Analysis
-
max time kernel
135s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
28/08/2023, 07:58
Static task
static1
Behavioral task
behavioral1
Sample
69ded3ba6b2860ef8ecf3c2f88f351ce9c003e7a35a068afedb1c95f24822dbe.exe
Resource
win10-20230703-en
General
-
Target
69ded3ba6b2860ef8ecf3c2f88f351ce9c003e7a35a068afedb1c95f24822dbe.exe
-
Size
1.4MB
-
MD5
7fdb40d4351cb0ecd55dcef83d38371f
-
SHA1
0da7597cd2684e2948baa2e9a260407c78492d64
-
SHA256
69ded3ba6b2860ef8ecf3c2f88f351ce9c003e7a35a068afedb1c95f24822dbe
-
SHA512
3f2693e3be454ad791f399056adafb48da7d02f3645de6f21563f95d887dda03a140f6a8ba0f6fea625bae82f27a3b073779b4707f31fc9e644ed1800387a1ba
-
SSDEEP
24576:Iy2z79k6fM0X5TeE1K61zYYcWH7jeYMADvrswRyAbDpnCzojY9eGIrNEq6NRfPKl:P2zB7M0X5TNK61zYhWbjeerhcAbDpnyJ
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
stas
77.91.124.82:19071
-
auth_value
db6d96c4eade05afc28c31d9ad73a73c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 5028 y6455306.exe 3316 y3274984.exe 672 y4788920.exe 4476 l3724466.exe 4928 saves.exe 4500 m5572033.exe 4216 n0494233.exe 3524 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 1232 rundll32.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y6455306.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y3274984.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y4788920.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 69ded3ba6b2860ef8ecf3c2f88f351ce9c003e7a35a068afedb1c95f24822dbe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2988 schtasks.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2872 wrote to memory of 5028 2872 69ded3ba6b2860ef8ecf3c2f88f351ce9c003e7a35a068afedb1c95f24822dbe.exe 70 PID 2872 wrote to memory of 5028 2872 69ded3ba6b2860ef8ecf3c2f88f351ce9c003e7a35a068afedb1c95f24822dbe.exe 70 PID 2872 wrote to memory of 5028 2872 69ded3ba6b2860ef8ecf3c2f88f351ce9c003e7a35a068afedb1c95f24822dbe.exe 70 PID 5028 wrote to memory of 3316 5028 y6455306.exe 71 PID 5028 wrote to memory of 3316 5028 y6455306.exe 71 PID 5028 wrote to memory of 3316 5028 y6455306.exe 71 PID 3316 wrote to memory of 672 3316 y3274984.exe 72 PID 3316 wrote to memory of 672 3316 y3274984.exe 72 PID 3316 wrote to memory of 672 3316 y3274984.exe 72 PID 672 wrote to memory of 4476 672 y4788920.exe 73 PID 672 wrote to memory of 4476 672 y4788920.exe 73 PID 672 wrote to memory of 4476 672 y4788920.exe 73 PID 4476 wrote to memory of 4928 4476 l3724466.exe 74 PID 4476 wrote to memory of 4928 4476 l3724466.exe 74 PID 4476 wrote to memory of 4928 4476 l3724466.exe 74 PID 672 wrote to memory of 4500 672 y4788920.exe 75 PID 672 wrote to memory of 4500 672 y4788920.exe 75 PID 672 wrote to memory of 4500 672 y4788920.exe 75 PID 4928 wrote to memory of 2988 4928 saves.exe 76 PID 4928 wrote to memory of 2988 4928 saves.exe 76 PID 4928 wrote to memory of 2988 4928 saves.exe 76 PID 4928 wrote to memory of 1640 4928 saves.exe 78 PID 4928 wrote to memory of 1640 4928 saves.exe 78 PID 4928 wrote to memory of 1640 4928 saves.exe 78 PID 3316 wrote to memory of 4216 3316 y3274984.exe 80 PID 3316 wrote to memory of 4216 3316 y3274984.exe 80 PID 3316 wrote to memory of 4216 3316 y3274984.exe 80 PID 1640 wrote to memory of 4792 1640 cmd.exe 81 PID 1640 wrote to memory of 4792 1640 cmd.exe 81 PID 1640 wrote to memory of 4792 1640 cmd.exe 81 PID 1640 wrote to memory of 656 1640 cmd.exe 82 PID 1640 wrote to memory of 656 1640 cmd.exe 82 PID 1640 wrote to memory of 656 1640 cmd.exe 82 PID 1640 wrote to memory of 2100 1640 cmd.exe 83 PID 1640 wrote to memory of 2100 1640 cmd.exe 83 PID 1640 wrote to memory