c53bb807cb70d9243fa8f4fdeaa4f5942be71065e48f38429dcbb09b559cf4331189023ba6f0d14a47f49bb3d8c7d553d441e9912a6c9a
-
Filesize
323KB
MD5a6917e5072f5ee5232769e602dd66251
SHA1c4abe12a58ff46a1f1d4a025156c9f595d64e1ac
SHA25654f2137c52f1a3293dd643e75be5bd7a806791544960006a1e90cfcef0ce9d3e
SHA512b4adc27ab12b3ca511c53bb807cb70d9243fa8f4fdeaa4f5942be71065e48f38429dcbb09b559cf4331189023ba6f0d14a47f49bb3d8c7d553d441e9912a6c9a
-
Filesize
323KB
MD5a6917e5072f5ee5232769e602dd66251
SHA1c4abe12a58ff46a1f1d4a025156c9f595d64e1ac
SHA25654f2137c52f1a3293dd643e75be5bd7a806791544960006a1e90cfcef0ce9d3e
SHA512b4adc27ab12b3ca511c53bb807cb70d9243fa8f4fdeaa4f5942be71065e48f38429dcbb09b559cf4331189023ba6f0d14a47f49bb3d8c7d553d441e9912a6c9a
-
Filesize
323KB
MD5a6917e5072f5ee5232769e602dd66251
SHA1c4abe12a58ff46a1f1d4a025156c9f595d64e1ac
SHA25654f2137c52f1a3293dd643e75be5bd7a806791544960006a1e90cfcef0ce9d3e
SHA512b4adc27ab12b3ca511c53bb807cb70d9243fa8f4fdeaa4f5942be71065e48f38429dcbb09b559cf4331189023ba6f0d14a47f49bb3d8c7d553d441e9912a6c9a
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b