of 2100 1640 cmd.exe 83 PID 1640 wrote to memory of 3692 1640 cmd.exe 84 PID 1640 wrote to memory of 3692 1640 cmd.exe 84 PID 1640 wrote to memory of 3692 1640 cmd.exe 84 PID 1640 wrote to memory of 4232 1640 cmd.exe 85 PID 1640 wrote to memory of 4232 1640 cmd.exe 85 PID 1640 wrote to memory of 4232 1640 cmd.exe 85 PID 1640 wrote to memory of 652 1640 cmd.exe 86 PID 1640 wrote to memory of 652 1640 cmd.exe 86 PID 1640 wrote to memory of 652 1640 cmd.exe 86 PID 4928 wrote to memory of 1232 4928 saves.exe 87 PID 4928 wrote to memory of 1232 4928 saves.exe 87 PID 4928 wrote to memory of 1232 4928 saves.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\69ded3ba6b2860ef8ecf3c2f88f351ce9c003e7a35a068afedb1c95f24822dbe.exe"C:\Users\Admin\AppData\Local\Temp\69ded3ba6b2860ef8ecf3c2f88f351ce9c003e7a35a068afedb1c95f24822dbe.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6455306.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6455306.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3274984.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3274984.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y4788920.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y4788920.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3724466.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3724466.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:2988
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4792
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:656
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:2100
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3692
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:4232
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:652
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:1232
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m5572033.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m5572033.exe5⤵
- Executes dropped EXE
PID:4500
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n0494233.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n0494233.exe4⤵
- Executes dropped EXE
PID:4216
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:3524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5dffe9bd45e4f0e54c9af6c79c1eeb95e
SHA115a375a535199844874428d78539b9310bc1f041
SHA2564c03dd931764eaf9569a6f9688fc5160c36d3be8093168528a2b3d57d1da26b6
SHA5129c1927e279fb78a9d0ea9343770ee8dd327cea78fca00dee5be3ff87deb03c27f0c2bdbf344b98b9ca340744f4c60739f5639faba0c0dab5bb2de7df81e9c187
-
Filesize
1.3MB
MD5dffe9bd45e4f0e54c9af6c79c1eeb95e
SHA115a375a535199844874428d78539b9310bc1f041
SHA2564c03dd931764eaf9569a6f9688fc5160c36d3be8093168528a2b3d57d1da26b6
SHA5129c1927e279fb78a9d0ea9343770ee8dd327cea78fca00dee5be3ff87deb03c27f0c2bdbf344b98b9ca340744f4c60739f5639faba0c0dab5bb2de7df81e9c187
-
Filesize
475KB
MD5f16e008ddafef212fe80ea37c6a5988d
SHA10851a50ab70fe4f8cab6193ff89c3fcb8fcaff05
SHA256e9f39cbd3acd7bd75361515abafae8e2c7ec577e93401ae1e5e2ccaffa2fe422
SHA512f3055b4168eba129d00bf74dcfd709470375c9b59b2331c19efbe8605a427f374c42cbcc2c41ce330b03729f7da484c83a20bad92f3912b91668eaa37afa8f57
-
Filesize
475KB
MD5f16e008ddafef212fe80ea37c6a5988d
SHA10851a50ab70fe4f8cab6193ff89c3fcb8fcaff05
SHA256e9f39cbd3acd7bd75361515abafae8e2c7ec577e93401ae1e5e2ccaffa2fe422
SHA512f3055b4168eba129d00bf74dcfd709470375c9b59b2331c19efbe8605a427f374c42cbcc2c41ce330b03729f7da484c83a20bad92f3912b91668eaa37afa8f57
-
Filesize
174KB
MD5aac4e955bd8bda86dde07ca1b38f0a0c
SHA118fe91e4f46bda2ea73625b1cef1093301198ec6
SHA2563ea6d5a421871b5e7a74ce696844fb52406d40da29d3e45510cbda739ff16ae4
SHA5128ffd79d62f076c5fcb3106da9f9b0c5a2b73d64e68babc634710d9b54e6ca08929df8892bdfff44c699473cee3c538ca06d997ada6639c7190f350787ef1fe55
-
Filesize
174KB
MD5aac4e955bd8bda86dde07ca1b38f0a0c
SHA118fe91e4f46bda2ea73625b1cef1093301198ec6
SHA2563ea6d5a421871b5e7a74ce696844fb52406d40da29d3e45510cbda739ff16ae4
SHA5128ffd79d62f076c5fcb3106da9f9b0c5a2b73d64e68babc634710d9b54e6ca08929df8892bdfff44c699473cee3c538ca06d997ada6639c7190f350787ef1fe55
-
Filesize
320KB
MD5017585bc4d5da80e755d166b30887720
SHA12fbcf06263e5d348057b1cc85b4c243cbb575bd2
SHA256d710d897e070300ac967e7c2ef831569eae489c561388da4b6fea2e6387a1851
SHA512d9cf8f7a960283ccb7170aff21dd11ae7c60ebc8ac7483b3aafbe316d977f67c58974ddf52dcaec3ca34816918cf7e9123073c0f6aafbea24e75050c254f1e28
-
Filesize
320KB
MD5017585bc4d5da80e755d166b30887720
SHA12fbcf06263e5d348057b1cc85b4c243cbb575bd2
SHA256d710d897e070300ac967e7c2ef831569eae489c561388da4b6fea2e6387a1851
SHA512d9cf8f7a960283ccb7170aff21dd11ae7c60ebc8ac7483b3aafbe316d977f67c58974ddf52dcaec3ca34816918cf7e9123073c0f6aafbea24e75050c254f1e28
-
Filesize
323KB
MD505dce571a626fac1a3a44c5dfc220d20
SHA10ce9e5feb0aa369f52c63fe8f63af6cb729de093
SHA2566b02f55713df78f6095a59e04bf3a55fca0a314a5e493ec29a11948e9eea2401
SHA512beffc6a056c21e239ff41a94d5ea699494371f8a55323b14308f0a0090b4b6d6cd0d566741b6df3f5cfb61927d78ba3e294d462ab0829521442657b4b61fbb1f
-
Filesize
323KB
MD505dce571a626fac1a3a44c5dfc220d20
SHA10ce9e5feb0aa369f52c63fe8f63af6cb729de093
SHA2566b02f55713df78f6095a59e04bf3a55fca0a314a5e493ec29a11948e9eea2401
SHA512beffc6a056c21e239ff41a94d5ea699494371f8a55323b14308f0a0090b4b6d6cd0d566741b6df3f5cfb61927d78ba3e294d462ab0829521442657b4b61fbb1f
-
Filesize
141KB
MD5c584effda422813a44c2de185f4bc78d
SHA19d94f9ee4deb9a3aaa1772559ea2344df8952607
SHA256e1e20f49ae7d6d52963c69538976471766587da5d554d8d3cf96ebdc3a388b6a
SHA5120221262a02047b8f17a42f172b4745f6e12e678b3ca18324e32b67bc867b997f591d5d51fbb594def2079b69983123a9acfddb5fbf267c2378ecf6f63358df32
-
Filesize
141KB
MD5c584effda422813a44c2de185f4bc78d
SHA19d94f9ee4deb9a3aaa1772559ea2344df8952607
SHA256e1e20f49ae7d6d52963c69538976471766587da5d554d8d3cf96ebdc3a388b6a
SHA5120221262a02047b8f17a42f172b4745f6e12e678b3ca18324e32b67bc867b997f591d5d51fbb594def2079b69983123a9acfddb5fbf267c2378ecf6f63358df32
-
Filesize
323KB
MD505dce571a626fac1a3a44c5dfc220d20
SHA10ce9e5feb0aa369f52c63fe8f63af6cb729de093
SHA2566b02f55713df78f6095a59e04bf3a55fca0a314a5e493ec29a11948e9eea2401
SHA512beffc6a056c21e239ff41a94d5ea699494371f8a55323b14308f0a0090b4b6d6cd0d566741b6df3f5cfb61927d78ba3e294d462ab0829521442657b4b61fbb1f
-
Filesize
323KB
MD505dce571a626fac1a3a44c5dfc220d20
SHA10ce9e5feb0aa369f52c63fe8f63af6cb729de093
SHA2566b02f55713df78f6095a59e04bf3a55fca0a314a5e493ec29a11948e9eea2401
SHA512beffc6a056c21e239ff41a94d5ea699494371f8a55323b14308f0a0090b4b6d6cd0d566741b6df3f5cfb61927d78ba3e294d462ab0829521442657b4b61fbb1f
-
Filesize
323KB
MD505dce571a626fac1a3a44c5dfc220d20
SHA10ce9e5feb0aa369f52c63fe8f63af6cb729de093
SHA2566b02f55713df78f6095a59e04bf3a55fca0a314a5e493ec29a11948e9eea2401
SHA512beffc6a056c21e239ff41a94d5ea699494371f8a55323b14308f0a0090b4b6d6cd0d566741b6df3f5cfb61927d78ba3e294d462ab0829521442657b4b61fbb1f
-
Filesize
323KB
MD505dce571a626fac1a3a44c5dfc220d20
SHA10ce9e5feb0aa369f52c63fe8f63af6cb729de093
SHA2566b02f55713df78f6095a59e04bf3a55fca0a314a5e493ec29a11948e9eea2401
SHA512beffc6a056c21e239ff41a94d5ea699494371f8a55323b14308f0a0090b4b6d6cd0d566741b6df3f5cfb61927d78ba3e294d462ab0829521442657b4b61fbb1f
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b